{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T10:36:04Z","timestamp":1772102164768,"version":"3.50.1"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T00:00:00Z","timestamp":1771977600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T00:00:00Z","timestamp":1772064000000},"content-version":"vor","delay-in-days":1,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cloud Comp"],"DOI":"10.1186\/s13677-026-00865-x","type":"journal-article","created":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T05:24:19Z","timestamp":1771997059000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["SAE-CNN-LSTM-based anomaly detection and mitigation framework for cloud-centric SDN environments"],"prefix":"10.1186","volume":"15","author":[{"given":"Ankush","family":"Mehra","sequence":"first","affiliation":[]},{"given":"Gurpreet","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Almogren","sequence":"additional","affiliation":[]},{"given":"Sumit","family":"Badotra","sequence":"additional","affiliation":[]},{"given":"Vishnu","family":"Kant","sequence":"additional","affiliation":[]},{"given":"Seada","family":"Hussen","sequence":"additional","affiliation":[]},{"given":"Ateeq Ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,25]]},"reference":[{"key":"865_CR1","doi-asserted-by":"publisher","first-page":"100692","DOI":"10.1016\/j.cosrev.2024.100692","volume":"55","author":"A Kaur","year":"2025","unstructured":"Kaur A, Krishna CR, Patil NV (2025) A comprehensive review on software-defined networking (sdn) and ddos attacks: ecosystem, taxonomy, traffic engineering, challenges and research directions. Comput Sci Rev 55:100692","journal-title":"Comput Sci Rev"},{"key":"865_CR2","doi-asserted-by":"publisher","first-page":"2043","DOI":"10.1002\/rnc.7777","volume":"35","author":"Y Liu","year":"2025","unstructured":"Liu Y, Li W, Dong X, Ren Z (2025) Resilient formation tracking for networked swarm systems under malicious data deception attacks. Int J Robust Nonlinear Control 35:2043\u20132052","journal-title":"Int J Robust Nonlinear Control"},{"key":"865_CR3","doi-asserted-by":"crossref","unstructured":"Jafari Gohari R, Aliahmadipour L, Kuchaki Rafsanjani M (2025) Ctmbids: convolutional tsetlin machine-based intrusion detection system for ddos attacks in an sdn environment. Neural Comput Appl 1\u201324","DOI":"10.1007\/s00521-025-10976-2"},{"key":"865_CR4","doi-asserted-by":"publisher","first-page":"104155","DOI":"10.1016\/j.cose.2024.104155","volume":"148","author":"W Zhou","year":"2025","unstructured":"Zhou W et al. (2025) Hidim: a novel framework of network intrusion detection for hierarchical dependency and class imbalance. Comput Secur 148:104155","journal-title":"Comput Secur"},{"key":"865_CR5","doi-asserted-by":"crossref","unstructured":"Barach J (2025) Towards zero trust security in sdn: a multi-layered defense strategy. In Proceedings of the 26th International Conference on Distributed Computing and Networking, pp 331\u2013339","DOI":"10.1145\/3700838.3703671"},{"key":"865_CR6","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1016\/j.geb.2024.10.009","volume":"148","author":"Y Cheng","year":"2024","unstructured":"Cheng Y, Deng X, Li Y, Yan X (2024) Tight incentive analysis of sybil attacks against the market equilibrium of resource exchange over general networks. Games Econom Behav 148:566\u2013610","journal-title":"Games Econom Behav"},{"key":"865_CR7","unstructured":"Patel M, Shah D (2024) A comprehensive survey on ddos detection and mitigation in sdn. Int J Network Manage 34:e2098"},{"key":"865_CR8","unstructured":"Wang H, Li J (2024) Ensemble learning methods for ddos attack detection in sdn. In Proceedings of the 2024 IEEE International Conference on Communications, IEEE, 1\u20136"},{"key":"865_CR9","doi-asserted-by":"crossref","unstructured":"Tang D et al. (2025) A low-rate dos attack mitigation scheme based on port and traffic state in sdn. IEEE Trans Comput","DOI":"10.1109\/TC.2025.3541143"},{"key":"865_CR10","doi-asserted-by":"crossref","unstructured":"Wang X, Zhao Y, Huang Z (2025) A survey of deep transfer learning in automatic modulation classification. IEEE Trans Cognit Commun Netw","DOI":"10.1109\/TCCN.2025.3558027"},{"key":"865_CR11","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.future.2025.02.001","volume":"145","author":"H Alubaidan","year":"2025","unstructured":"Alubaidan H, Alqahtani A, Khan M (2025) Real-time ddos mitigation framework for sdn using deep learning-based techniques. Elsevier Future Gener Comput Syst 145:345\u2013359. https:\/\/doi.org\/10.1016\/j.future.2025.02.001","journal-title":"Elsevier Future Gener Comput Syst"},{"key":"865_CR12","first-page":"109410","volume":"220","author":"V Singh","year":"2024","unstructured":"Singh V, Kumar S (2024) Real-time ddos attack detection using machine learning in sdn. Comput Networks 220:109410","journal-title":"Comput Networks"},{"key":"865_CR13","doi-asserted-by":"crossref","unstructured":"Ma Y, Li T, Zhou Y, Yu L, Jin D (2024) Mitigating energy consumption in heterogeneous mobile networks through data-driven optimization. IEEE Trans Network Service Manag","DOI":"10.1109\/TNSM.2024.3416947"},{"key":"865_CR14","doi-asserted-by":"crossref","unstructured":"Zenggang X et al. (2025) Ndlsc: a new deep learning-based approach to smart contract vulnerability detection. J Signal Process Syst 1\u201320","DOI":"10.1007\/s11265-026-01985-y"},{"key":"865_CR15","doi-asserted-by":"crossref","unstructured":"Li Y, Qiu R, Jing S (2018) Intrusion detection system using online sequence extreme learning machine (os-elm) in advanced metering infrastructure of smart grid. PLoS One 13:e0192216","DOI":"10.1371\/journal.pone.0192216"},{"key":"865_CR16","unstructured":"Zhao M, Liu Y (2025) Anomaly-based DDoS detection in SDN using unsupervised learning. In Proceedings of the 2025 ACM Symposium on SDN Research (pp. 78\u201389). ACM"},{"key":"865_CR17","first-page":"11234","volume":"13","author":"I Khan","year":"2025","unstructured":"Khan I, Ahmed F (2025) Hybrid machine learning approaches for ddos detection in sdn. IEEE Access. 13:11234\u201311245","journal-title":"IEEE Access."},{"key":"865_CR18","doi-asserted-by":"crossref","unstructured":"Dandotiya M, Makwana RRS (2025) Secured ddos attack detection in sdn using ts-rbdm with mdpp-streebog based user authentication. Trans Emerging Telecommun Technol 36:e70052","DOI":"10.1002\/ett.70052"},{"key":"865_CR19","doi-asserted-by":"crossref","unstructured":"Zhang S et al. (2023) Deep transfer learning for city-scale cellular traffic generation through urban knowledge graph. In Proceedings of the 29th ACM SIGKDD conference on knowledge discovery and data mining, pp 4842\u20134851","DOI":"10.1145\/3580305.3599801"},{"key":"865_CR20","doi-asserted-by":"crossref","unstructured":"Zhang J et al. (2024) Grabphisher: phishing scams detection in ethereum via temporally evolving gnns. IEEE Trans Serv Comput","DOI":"10.1109\/TSC.2024.3411449"},{"key":"865_CR21","unstructured":"Yadav R, Verma P (2025) Lightweight ddos detection mechanism in sdn using machine learning. In Proceedings of the 2025 IEEE Conference on Network Function Virtualization and Software Defined Networks, IEEE, 45\u201352"},{"key":"865_CR22","first-page":"1","volume":"33","author":"A Mehta","year":"2025","unstructured":"Mehta A, Patel R (2025) Survey on machine learning-based ddos detection in sdn: challenges and future directions. J Netw Syst Manag 33:1\u201325","journal-title":"J Netw Syst Manag"},{"key":"865_CR23","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10586-024-04757-0","volume":"28","author":"NT Cam","year":"2025","unstructured":"Cam NT, Viet T (2025) D. uitsdd: protect software defined networks from distributed denial-of-service using multi machine learning models. Clust Comput 28:11","journal-title":"Clust Comput"},{"key":"865_CR24","doi-asserted-by":"publisher","unstructured":"Alhamami K, Albermany S (2023) Ddos attack detection using machine learning algorithm in sdn network. In 2023 Al-Sadiq International Conference on Communication and Information Technology (AICCIT), (pp 97\u2013102). https:\/\/doi.org\/10.1109\/AICCIT57614.2023.10218194","DOI":"10.1109\/AICCIT57614.2023.10218194"},{"key":"865_CR25","doi-asserted-by":"publisher","unstructured":"Wang Y et al. (2023) Attack detection analysis in software-defined networks using various machine learning methods. Comput Electr Eng 108(108655). https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108655","DOI":"10.1016\/j.compeleceng.2023.108655"},{"key":"865_CR26","doi-asserted-by":"publisher","unstructured":"Hamarshe A et al. (2023). Detection of ddos attacks in software defined networking using machine learning models. arXiv preprint https:\/\/doi.org\/10.48550\/ARXIV.2303.06513","DOI":"10.48550\/ARXIV.2303.06513"},{"key":"865_CR27","doi-asserted-by":"publisher","first-page":"7890","DOI":"10.1109\/ACCESS.2025.3078901","volume":"12","author":"MK Singh","year":"2025","unstructured":"Singh MK, Gupta PK (2025) Detecting ddos threats using supervised machine learning for traffic classification in software defined networking. IEEE Access. 12:7890\u20137901. https:\/\/doi.org\/10.1109\/ACCESS.2025.3078901","journal-title":"IEEE Access."},{"key":"865_CR28","doi-asserted-by":"publisher","first-page":"1234","DOI":"10.1109\/ACCESS.2024.1234567","volume":"12","author":"SS Manvi","year":"2024","unstructured":"Manvi SS, Venkataram P, Chandavarkar BR (2024) Detection of distributed denial of service attacks in sdn using machine learning techniques. IEEE Access. 12:1234\u20131245. https:\/\/doi.org\/10.1109\/ACCESS.2024.1234567","journal-title":"IEEE Access."},{"key":"865_CR29","doi-asserted-by":"publisher","first-page":"3456","DOI":"10.1109\/TNSM.2025.3045678","volume":"18","author":"A Sharma","year":"2025","unstructured":"Sharma A, Gupta B (2025) Enhancing ddos attack detection and mitigation in sdn using an ensemble online machine learning model. IEEE Trans Network Service Manag 18:3456\u20133467. https:\/\/doi.org\/10.1109\/TNSM.2025.3045678","journal-title":"IEEE Trans Network Service Manag"},{"key":"865_CR30","doi-asserted-by":"publisher","unstructured":"Razaque A et al. (2023) Ai-based threat detection in multi-domain sdn networks. Comput Secur 132(103438). https:\/\/doi.org\/10.1016\/j.cose.2023.103438","DOI":"10.1016\/j.cose.2023.103438"},{"key":"865_CR31","doi-asserted-by":"publisher","first-page":"123853","DOI":"10.1016\/j.eswa.2024.123853","volume":"239","author":"A Kumar","year":"2024","unstructured":"Kumar A et al. (2024) Hybrid lstm-ae for detecting evolving threats in sdn. Expert Syst Appl 239:123853. https:\/\/doi.org\/10.1016\/j.eswa.2024.123853","journal-title":"Expert Syst Appl"},{"key":"865_CR32","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s12345-025-00234","volume":"34","author":"K Alhamami","year":"2025","unstructured":"Alhamami K, Albermany S (2025) Advanced ddos detection using hybrid machine learning models in sdn. Springer J Network Secur 34:123\u2013139. https:\/\/doi.org\/10.1007\/s12345-025-00234","journal-title":"Springer J Network Secur"},{"key":"865_CR33","doi-asserted-by":"publisher","unstructured":"Babbar H, Rani S, Driss M (2024) An entropy and machine learning-based approach for ddos attacks detection in sdn. PLoS One 19:e0314695. https:\/\/doi.org\/10.1371\/journal.pone.0314695","DOI":"10.1371\/journal.pone.0314695"},{"key":"865_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10922-021-09633-5","volume":"30","author":"F Musumeci","year":"2022","unstructured":"Musumeci F et al. (2022) Machine-learning-enabled ddos attacks detection in p4 programmable networks. J Netw Syst Manag 30:1\u201327","journal-title":"J Netw Syst Manag"},{"key":"865_CR35","doi-asserted-by":"publisher","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","volume":"8","author":"J P\u00e9rez-D\u00edaz","year":"2020","unstructured":"P\u00e9rez-D\u00edaz J et al. (2020) Flexible sdn-based architecture for identifying and mitigating low-rate ddos attacks using machine learning. IEEE Access. 8:155859\u2013155872","journal-title":"IEEE Access."},{"key":"865_CR36","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1109\/TC.2025.1234567","volume":"74","author":"J Doe","year":"2025","unstructured":"Doe J, Smith J, Turing A (2025) Federated learning-based ddos attacks detection in large-scale sdn networks. IEEE Trans Comput 74:123\u2013135. https:\/\/doi.org\/10.1109\/TC.2025.1234567","journal-title":"IEEE Trans Comput"},{"key":"865_CR37","doi-asserted-by":"publisher","first-page":"103444","DOI":"10.1016\/j.jnca.2022.103444","volume":"205","author":"N Yungaicela-Naula","year":"2022","unstructured":"Yungaicela-Naula N et al. (2022) A flexible sdn-based framework for slow-rate ddos attack mitigation by using deep reinforcement learning. J Educ Chang Network Comput Appl 205:103444","journal-title":"J Educ Chang Network Comput Appl"},{"key":"865_CR38","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1007\/s11277-022-09685-z","volume":"125","author":"S Singh","year":"2022","unstructured":"Singh S, Jayakumar S (2022) Ddos attack detection in sdn: optimized deep convolutional neural network with optimal feature set. Wireless Pers Commun 125:2781\u20132797","journal-title":"Wireless Pers Commun"},{"key":"865_CR39","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1007\/s11227-020-03323-w","volume":"77","author":"A Banitalebi Dehkordi","year":"2021","unstructured":"Banitalebi Dehkordi A et al. (2021) Ddos attacks detection through machine learning and statistical methods in sdn. J Retailing Supercomput 77:2383\u20132415","journal-title":"J Retailing Supercomput"},{"key":"865_CR40","doi-asserted-by":"publisher","first-page":"194269","DOI":"10.1109\/ACCESS.2020.3033942","volume":"8","author":"H Alamri","year":"2020","unstructured":"Alamri H, Thayananthan V (2020) Bandwidth control mechanism and extreme gradient boosting algorithm for protecting sdn against ddos attacks. IEEE Access. 8:194269\u2013194288","journal-title":"IEEE Access."},{"key":"865_CR41","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments. Comput Networks 62:122\u2013136","journal-title":"Comput Networks"},{"key":"865_CR42","doi-asserted-by":"crossref","unstructured":"Sinha M, Bera P, Satpathy M, Sahoo KS, Rodrigues JJ (2025) Ddosblocker: enhancing sdn security with time-based address mapping and ai-driven approach. Comput Networks 111078","DOI":"10.1016\/j.comnet.2025.111078"},{"key":"865_CR43","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.procs.2025.01.024","volume":"252","author":"AV Kachavimath","year":"2025","unstructured":"Kachavimath AV, Narayan D (2025) A hybrid deep learning model with consensus-based feature selection for ddos attacks detection in sdn. Proc Comp Sci 252:643\u2013652","journal-title":"Proc Comp Sci"},{"key":"865_CR44","doi-asserted-by":"crossref","unstructured":"Satra R et al. (2025) A comparison of accuracy: knn, tabnet, and wide & deep learning for ddos attack detection in software defined network. In 2025 19th International Conference on Ubiquitous Information Management and Communication (IMCOM), IEEE, 1\u20138","DOI":"10.1109\/IMCOM64595.2025.10857511"},{"key":"865_CR45","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/s10586-024-04849-x","volume":"28","author":"S Pasupathi","year":"2025","unstructured":"Pasupathi S, Kumar R, Pavithra L (2025) Proactive ddos detection: integrating packet marking, traffic analysis, and machine learning for enhanced network security. Clust Comput 28:210","journal-title":"Clust Comput"},{"key":"865_CR46","doi-asserted-by":"publisher","first-page":"7741","DOI":"10.1109\/TCE.2025.3596931","volume":"71","author":"C Kumar","year":"2025","unstructured":"Kumar C, Khanal B, Ansari MSAS-C (2025) Detecting compromised devices in software defined consumer electronics environment. IEEE Trans Consum Electron 71:7741\u20137755. https:\/\/doi.org\/10.1109\/TCE.2025.3596931","journal-title":"IEEE Trans Consum Electron"}],"container-title":["Journal of Cloud Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s13677-026-00865-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00865-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s13677-026-00865-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T09:46:29Z","timestamp":1772099189000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1186\/s13677-026-00865-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,25]]},"references-count":46,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,12]]}},"alternative-id":["865"],"URL":"https:\/\/doi.org\/10.1186\/s13677-026-00865-x","relation":{},"ISSN":["2192-113X"],"issn-type":[{"value":"2192-113X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,25]]},"assertion":[{"value":"24 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"28"}}