{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T06:46:56Z","timestamp":1764226016058,"version":"3.45.0"},"reference-count":29,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.062189","type":"journal-article","created":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T04:47:56Z","timestamp":1742359676000},"page":"4495-4513","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":1,"title":["Metaheuristic-Driven Abnormal Traffic Detection Model for SDN Based on Improved Tyrannosaurus Optimization Algorithm"],"prefix":"10.32604","volume":"83","author":[{"given":"Hui","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jiahui","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhonghao","family":"Hu","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"3084","DOI":"10.11591\/ijece.v8i5.pp3084-3091","article-title":"Load balance in data center SDN networks","volume":"8","author":"Emad Ali","year":"2018","journal-title":"Int J Electr Comput Eng (IJECE)"},{"key":"ref2","series-title":"2013 IEEE SDN for Future Networks and Services (SDN4FNS)","article-title":"Sdn security: a survey","author":"Scott-Hayward","year":"2013 Nov 11\u201313"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","article-title":"Software-defined networking: a comprehensive survey","volume":"103","author":"Kreutz","year":"2015","journal-title":"Proc IEEE"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2602204.2602219","article-title":"The road to SDN: an intellectual history of programmable networks","volume":"44","author":"Feamster","year":"2014","journal-title":"ACM Sigcomm Comp Com"},{"key":"ref5","first-page":"3655","article-title":"Machine learning enabled novel real-time IoT targeted DoS\/DDoS cyber attack detection system","volume":"80","author":"Alabdulatif","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"107716","DOI":"10.1016\/j.compeleceng.2022.107716","article-title":"Denial of service attack detection and mitigation for Internet of Things using looking-back-enabled machine learning techniques","volume":"98","author":"Mihoub","year":"2022","journal-title":"Comput Electr Eng"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"42236","DOI":"10.1109\/ACCESS.2021.3062909","article-title":"Machine learning approaches for combating distributed denial of service attacks in modern networking environments","volume":"9","author":"Aljuhani","year":"2021","journal-title":"IEEE Access"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"494","DOI":"10.3390\/electronics11030494","article-title":"Threat analysis and distributed denial of service (DDoS) attack recognition in the Internet of Things (IoT)","volume":"11","author":"Ali","year":"2022","journal-title":"Electronics"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"153515","DOI":"10.4108\/eai.28-12-2017.153515","article-title":"A deep learning based DDoS detection system in software-defined networking (SDN)","volume":"4","author":"Niyaz","year":"2017","journal-title":"ICST Trans Secur Saf"},{"key":"ref10","series-title":"2016 International Conference on Wireless Networks and Mobile Communications (WINCOM)","article-title":"Deep learning approach for network intrusion detection in software defined networking","author":"Tang","year":"Oct 26\u201329"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/j.comcom.2023.12.041","article-title":"Abnormal traffic detection system in SDN based on deep learning hybrid models","volume":"216","author":"Wang","year":"2024","journal-title":"Comput Commun"},{"key":"ref12","series-title":"2022 the 7th International Conference on Information and Education Innovations (ICIEI)","article-title":"Network anomaly detection with machine learning techniques for SDN networks","author":"Arevalo-Herrera","year":"2022 Apr 14\u201316"},{"key":"ref13","series-title":"Proceedings of the 43rd Annual Southeast Regional Conference\u2014Volume 2","article-title":"Decision tree classifier for network intrusion detection with GA-based feature selection","author":"Stein","year":"2005 Mar 19\u201320"},{"journal-title":"Lecture notes in computer science","year":"2007","author":"Zainal","key":"ref14"},{"key":"ref15","unstructured":"Mojtahedi A, Sorouri F, Souha AN, Molazadeh A, Mehr SS. Feature selection-based intrusion detection system using genetic whale optimization algorithm and sample-based classification. arXiv:2201.00584. 2022."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.1016\/j.asoc.2012.05.004","article-title":"An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection","volume":"12","author":"Lin","year":"2012","journal-title":"Appl Soft Comput"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"3531","DOI":"10.3390\/electronics11213531","article-title":"Application of improved butterfly optimization algorithm combined with black widow optimization in feature selection of network intrusion detection","volume":"11","author":"Xu","year":"2022","journal-title":"Electronics"},{"key":"ref18","first-page":"3239","article-title":"An improved jump spider optimization for network traffic identification feature selection","volume":"76","author":"Xu","year":"2023","journal-title":"Comput Mater Contin"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"1520","DOI":"10.3390\/sym15081520","article-title":"A multi-controller placement strategy for hierarchical management of software-defined networking","volume":"15","author":"Xu","year":"2023","journal-title":"Symmetry"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1770","DOI":"10.3934\/era.2024081","article-title":"Modified artificial rabbits optimization combined with bottlenose dolphin optimizer in feature selection of network intrusion detection","volume":"32","author":"Li","year":"2024","journal-title":"Electron Res Arch"},{"key":"ref21","first-page":"4091","article-title":"Applying an improved dung beetle optimizer algorithm to network traffic identification","volume":"78","author":"Wu","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/j.patrec.2008.11.012","article-title":"Different metaheuristic strategies to solve the feature selection problem","volume":"30","author":"Yusta","year":"2009","journal-title":"Pattern Recognit Lett"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1109\/59.317674","article-title":"Reactive power optimization by genetic algorithm","volume":"9","author":"Iba","year":"1994","journal-title":"IEEE Trans Power Syst"},{"key":"ref24","first-page":"2721","article-title":"Magnificent frigatebird optimization: a new bio-inspired metaheuristic approach for solving optimization problems","volume":"80","author":"Hamadneh","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"100243","DOI":"10.1016\/j.prime.2023.100243","volume":"5","author":"Sahu","year":"2023","journal-title":"e-Prime\u2014Adv Electr Eng Electron Energy"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1016\/j.apm.2024.06.018","article-title":"Optimization of vibration and sound insulation in GPLRC honeycomb structures based on circle chaos mapping and Levy flight-enhanced YDSE with constraints","volume":"134","author":"Yuan","year":"2024","journal-title":"Appl Math Model"},{"key":"ref27","first-page":"4546","article-title":"Identification of the continuous-time Hammerstein models with sparse measurement data using improved marine predators algorithm","volume":"358","author":"Tumari","year":"2024","journal-title":"Arab J Sci Eng"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"1666","DOI":"10.1177\/14613484231183938","article-title":"An improved marine predators algorithm tuned data-driven multiple-node hormone regulation neuroendocrine-PID controller for multi-input-multi-output gantry crane system","volume":"42","author":"Mohd Tumari","year":"2023","journal-title":"J Low Freq Noise Vib Act Contr"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"11137","DOI":"10.1007\/s00521-024-09648-4","article-title":"Enhanced prairie dog optimization with Levy flight and dynamic opposition-based learning for global optimization and engineering design problems","volume":"36","author":"Biswas","year":"2024","journal-title":"Neural Comput Appl"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_62189\/TSP_CMC_62189.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:29:20Z","timestamp":1763342960000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":29,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.062189","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2024-12-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-02-19","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}