{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:30:47Z","timestamp":1763343047554,"version":"3.45.0"},"reference-count":47,"publisher":"Tech Science Press","issue":"3","license":[{"start":{"date-parts":[[2025,5,25]],"date-time":"2025-05-25T00:00:00Z","timestamp":1748131200000},"content-version":"vor","delay-in-days":144,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.063139","type":"journal-article","created":{"date-parts":[[2025,4,27]],"date-time":"2025-04-27T04:07:37Z","timestamp":1745726857000},"page":"4515-4535","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Detecting and Mitigating Distributed Denial of Service Attacks in Software-Defined Networking"],"prefix":"10.32604","volume":"83","author":[{"given":"Abdullah M.","family":"Alnajim","sequence":"first","affiliation":[]},{"given":"Faisal Mohammed","family":"Alotaibi","sequence":"additional","affiliation":[]},{"given":"Sheroz","family":"Khan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1109\/COMST.2022.3198273","article-title":"Digital twin of wireless systems: overview, taxonomy, challenges, and opportunities","volume":"24","author":"Khan","year":"2022","journal-title":"IEEE Communicat Surv Tutor"},{"journal-title":"Software defined networks: a comprehensive approach","year":"2016","author":"Goransson","key":"ref2"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"4926","DOI":"10.3390\/s22134926","article-title":"Enhanced anomaly detection system for iot based on improved dynamic SBPSO","volume":"22","author":"Sarwar","year":"2022","journal-title":"Sensors"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1201\/b20614","author":"Bhattacharyya","year":"2016","journal-title":"DDoS attacks: evolution, detection, prevention, reaction, and tolerance"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3769","DOI":"10.1109\/COMST.2019.2934468","article-title":"Defense mechanisms against DDoS attacks in a cloud computing environment: state-of-the-art and research challenges","volume":"21","author":"Agrawal","year":"2019","journal-title":"IEEE Commun Surv Tutor"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2843","DOI":"10.1109\/TNET.2018.2874896","article-title":"Delving into internet DDoS attacks by botnets: characterization and analysis","volume":"26","author":"Wang","year":"2018","journal-title":"IEEE\/ACM Transact Network"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"5551","DOI":"10.3390\/s22155551","article-title":"Software-defined networking: categories, analysis, and future directions","volume":"22","author":"Hussain","year":"2022","journal-title":"Sensors"},{"key":"ref8","series-title":"2017 9th International Conference on Communication Systems and Networks (COMSNETS)","first-page":"274","article-title":"Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN","author":"Dayal","year":"2017"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"21789","DOI":"10.1038\/s41598-024-72049-z","article-title":"A novel intrusion detection framework for optimizing IoT security","volume":"14","author":"Qaddos","year":"2024","journal-title":"Sci Rep"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"143985","DOI":"10.1109\/ACCESS.2020.3013998","article-title":"Detection techniques of distributed denial of service attacks on software-defined networking controller\u2014a review","volume":"8","author":"Aladaileh","year":"2020","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/COMST.2016.2618874","article-title":"Software defined networking architecture, security and energy efficiency: a survey","volume":"19","author":"Rawat","year":"2016","journal-title":"IEEE Communicat Surv Tutor"},{"journal-title":"Principles and practices for securing software-defined networks","year":"2015","author":"Tr","key":"ref12"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"2593672","DOI":"10.1155\/2022\/2593672","article-title":"[Retracted] lightweight statistical approach towards TCP SYN Flood DDoS attack detection and mitigation in SDN environment","volume":"2022","author":"Batool","year":"2022","journal-title":"Secur Commun Netw"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"122495","DOI":"10.1109\/ACCESS.2021.3109490","article-title":"Detection and classification of DDoS flooding attacks on software-defined networks: a case study for the application of machine learning","volume":"9","author":"Sangodoyin","year":"2021","journal-title":"IEEE Access"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"3533","DOI":"10.1007\/s13369-023-08075-2","article-title":"A comprehensive analysis of machine learning-and deep learning-based solutions for DDoS attack detection in SDN","volume":"49","author":"Aslam","year":"2024","journal-title":"Arab J Sci Eng"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/j.future.2021.03.011","article-title":"DoS and DDoS attacks in software defined networks: a survey of existing solutions and research challenges","volume":"122","author":"Eliyan","year":"2021","journal-title":"Future Gener Comput Syst"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"643","DOI":"10.1016\/j.comnet.2003.10.003","article-title":"DDoS attacks and defense mechanisms: classification and state-of-the-art","volume":"44","author":"Douligeris","year":"2004","journal-title":"Comput Netw"},{"journal-title":"Future internet (FI) and innovative internet technologies and mobile communications (IITM)","year":"[cited 2025 Jan 1]","author":"Carle","key":"ref18"},{"key":"ref19","series-title":"2015 International Conference on Computing, Networking and Communications (ICNC)","first-page":"77","article-title":"Early detection of DDoS attacks against SDN controllers","author":"Mousavi","year":"2022"},{"key":"ref20","first-page":"245","volume":"4868","author":"Keromytis","year":"2002","journal-title":"Scalability and traffic control in IP networks II"},{"key":"ref21","series-title":"Proceedings. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies","first-page":"1530","article-title":"Detecting SYN flooding attacks","author":"Wang","year":"2002"},{"key":"ref22","series-title":"IEEE International Symposium on Communications and Information Technology 2004 (ISCIT 2004)","first-page":"605","article-title":"Distributed denial of service detection using TCP\/IP header and traffic measurement analysis","author":"Limwiwatkul","year":"2004"},{"key":"ref23","series-title":"2020 30th International Telecommunication Networks and Applications Conference (ITNAC)","first-page":"1","article-title":"Constraint-based rerouting mechanism to address congestion in software defined networks","author":"Chemalamarri","year":"2020"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.5121\/ijmnct.2014.4404","article-title":"Network simulators for next generation networks: an overview","volume":"4","author":"Monika, Kaushik","year":"2014","journal-title":"Int J Mob Netw Commun Telemat"},{"key":"ref25","first-page":"2164","article-title":"Timely detection and mitigation of stealthy DDoS attacks via IoT networks","volume":"18","author":"Doshi","year":"2021","journal-title":"IEEE Transact Depend Secure Comput"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"2697","DOI":"10.3390\/s22072697","article-title":"Adaptive machine learning based distributed denial-of-services attacks detection and mitigation system for SDN-enabled IoT","volume":"22","author":"Aslam","year":"2022","journal-title":"Sensors"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"107346","DOI":"10.1109\/ACCESS.2019.2932422","article-title":"Toward adaptive and scalable OpenFlow-SDN flow control: a survey","volume":"7","author":"Alsaeedi","year":"2019","journal-title":"IEEE Access"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"2715","DOI":"10.3390\/electronics11172715","article-title":"A comparative study of software defined networking controllers using mininet","volume":"11","author":"Gupta","year":"2022","journal-title":"Electronics"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"988","DOI":"10.9717\/kmms.2014.17.8.988","article-title":"Utilizing OpenFlow and sFlow to detect and mitigate SYN flooding attack","volume":"17","author":"Nugraha","year":"2014","journal-title":"J Korea Multimedia Soc"},{"key":"ref30","series-title":"Proceedings of the 2016 Joint International Conference on Economics and Management Engineering (ICEME 2016) and International Conference on Economics and Business Management (EBM 2016)","article-title":"Implementation of an SDN-based security defense mechanism against DDoS attacks","author":"Lin","year":"2016"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"100279","DOI":"10.1016\/j.cosrev.2020.100279","article-title":"Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions","volume":"37","author":"Singh","year":"2020","journal-title":"Comput Sci Rev"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"34699","DOI":"10.1109\/ACCESS.2019.2895092","article-title":"Safe-guard scheme for protecting control plane against DDoS attacks in software-defined networking","volume":"7","author":"Wang","year":"2019","journal-title":"IEEE Access"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1049\/cit2.12003","article-title":"SDN-based intrusion detection system for IoT using deep learning classifier (IDSIoT- SDL)","volume":"6","author":"Wani","year":"2021","journal-title":"CAAI Transact Intell Technol"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"69680","DOI":"10.1109\/ACCESS.2021.3078065","article-title":"An efficient IDS framework for DDoS attacks in SDN environment","volume":"9","author":"Varghese","year":"2021","journal-title":"IEEE Access"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","article-title":"A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks","volume":"8","author":"Haider","year":"2020","journal-title":"IEEE Access"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"80813","DOI":"10.1109\/ACCESS.2019.2922196","article-title":"A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments","volume":"7","author":"Dong","year":"2019","journal-title":"IEEE Access"},{"key":"ref37","series-title":"2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN)","first-page":"63","article-title":"A SDN-oriented DDoS blocking scheme for botnet-based attacks","author":"Lim","year":"2014"},{"key":"ref38","series-title":"2016 International IEEE Conferences on Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld)","first-page":"350","article-title":"novel hybrid flow-based handler with DDoS attacks in software-defined networking","author":"Phan","year":"2016"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"109246","DOI":"10.1016\/j.comnet.2022.109246","article-title":"Satellite-based communications security: a survey of threats, solutions, and research challenges","volume":"216","author":"Tedeschi","year":"2022","journal-title":"Comput Netw"},{"key":"ref40","series-title":"2016 IEEE Global Communications Conference (globecom)","first-page":"1","article-title":"Self-organized SDN controller cluster conformations against DDoS attacks effects","author":"Macedo","year":"2016"},{"key":"ref41","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1049\/el.2016.2234","article-title":"Effective software-defined networking controller scheduling method to mitigate DDoS attacks","volume":"53","author":"Yan","year":"2017","journal-title":"Electr Letters"},{"key":"ref42","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1109\/MNET.2016.1600109NM","article-title":"On denial of service attacks in software defined networks","volume":"30","author":"Zhang","year":"2016","journal-title":"IEEE Network"},{"key":"ref43","series-title":"IEEE INFOCOM 2016-the 35th Annual IEEE International Conference on Computer Communications","first-page":"1","article-title":"DDoS attack detection under SDN context","author":"Xu","year":"2016"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"102069","DOI":"10.1016\/j.jksuci.2024.102069","article-title":"A look into smart factory for Industrial IoT driven by SDN technology: a comprehensive survey of taxonomy, architectures, issues and future research orientations","volume":"36","author":"Josbert","year":"2024","journal-title":"J King Saud Univ-Comput Inf Sci"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"42163","DOI":"10.1109\/ACCESS.2024.3378271","article-title":"Exploring traffic patterns through network programmability: introducing sdnflow, a comprehensive openflow-based statistics dataset for attack detection","volume":"12","author":"Buzzio-Garc\u00eda","year":"2024","journal-title":"IEEE Access"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.aej.2024.07.049","article-title":"Reinforcement learning-based computation offloading in edge computing: principles, methods, challenges","volume":"108","author":"Luo","year":"2024","journal-title":"Alex Eng J"},{"key":"ref47","first-page":"2511","article-title":"Security and privacy challenges in SDN-enabled IoT systems: causes, proposed solutions, and future directions","volume":"80","author":"Rahdari","year":"2024","journal-title":"Comput Mater Contin"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-83-3\/TSP_CMC_63139\/TSP_CMC_63139.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:28:12Z","timestamp":1763342892000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v83n3\/61033"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":47,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.063139","relation":{},"ISSN":["1546-2226"],"issn-type":[{"type":"electronic","value":"1546-2226"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"2025-01-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-05-19","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}