{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:58:40Z","timestamp":1773615520527,"version":"3.50.1"},"reference-count":21,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.3103\/s0146411621080307","type":"journal-article","created":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T03:03:08Z","timestamp":1646103788000},"page":"1039-1050","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Detecting Network Attacks on Software Configured Networks Using the Isolating Forest Algorithm"],"prefix":"10.3103","volume":"55","author":[{"given":"M. D.","family":"Stepanov","sequence":"first","affiliation":[]},{"given":"E. Yu.","family":"Pavlenko","sequence":"additional","affiliation":[]},{"given":"D. S.","family":"Lavrova","sequence":"additional","affiliation":[]}],"member":"1627","published-online":{"date-parts":[[2022,3,1]]},"reference":[{"key":"7433_CR1","doi-asserted-by":"publisher","first-page":"906","DOI":"10.3103\/S014641161808014X","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Yu., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0906\u2013911. \u00a0https:\/\/doi.org\/10.3103\/S014641161808014X","journal-title":"Autom. Control Comput. Sci."},{"key":"7433_CR2","unstructured":"Specification, O.F.S., Open Networking Foundation Std, ONF TS-023, Rev., 2015, vol. 1, no. 5, p. 03."},{"key":"7433_CR3","unstructured":"Kuroki, K., Matsumoto, N., and Hayashi, M., Scalable OpenFlow controller redundancy tackling local and global recoveries, Proc. Fifth Int. Conf. on Advances in Future Internet, Barcelona, 2013, IARIA, 2013, pp. 25\u201331."},{"key":"7433_CR4","doi-asserted-by":"publisher","unstructured":"Hori, Y., Mizoguchi, S., Miyazaki, R., Yamada, A., Feng, Y., Kubota, A., and Sakurai, K., A comprehensive security analysis checksheet for OpenFlow networks, Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2016, Barolli, L., Xhafa, F., and Yim, K., Eds., Lecture Notes on Data Engineering and Communications Technologies, Cham: Springer, 2017, pp. 231\u2013242. \u00a0https:\/\/doi.org\/10.1007\/978-3-319-49106-6_22","DOI":"10.1007\/978-3-319-49106-6_22"},{"key":"7433_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.26555\/ijain.v4i1.138","volume":"4","author":"M. Latah","year":"2018","unstructured":"Latah, M. and Toker, L., A novel intelligent approach for detecting DoS flooding attacks in software-defined networks, Int. J. Adv. Intell. Inf., 2018, vol. 4, no. 1, pp. 11\u201320. \u00a0https:\/\/doi.org\/10.26555\/ijain.v4i1.138","journal-title":"Int. J. Adv. Intell. Inf."},{"key":"7433_CR6","doi-asserted-by":"publisher","first-page":"6797","DOI":"10.1007\/s00500-018-3407-3","volume":"22","author":"D. Gao","year":"2018","unstructured":"Gao, D., Liu, Z., Liu, Y., Foh, C.H., Zhi, T., and Chao, H.-C., Defending against Packet-In messages flooding attack under SDN context, Soft Comput., 2018, vol. 22, no. 20, pp. 6797\u20136809. \u00a0https:\/\/doi.org\/10.1007\/s00500-018-3407-3","journal-title":"Soft Comput."},{"key":"7433_CR7","series-title":"Control plane reflection attacks in SDNs: New attacks and countermeasures","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_8","volume-title":"Research in Attacks, Intrusions, and Defenses. RAID 2018","author":"M. Zhang","year":"2018","unstructured":"Zhang, M., Li, G., Xu, L., Bi, J., Gu, G., and Bai, J., Control plane reflection attacks in SDNs: New attacks and countermeasures,  Research in Attacks, Intrusions, and Defenses. RAID 2018, Bailey, M., Holz, T., Stamatogiannakis, M., and Ioannidis, S., Eds., Lecture Notes in Computer Science, vol. 11050, Cham: Springer, 2018, pp. 161\u2013183. \u00a0https:\/\/doi.org\/10.1007\/978-3-030-00470-5_8"},{"key":"7433_CR8","doi-asserted-by":"publisher","first-page":"4760632","DOI":"10.1155\/2018\/4760632","volume":"2018","author":"Y. Zhou","year":"2018","unstructured":"Zhou, Y., Chen, K., Zhang, J., Leng, J., and Tang, Y., Exploiting the vulnerability of flow table overflow in software-defined network: Attack model, evaluation, and defense, Secur. Commun. Networks, 2018, vol. 2018, p.\u00a04760632. \u00a0https:\/\/doi.org\/10.1155\/2018\/4760632","journal-title":"Secur. Commun. Networks"},{"key":"7433_CR9","doi-asserted-by":"publisher","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., and Jurcut, A.D., Machine-learning techniques for detecting attacks in SDN, IEEE 7th Int. Conf. on Computer Science and Network Technology (ICCSNT), Dalian, China, 2019, IEEE, 2019, pp. 277\u2013281. \u00a0https:\/\/doi.org\/10.1109\/ICCSNT47585.2019.8962519","DOI":"10.1109\/ICCSNT47585.2019.8962519"},{"key":"7433_CR10","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.3390\/su12031035","volume":"12","author":"H. Polat","year":"2020","unstructured":"Polat, H., Polat, O., and Cetin, A., Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models, Sustainability, 2020, vol. 12, no. 3, p. 1035. \u00a0https:\/\/doi.org\/10.3390\/su12031035","journal-title":"Sustainability"},{"key":"7433_CR11","doi-asserted-by":"publisher","first-page":"103285","DOI":"10.1016\/j.micpro.2020.103285","volume":"79","author":"N. Satheesh","year":"2020","unstructured":"Satheesh, N., Rathnamma, M.V., Rajeshkumar, G., Vidya Sagar, P., Dadheech, P., Dogiwal, S.R., Velayutham, P., and Sengan, S., Flow-based anomaly intrusion detection using machine learning model with software defined networking for OpenFlow network, Microprocess. Microsyst., 2020, vol. 79, p. 103285. https:\/\/doi.org\/10.1016\/j.micpro.2020.103285","journal-title":"Microprocess. Microsyst."},{"key":"7433_CR12","doi-asserted-by":"publisher","unstructured":"Mousavi, S.M. and St-Hilaire, M., Early detection of DDoS attacks against SDN controllers, Int. Conf. on Computing, Networking and Communications (ICNC), Garden Grove, Calif., 2015, IEEE, 2015, pp. 77\u201381. \u00a0https:\/\/doi.org\/10.1109\/ICCNC.2015.7069319","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"7433_CR13","doi-asserted-by":"publisher","unstructured":"Chen, Z., Jiang, F., Cheng, Y., Gu, X., Liu, W., and Peng, J., XGBoost classifier for DDoS attack detection and analysis in SDN-based cloud, IEEE Int. Conf. on Big Data and Smart Computing (BigComp), Shanghai, 2018, IEEE, 2018, pp. 251\u2013256. \u00a0https:\/\/doi.org\/10.1109\/BigComp.2018.00044","DOI":"10.1109\/BigComp.2018.00044"},{"key":"7433_CR14","doi-asserted-by":"publisher","unstructured":"Shohani, R.B. and Mostafavi, S.A., Introducing a new linear regression based method for early DDoS attack detection in SDN, 6th Int. Conf. on Web Research (ICWR), Tehran, 2020, IEEE, 2020, pp. 126\u2013132. \u00a0https:\/\/doi.org\/10.1109\/ICWR49608.2020.9122310","DOI":"10.1109\/ICWR49608.2020.9122310"},{"key":"7433_CR15","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1504\/IJCSE.2020.111431","volume":"23","author":"Z. Ma","year":"2020","unstructured":"Ma, Z. and Li, B., A DDoS attack detection method based on SVM and K-nearest neighbour in SDN environment, Int. J. Comput. Sci. Eng., 2020, vol. 23, no. 3, pp. 224\u2013234. \u00a0https:\/\/doi.org\/10.1504\/IJCSE.2020.111431","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"7433_CR16","doi-asserted-by":"publisher","unstructured":"Liu, F.T., Ting, K.M., and Zhou, Z.-H., Isolation forest, Eighth IEEE Int. Conf. on Data Mining, Pisa, 2008, IEEE, 2008, pp. 413\u2013422. \u00a0https:\/\/doi.org\/10.1109\/ICDM.2008.17","DOI":"10.1109\/ICDM.2008.17"},{"key":"7433_CR17","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1186\/s40537-020-00382-x","volume":"7","author":"J.L. Leevy","year":"2020","unstructured":"Leevy, J.L. and Khoshgoftaar, T.M., A survey and analysis of intrusion detection models based on CSE-CIC-IDS2018 big data, J. Big Data, 2020, vol. 7, no. 1, p. 104. \u00a0https:\/\/doi.org\/10.1186\/s40537-020-00382-x","journal-title":"J. Big Data"},{"key":"7433_CR18","doi-asserted-by":"publisher","first-page":"165263","DOI":"10.1109\/ACCESS.2020.3022633","volume":"8","author":"M.S. Elsayed","year":"2020","unstructured":"Elsayed, M.S., Le-Khac, N.-A., and Jurcut, A.D., InSDN: A novel SDN intrusion dataset, IEEE Access, 2020, vol. 8, pp. 165263\u2013165284. \u00a0https:\/\/doi.org\/10.1109\/ACCESS.2020.3022633","journal-title":"IEEE Access"},{"key":"7433_CR19","doi-asserted-by":"publisher","first-page":"347","DOI":"10.14257\/ijmue.2014.9.6.33","volume":"9","author":"X. Li","year":"2014","unstructured":"Li, X., Gong, X., Peng, X., and Peng, S., SSiCP: a new SVM based recursive feature elimination algorithm for multiclass cancer classification, Int. J. Multimedia Ubiquitous Eng., 2014, vol. 9, no. 6, pp. 347\u2013360. \u00a0https:\/\/doi.org\/10.14257\/ijmue.2014.9.6.33","journal-title":"Int. J. Multimedia Ubiquitous Eng."},{"key":"7433_CR20","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"N.V. Chawla","year":"2002","unstructured":"Chawla, N.V., Bowyer, K.W., Hall, L.O., and Kegelmeyer, W.P., SMOTE: Synthetic minority over-sampling technique, J. Artif. Intell. Res., 2002, vol. 16, pp. 321\u2013357. \u00a0https:\/\/doi.org\/10.1613\/jair.953","journal-title":"J. Artif. Intell. Res."},{"key":"7433_CR21","doi-asserted-by":"publisher","unstructured":"Elsayed, M.S., Le-Khac, N.-A., Dev, S., and Jurcut, A.D., Network anomaly detection using LSTM based autoencoder, Proc. 16th ACM Symp. on QoS and Security for Wireless and Mobile Networks, Alicante, Spain, 2020, New York: Association for Computing Machinery, 2020, pp. 37\u201345. \u00a0https:\/\/doi.org\/10.1145\/3416013.3426457","DOI":"10.1145\/3416013.3426457"}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080307.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411621080307","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411621080307.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:01:03Z","timestamp":1773612063000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411621080307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":21,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["7433"],"URL":"https:\/\/doi.org\/10.3103\/s0146411621080307","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]},"assertion":[{"value":"3 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 February 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}