{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:53:29Z","timestamp":1776956009204,"version":"3.51.4"},"reference-count":51,"publisher":"Tech Science Press","issue":"2","license":[{"start":{"date-parts":[[2024,11,24]],"date-time":"2024-11-24T00:00:00Z","timestamp":1732406400000},"content-version":"vor","delay-in-days":328,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.057185","type":"journal-article","created":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T07:28:33Z","timestamp":1731310113000},"page":"3003-3031","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":11,"title":["Enhanced DDoS Detection Using Advanced Machine Learning and Ensemble Techniques in Software Defined Networking"],"prefix":"10.32604","volume":"81","author":[{"given":"Hira Akhtar","family":"Butt","sequence":"first","affiliation":[]},{"given":"Khoula Said Al","family":"Harthy","sequence":"additional","affiliation":[]},{"given":"Mumtaz Ali","family":"Shah","sequence":"additional","affiliation":[]},{"given":"Mudassar","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Rashid","family":"Amin","sequence":"additional","affiliation":[]},{"given":"Mujeeb Ur","family":"Rehman","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103108","article-title":"Automated DDOS attack detection in software-defined networking","volume":"187","author":"Ahuja","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3301614","article-title":"Software-defined networking-based DDoS defense mechanisms","volume":"52","author":"Swami","year":"2019","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2523","DOI":"10.1109\/TNSM.2020.3014870","article-title":"Bringing intelligence to software-defined networks: Mitigating DDoS attacks","volume":"17","author":"Abou El Houda","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2021.103156","article-title":"Towards DDoS detection mechanisms in software-defined networking","volume":"190","author":"Cui","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref5","doi-asserted-by":"crossref","first-page":"2743","DOI":"10.1007\/s11277-020-08042-2","article-title":"Improved network monitoring using software-defined networking for DDoS detection and mitigation evaluation","volume":"116","author":"Ramprasath","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref6","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","article-title":"DDoS attack protection in the era of cloud computing and software-defined networking","volume":"81","author":"Wang","year":"2015","journal-title":"Comput. Netw."},{"key":"ref7","article-title":"A DDoS attack detection method based on SVM in a software-defined network","volume":"1","author":"Ye","year":"2018","journal-title":"Secur. Commun. Netw."},{"key":"ref8","doi-asserted-by":"crossref","unstructured":"Q. Niyaz, W. Sun, and A. Y. Javaid, \u201cA deep learning-based DDoS detection system in software-defined networking (SDN),\u201d 2016, arXiv:1611.07400.","DOI":"10.4108\/eai.28-12-2017.153515"},{"key":"ref9","author":"Hu","journal-title":"Network Innovation through OpenFlow and SDN"},{"key":"ref10","series-title":"presented at the 2015 IFIP\/IEEE Int. Symp. Integrated Netw. Manag (IM)","first-page":"207","article-title":"Interactive monitoring, visualization, and configuration of OpenFlow-based SDN","author":"Isolani","year":"May 11\u201315, 2015"},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.1016\/j.cose.2023.103251","article-title":"Towards DDoS attack detection using deep learning approach","volume":"129","author":"Aktar","year":"2023","journal-title":"Comput. Security"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1007\/s13369-023-08075-2","article-title":"A comprehensive analysis of machine learning and deep learning-based solutions for DDoS attack detection in SDN","volume":"49","author":"Aslam","year":"2024","journal-title":"Arab. J. Sci. Eng."},{"key":"ref13","series-title":"presented at the SMC 2000 Conf. Proc.","first-page":"8","article-title":"Distributed denial of service attacks","author":"Lau","year":"Oct. 8\u201311, 2000"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.3390\/technologies9010014","article-title":"An investigation into the application of deep learning in the detection and mitigation of DDOS attack on SDN controllers","volume":"9","author":"Gadze","year":"2021","journal-title":"Technologies"},{"key":"ref15","first-page":"450","article-title":"A novel framework for detection of DoS\/DDoS attack using deep learning techniques, and an approach to mitigate the impact of DoS\/DDoS attack in network environment","volume":"12","author":"Rao","year":"2024","journal-title":"Int. J. Intell. Syst. Appl. Eng."},{"key":"ref16","series-title":"presented at the 10th IEEE Int. Conf. on Netw. Protocols","first-page":"312","article-title":"Attacking DDoS at the source","author":"Mirkovic","year":"Nov. 12\u201315, 2002"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","article-title":"Distributed denial of service (DDoS) resilience in the cloud: Review and conceptual cloud DDoS mitigation framework","volume":"67","author":"Osanaiye","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","article-title":"A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks","volume":"15","author":"Zargar","year":"2013","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"ref19","first-page":"1","article-title":"DoS and DDoS attacks at OSI layers","volume":"2","author":"Obaid","year":"2020","journal-title":"Int. J. Multidisciplinary Res. Publ."},{"key":"ref20","first-page":"10","article-title":"Understanding denial of service (DoS) attacks using OSI reference model","volume":"1","author":"Kumar","year":"2014","journal-title":"Int. J. Educ. Sci. Res."},{"key":"ref21","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1080\/21642583.2016.1241193","article-title":"Denial of service attacks\u2014An updated perspective","volume":"4","author":"Kumar","year":"2016","journal-title":"Syst. Sci. Control Eng."},{"key":"ref22","first-page":"181","article-title":"Attacks of denial of service on networks layer of OSI model and security maintenance","volume":"5","author":"Abdul","year":"2017","journal-title":"Indones. J. Electr. Eng. Comput. Sci."},{"key":"ref23","doi-asserted-by":"crossref","first-page":"2242","DOI":"10.1109\/COMST.2015.2457491","article-title":"Botnet in DDoS attacks: Trends and challenges","volume":"17","author":"Hoque","year":"2015","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","article-title":"DDoS attacks and defense mechanisms: Classification and state-of-the-art","volume":"44","author":"Douligeris","year":"2004","journal-title":"Comput. Netw."},{"key":"ref25","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1126\/science.aaa8415","article-title":"Machine learning: Trends, perspectives, and prospects","volume":"349","author":"Jordan","year":"2015","journal-title":"Science"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-18305-3","author":"El Naqa","year":"2015","journal-title":"Machine Learning in Radiation Oncology"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/B978-0-12-820125-1.00017-8","author":"Morales","year":"2022","journal-title":"Biosignal Processing and Classification Using Computational Learning and Intelligence"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1109\/TKDE.2004.29","article-title":"Multistrategy ensemble learning: Reducing error by combining ensemble learning techniques","volume":"16","author":"Webb","year":"2004","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref29","first-page":"312","author":"Brown","year":"2010","journal-title":"Encyclopedia of Machine Learning"},{"key":"ref30","article-title":"SDN-defend: A lightweight online attack detection and mitigation system for DDoS attacks in SDN","volume":"22","author":"Wang","year":"2022","journal-title":"Sensors"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.3390\/app112411634","article-title":"Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection","volume":"11","author":"Alghazzawi","year":"2021","journal-title":"Appl. Sci."},{"key":"ref32","first-page":"250","article-title":"Evaluating the impact of feature selection methods on the performance of the machine learning models in detecting DDoS attacks","volume":"23","author":"Bindra","year":"2020","journal-title":"Sci. Technol."},{"key":"ref33","first-page":"305","article-title":"Impact of feature selection methods on machine learning-based detection of DDoS attacks: A literature review","volume":"5","author":"Faiz","year":"2022","journal-title":"J. Inf. Telecommun. Eng."},{"key":"ref34","series-title":"presented at the 2018 IEEE 16th Int. Conf. Dependable, Autonomic and Secure Comput. (DASC\/PiCom\/DataCom\/CyberSciTech)","first-page":"173","article-title":"Feature selection for machine learning-based early detection of distributed cyber-attacks","author":"Feng","year":"Nov. 10\u201313, 2018"},{"key":"ref35","series-title":"presented at the 2020 Int. Conf. Emerg. Smart Comput. Inf. (ESCI)","first-page":"234","article-title":"Machine learning-based DDoS detection","author":"Priya","year":"Mar. 12\u201314, 2020"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"1361","DOI":"10.1109\/TKDE.2008.234","article-title":"A novel Bayes model: Hidden naive Bayes","volume":"21","author":"Jiang","year":"2008","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"ref37","doi-asserted-by":"crossref","DOI":"10.4249\/scholarpedia.1883","article-title":"K-nearest neighbor","volume":"4","author":"Peterson","year":"2009","journal-title":"Scholarpedia"},{"key":"ref38","first-page":"165","author":"Steinbach","year":"2009","journal-title":"the Top Ten Algorithms in Data Mining"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/978-1-4899-7641-3_9","author":"Suthaharan","year":"2016","journal-title":"Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.3390\/su12031035","article-title":"Detecting DDoS attacks in software-defined networks through feature selection methods and machine learning models","volume":"12","author":"Polat","year":"2020","journal-title":"Sustainability"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.3390\/app13179937","article-title":"A lightweight model for DDoS attack detection using machine learning techniques","volume":"13","author":"Sadhwani","year":"2023","journal-title":"Appl. Sci."},{"key":"ref42","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1007\/s42979-021-00585-w","article-title":"Using ensemble learning technique for detecting botnet on IoT","volume":"2","author":"Rezaei","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref43","doi-asserted-by":"crossref","first-page":"1717","DOI":"10.1109\/JSYST.2020.2992966","article-title":"A comprehensive survey of databases and deep learning methods for cybersecurity and intrusion detection systems","volume":"15","author":"G\u00fcm\u00fc\u015fba\u015f","year":"2020","journal-title":"IEEE Syst. J."},{"key":"ref44","series-title":"Int. Conf. Vis. Towards Emerg. Trends Commun. Netw. (ViTECoN)","first-page":"1","article-title":"Design of ensemble learning methods for DDoS detection in SDN environment","author":"Deepa","year":"Mar. 30\u201331, 2019"},{"key":"ref45","unstructured":"A. R. Gawande, \u201cDDoS detection and mitigation using machine learning,\u201d Ph.D. dissertation, Rutgers Univ.-Camden Graduate School, Camden, NJ, USA, 2018."},{"key":"ref46","series-title":"Proc. Recent Stud. Computat. Intell.: Doctoral Symp. Computat. Intell. (DoSCI 2020)","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-981-15-8469-5_5","article-title":"DDoS detection using machine learning technique","author":"Pande","year":"2021"},{"key":"ref47","first-page":"771","article-title":"DDoS detection in SDN using machine learning techniques","volume":"71","author":"Nadeem","year":"2022","journal-title":"Comput. Mater. Contin."},{"key":"ref48","unstructured":"Y. Yang, I. G. Morillo, and T. M. Hospedales, \u201cDeep neural decision trees,\u201d 2018, arXiv:1806.06988."},{"key":"ref49","doi-asserted-by":"crossref","first-page":"20","DOI":"10.38094\/jastt20165","article-title":"Classification based on decision tree algorithm for machine learning","volume":"2","author":"Charbuty","year":"2021","journal-title":"J. Appl. Sci. Technol. Trends"},{"key":"ref50","unstructured":"T. Q. Chen et al., \u201cxgboost: Extreme gradient boosting,\u201d R package version 0.71. 2, 2018."},{"key":"ref51","doi-asserted-by":"crossref","first-page":"31","DOI":"10.17849\/insm-47-01-31-39.1","article-title":"Random forest","volume":"47","author":"Rigatti","year":"2017","journal-title":"J. Insur. Med."}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-2\/TSP_CMC_57185\/TSP_CMC_57185.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T04:22:08Z","timestamp":1741321328000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n2\/58672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":51,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.057185","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-08-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-08","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-18","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}