{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T14:04:41Z","timestamp":1778508281747,"version":"3.51.4"},"reference-count":39,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2026,2,28]]},"abstract":"<jats:p>The Internet of Things (IoT) presents new challenges to traditional communication models, particularly in terms of security, which are exacerbated by the rapid evolution of cyberthreats. Traditional security methods, especially those using Machine Learning models, often struggle with the limited computational resources available, making it difficult to detect attacks across the entire network. Software-defined networks (SDN) offer a solution by centralizing security policies, enabling more effective implementation and enforcement. The study investigates the SDN architecture from a security perspective. This article proposes a Deep Learning-based SDN architecture for IoT security which can significantly enhance real-time cyberthreat detection. Specifically, a secure communication channel is first designed using a blockchain-based authentication to resist well-known intruders. Second, a deep learning convergence model using an adaptive threshold scoring method that stops all local model training and allows edge models to contribute to the cloud model until a specified accuracy is achieved. To achieve low CPU usage and provide real-time services, SDN is next used as a cloud-based system security administrator to protect IoT networks from zero-day attacks by sending requests from edge devices to a cloud SDN controller. The efficiency of the proposed framework is demonstrated using simulations with two different network datasets E-IIoT and ToN-IoT against various attacks and the results are compared with similar works. The proposed model effectively detects and mitigates cyberthreats such as DDoS, Black-Sink-Worm hole, MitM, and Ransomware. It achieves high performance with 99.15% accuracy, 99.31% precision, 98.97% recall, and a 99.14% F1 score, on an average while using less CPU power for real-time IoT network protection.<\/jats:p>","DOI":"10.1145\/3737875","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T07:19:38Z","timestamp":1748503178000},"page":"1-29","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network"],"prefix":"10.1145","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-4062-8494","authenticated-orcid":false,"given":"Kokila","family":"M","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, VIT-AP University","place":["Amaravati, India"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4371-2169","authenticated-orcid":false,"given":"Srinivasa Reddy","family":"K","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, VIT-AP University","place":["Amaravati, India"]}]}],"member":"320","published-online":{"date-parts":[[2026,1,14]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2023.100316"},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2023.103809"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmc.2024.046396"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2024.102387"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022862"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2025.3526692"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxad034"},{"key":"e_1_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.22266\/IJIES2024.0831.12"},{"key":"e_1_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103228"},{"key":"e_1_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.3844\/JCSSP.2024.1030.1039"},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-024-04616-y"},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.dib.2024.110461"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3165809"},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2024.3474180"},{"key":"e_1_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2024.101176"},{"key":"e_1_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.32604\/cmes.2023.028077"},{"key":"e_1_3_2_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2024.100564"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103778"},{"key":"e_1_3_2_20_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100692"},{"key":"e_1_3_2_21_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3462735"},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.22266\/ijies2024.1031.44"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2025.107711"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.104109"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2024.112052"},{"key":"e_1_3_2_26_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103818"},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.csa.2024.100068"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-024-03857-4"},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jer.2024.01.014"},{"key":"e_1_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2022.102983"},{"key":"e_1_3_2_31_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2024.04.035"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103320"},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-023-04152-1"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3704434"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2021.103093"},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2023.100663"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2024.123765"},{"key":"e_1_3_2_38_2","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2024.01510121"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108578"},{"key":"e_1_3_2_40_2","article-title":"Replay attack detection for cyber-physical control systems: A dynamical delay estimation method","author":"Zhao Dong","year":"2024","unstructured":"Dong Zhao, Bo Yang, Yueyang Li, and Hui Zhang. 2024. Replay attack detection for cyber-physical control systems: A dynamical delay estimation method. IEEE Transactions on Industrial Electronics 72, 1 (2024), 112052.","journal-title":"IEEE Transactions on Industrial Electronics"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3737875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T05:10:49Z","timestamp":1768540249000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3737875"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,14]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,2,28]]}},"alternative-id":["10.1145\/3737875"],"URL":"https:\/\/doi.org\/10.1145\/3737875","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"value":"1533-5399","type":"print"},{"value":"1557-6051","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,14]]},"assertion":[{"value":"2025-01-22","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-23","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2026-01-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}