{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:35:45Z","timestamp":1767969345449,"version":"3.49.0"},"reference-count":46,"publisher":"Tech Science Press","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.065850","type":"journal-article","created":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T08:51:16Z","timestamp":1758099076000},"page":"4043-4066","source":"Crossref","is-referenced-by-count":2,"title":["SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs"],"prefix":"10.32604","volume":"85","author":[{"given":"Mohammad Nowsin Amin","family":"Sheikh","sequence":"first","affiliation":[]},{"given":"Muhammad Saibtain","family":"Raza","sequence":"additional","affiliation":[]},{"given":"I-Shyan","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Md. Alamgir","family":"Hossain","sequence":"additional","affiliation":[]},{"given":"Ihsan","family":"Ullah","sequence":"additional","affiliation":[]},{"given":"Tahmid","family":"Hasan","sequence":"additional","affiliation":[]},{"given":"Mohammad Syuhaimi","family":"Ab-Rahman","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1016\/j.comcom.2020.05.020","article-title":"Green communication in IoT networks using a hybrid optimization algorithm","volume":"159","author":"Maddikunta","year":"2020","journal-title":"Comput Commun"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"9822","DOI":"10.3390\/app13179822","article-title":"A secure and intelligent software-defined networking framework for future smart cities to prevent DDoS attack","volume":"13","author":"Alshahrani","year":"2023","journal-title":"Appl Sci"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"3625","DOI":"10.3390\/s20133625","article-title":"A survey of IoT security based on a layered architecture of sensing and data analysis","volume":"20","author":"Mrabet","year":"2020","journal-title":"Sensors"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"32","DOI":"10.3390\/computers12020032","article-title":"Explainable AI-based DDOS attack identification method for IoT networks","volume":"12","author":"Kalutharage","year":"2023","journal-title":"Computers"},{"key":"ref5","unstructured":"Statista. Number of Internet of Things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2033 [Internet]. 2024 [cited 2024 Jun 28]. Available from: https:\/\/www.statista.com\/statistics\/1183457\/iot-connected-devices-worldwide."},{"key":"ref6","unstructured":"Cisco. Cisco Annual Internet Report (2018\u20132023) [Internet]. White Paper; 2024 [cited 2024 Feb 10]. Available from: https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/executive-perspectives\/annual-internet-report\/white-paper-c11-741490.html."},{"key":"ref7","unstructured":"Maximize Market Research. Distributed Denial of Service (DDoS) Protection and Mitigation Market\u2013Global Industry Analysis and Forecast (2023-2029) [Internet]. 2024 [cited 2024 Feb 15]. Available from: https:\/\/www.maximizemarketresearch.com\/market-report\/global-distributed-denial-of-service-ddos-protection-and-mitigation-market\/33007."},{"key":"ref8","doi-asserted-by":"crossref","first-page":"85","DOI":"10.3390\/computers13040085","article-title":"A qualitative and comparative performance assessment of logically centralized SDN controllers via mininet emulator","volume":"13","author":"Sheikh","year":"2024","journal-title":"Computers"},{"key":"ref9","series-title":"30th Wireless and Optical Communications Conference (WOCC); 2021 Apr","first-page":"24","article-title":"Performance assessment for different SDN-Based Controllers","author":"Sheikh"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"70850","DOI":"10.1109\/ACCESS.2022.3188311","article-title":"Towards software-defined networking-based IoT frameworks: a systematic literature review, taxonomy, open challenges and prospects","volume":"10","author":"Siddiqui","year":"2022","journal-title":"IEEE Access"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2022.11.007","article-title":"Towards SDN-based smart contract solution for IoT access control","volume":"198","author":"Khalid","year":"2023","journal-title":"Comput Commun"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"3078","DOI":"10.3390\/s20113078","article-title":"A taxonomy of DDoS attack mitigation approaches featured by SDN technologies in IoT scenarios","volume":"20","author":"Dantas Silva","year":"2020","journal-title":"Sensors"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"5941","DOI":"10.3390\/s23135941","article-title":"CICIoT2023: a real-time dataset and benchmark for large-scale attacks in IoT environment","volume":"23","author":"Neto","year":"2023","journal-title":"Sensors"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"103108","DOI":"10.1016\/j.jnca.2021.103108","article-title":"Automated DDoS attack detection in software defined networking","volume":"187","author":"Ahuja","year":"2021","journal-title":"J Netw Comput Appl"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"108034","DOI":"10.1016\/j.compeleceng.2022.108034","article-title":"DDoS attack detection in Internet of Things using recurrent neural network","volume":"101","author":"Yousuf","year":"2022","journal-title":"Comput Elect Eng"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","article-title":"Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture","volume":"7","author":"Ravi","year":"2020","journal-title":"IEEE Internet Things J"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"24694","DOI":"10.1109\/ACCESS.2018.2831284","article-title":"A DDoS attack detection and mitigation with software-defined Internet of Things framework","volume":"6","author":"Yin","year":"2018","journal-title":"IEEE Access"},{"key":"ref18","series-title":"Proceedings of the IEEE Symposium on Computers and Communication (ISCC); 2016 Jun 27\u201330","first-page":"435","article-title":"SPF: an SDN-based middleware solution to mitigate the IoT information explosion","author":"Tortonesi","year":"2016"},{"key":"ref19","series-title":"Proceedings of the IEEE International Conference on Computer and Information Technology (CIT); 2017 Aug 21\u201323","first-page":"308","article-title":"Software-defined edge defense against IoT-based DDoS","author":"\u00d6z\u00e7elik","year":"2017"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2018.03.008","article-title":"OpCloudSec: open cloud software defined wireless network security for the Internet of Things","volume":"122","author":"Sharma","year":"2018","journal-title":"Comput Commun"},{"key":"ref21","series-title":"Proceedings of the 11th International Conference on Availability, Reliability and Security (ARES); 2016 Aug 31\u2013Sep 2","first-page":"147","article-title":"A host-based intrusion detection and mitigation framework for smart home IoT using OpenFlow","author":"Nobakht","year":"2016"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"3431","DOI":"10.1109\/ACCESS.2017.2666270","article-title":"Defending against new-flow attack in SDN-based internet of things","volume":"5","author":"Xu","year":"2017","journal-title":"IEEE Access"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","article-title":"SeArch: a collaborative and intelligent NIDS architecture for SDN-based cloud IoT networks","volume":"7","author":"Nguyen","year":"2019","journal-title":"IEEE Access"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/j.jnca.2019.06.019","article-title":"BlockSecIoTNet: blockchain-based decentralized security architecture for IoT network","volume":"143","author":"Rathore","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref25","series-title":"Collaborative Computing: Networking, Applications and Worksharing: 15th EAI International Conference, CollaborateCom 2019; 2019 Aug 19\u201322","first-page":"71","article-title":"A security framework to protect edge supported software defined internet of things infrastructure","author":"Rafique"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.comcom.2019.09.014","article-title":"VARMAN: multi-plane security framework for software defined networks","volume":"148","author":"Krishnan","year":"2019","journal-title":"Comput Commun"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"102381","DOI":"10.1016\/j.jnca.2019.06.001","article-title":"SEAL: SDN based secure and agile framework for protecting smart city applications from DDoS attacks","volume":"145","author":"Bawany","year":"2019","journal-title":"J Netw Comput Appl"},{"key":"ref28","first-page":"2778","article-title":"Distributed denial-of-service detection and mitigation using software-defined network and internet of things","volume":"11","author":"Nair","year":"2019","journal-title":"J Adv Res Dyn Control Syst"},{"key":"ref29","series-title":"IEEE Global Communications Conference (GLOBECOM)","first-page":"1","article-title":"Co-IoT: a collaborative DDoS mitigation scheme in IoT environment based on blockchain using SDN","author":"Houda","year":"2019 Dec 9\u201313"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"816","DOI":"10.3390\/s20030816","article-title":"Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN: an experimental approach","volume":"20","author":"Galeano-Brajones","year":"2020","journal-title":"Sensors"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"106503","DOI":"10.1016\/j.compeleceng.2019.106503","article-title":"A DDoS attacks traceback scheme for SDN-based smart city","volume":"81","author":"Chen","year":"2020","journal-title":"Comput Elect Eng"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"28","DOI":"10.55056\/jec.648","article-title":"A long short-term memory based approach for detecting cyber-attacks in IoT using CIC-IoT2023 dataset","volume":"3","author":"Jony","year":"2024","journal-title":"J Edge Comput"},{"key":"ref33","doi-asserted-by":"crossref","unstructured":"Gheni HQ, Al-Yaseen WL. Two-step data clustering for improved intrusion detection system using CIC-IoT2023 dataset. 2024. doi:10.2139\/ssrn.4762201.","DOI":"10.2139\/ssrn.4762201"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"4953","DOI":"10.3390\/app13084953","article-title":"Distributed blockchain-SDN secure IoT system based on ANN to mitigate DDoS attacks","volume":"13","author":"Jmal","year":"2023","journal-title":"Appl Sci"},{"key":"ref35","doi-asserted-by":"crossref","first-page":"333","DOI":"10.3390\/telecom5020017","article-title":"Feature-selection-based DDoS attack detection using AI algorithms","volume":"5","author":"Raza","year":"2024","journal-title":"Telecom"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.ins.2019.07.070","article-title":"A comprehensive analysis of synthetic minority oversampling technique (SMOTE) for handling class imbalance","volume":"505","author":"Elreedy","year":"2019","journal-title":"Inf Sci"},{"key":"ref37","doi-asserted-by":"crossref","first-page":"e1793","DOI":"10.7717\/peerj-cs.1793","article-title":"Evaluating deep learning variants for cyber-attacks detection and multi-class classification in IoT networks","volume":"10","author":"Abbas","year":"2024","journal-title":"PeerJ Comput Sci"},{"key":"ref38","series-title":"IEEE Biennial Congress of Argentina (ARGENCON); 2016","article-title":"An analysis of Recurrent Neural Networks for Botnet detection behavior","author":"Torres"},{"key":"ref39","doi-asserted-by":"crossref","first-page":"1755","DOI":"10.5194\/nhess-23-1755-2023","article-title":"Reduced-order digital twin and latent data assimilation for global wildfire prediction","volume":"5","author":"Zhong","year":"2023","journal-title":"Natural Hazards Earth Syst Sci"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"117201","DOI":"10.1016\/j.cma.2024.117201","article-title":"Multi-domain encoder\u2013decoder neural networks for latent data assimilation in dynamical systems","volume":"430","author":"Cheng","year":"2024","journal-title":"Comput Methods Appl Mech Eng"},{"key":"ref41","unstructured":"Keras. GitHub [Internet]. 2024 [cited 2024 Apr 10]. Available from: https:\/\/github.com\/keras-team\/keras."},{"key":"ref42","series-title":"IEEE 7th Conference on Information and Communication Technology (CICT); 2023","first-page":"1","article-title":"IIDS: design of intelligent intrusion detection system for Internet-of-Things applications","author":"Narayan"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"5872","DOI":"10.1038\/s41598-024-56126-x","article-title":"Anomaly detection in IoT-based healthcare: machine learning for enhanced security","volume":"14","author":"Khan","year":"2024","journal-title":"Sci Rep"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"04011","DOI":"10.1051\/itmconf\/20245904011","article-title":"Investigation of the impact effectiveness of adversarial data leakage attacks on the machine learning models","volume":"59","author":"Parfenov","year":"2024","journal-title":"ITM Web Conf"},{"key":"ref45","doi-asserted-by":"crossref","first-page":"e1569","DOI":"10.7717\/peerj-cs.1569","article-title":"A lightweight intrusion detection method for IoT based on deep learning and dynamic quantization","volume":"9","author":"Wang","year":"2023","journal-title":"PeerJ Comput Sci"},{"key":"ref46","doi-asserted-by":"crossref","unstructured":"Sahin O, Uludag S. Advancing intrusion detection efficiency: a \u2018Less is More\u2019 approach via feature selection. doi: 10.21203\/rs.3.rs-3398752\/v1.","DOI":"10.21203\/rs.3.rs-3398752\/v1"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-85-2\/TSP_CMC_65850\/TSP_CMC_65850.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T05:35:50Z","timestamp":1764826550000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v85n2\/63789"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":46,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.065850","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}