{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T06:58:52Z","timestamp":1772780332833,"version":"3.50.1"},"reference-count":128,"publisher":"MDPI AG","issue":"24","license":[{"start":{"date-parts":[[2022,12,14]],"date-time":"2022-12-14T00:00:00Z","timestamp":1670976000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>The orchestration of software-defined networks (SDN) and the internet of things (IoT) has revolutionized the computing fields. These include the broad spectrum of connectivity to sensors and electronic appliances beyond standard computing devices. However, these networks are still vulnerable to botnet attacks such as distributed denial of service, network probing, backdoors, information stealing, and phishing attacks. These attacks can disrupt and sometimes cause irreversible damage to several sectors of the economy. As a result, several machine learning-based solutions have been proposed to improve the real-time detection of botnet attacks in SDN-enabled IoT networks. The aim of this review is to investigate research studies that applied machine learning techniques for deterring botnet attacks in SDN-enabled IoT networks. Initially the first major botnet attacks in SDN-IoT networks have been thoroughly discussed. Secondly a commonly used machine learning techniques for detecting and mitigating botnet attacks in SDN-IoT networks are discussed. Finally, the performance of these machine learning techniques in detecting and mitigating botnet attacks is presented in terms of commonly used machine learning models\u2019 performance metrics. Both classical machine learning (ML) and deep learning (DL) techniques have comparable performance in botnet attack detection. However, the classical ML techniques require extensive feature engineering to achieve optimal features for efficient botnet attack detection. Besides, they fall short of detecting unforeseen botnet attacks. Furthermore, timely detection, real-time monitoring, and adaptability to new types of attacks are still challenging tasks in classical ML techniques. These are mainly because classical machine learning techniques use signatures of the already known malware both in training and after deployment.<\/jats:p>","DOI":"10.3390\/s22249837","type":"journal-article","created":{"date-parts":[[2022,12,15]],"date-time":"2022-12-15T03:43:49Z","timestamp":1671075829000},"page":"9837","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Review of Botnet Attack Detection in SDN-Enabled IoT Using Machine Learning"],"prefix":"10.3390","volume":"22","author":[{"given":"Worku Gachena","family":"Negera","sequence":"first","affiliation":[{"name":"Addis Ababa Institute of Technology, Addis Ababa University, Addis Ababa 445, Ethiopia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5118-0812","authenticated-orcid":false,"given":"Friedhelm","family":"Schwenker","sequence":"additional","affiliation":[{"name":"Institute of Neural Information, University of Ulm, 89069 Ulm, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0876-2021","authenticated-orcid":false,"given":"Taye Girma","family":"Debelee","sequence":"additional","affiliation":[{"name":"Ethiopian Artificial Intelligence Institute, Addis Ababa 40782, Ethiopia"},{"name":"College of Electrical and Computer Engineering, Addis Ababa Science and Technology University, Addis Ababa 16417, Ethiopia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0467-8121","authenticated-orcid":false,"given":"Henock Mulugeta","family":"Melaku","sequence":"additional","affiliation":[{"name":"Addis Ababa Institute of Technology, Addis Ababa University, Addis Ababa 445, Ethiopia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5591-2240","authenticated-orcid":false,"given":"Yehualashet Megeresa","family":"Ayano","sequence":"additional","affiliation":[{"name":"Ethiopian Artificial Intelligence Institute, Addis Ababa 40782, Ethiopia"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1007\/s10796-014-9492-7","article-title":"The internet of things: A survey","volume":"17","author":"Li","year":"2014","journal-title":"Inf. Syst. Front."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Al-Rushdan, H., Shurman, M., Alnabelsi, S.H., and Althebyan, Q. (2019, January 3\u20135). Zero-Day Attack Detection and Prevention in Software-Defined Networks. Proceedings of the International Arab Conference on Information Technology (ACIT), Al Ain, United Arab Emirates.","DOI":"10.1109\/ACIT47987.2019.8991124"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1049\/iet-cps.2019.0103","article-title":"Cyber attacks in smart grid\u2013dynamic impacts, analyses and recommendations","volume":"5","author":"Amin","year":"2020","journal-title":"IET Cyber-Phys. Syst. Theory Appl."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Almudaires, F., and Almaiah, M. (2021, January 14\u201315). Data an Overview of Cybersecurity Threats on Credit Card Companies and Credit Card Risk Mitigation. Proceedings of the International Conference on Information Technology (ICIT), Amman, Jordan.","DOI":"10.1109\/ICIT52682.2021.9491114"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"100218","DOI":"10.1016\/j.iot.2020.100218","article-title":"Security analysis of drones systems: Attacks, limitations, and recommendations","volume":"11","author":"Yaacoub","year":"2020","journal-title":"Internet Things"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1016\/j.jaccpubpol.2018.10.006","article-title":"Trade secrets and cyber security breaches","volume":"37","author":"Ettredge","year":"2018","journal-title":"J. Account. Public Policy"},{"key":"ref_7","unstructured":"Outpost24 Product Managers (2022, February 01). Cyber Security in 2020 and Beyond. Available online: https:\/\/outpost24.com\/blog\/Cyber-Security-in-2020-and-beyond."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Pandey, A.K., Tripathi, A.K., Kapil, G., Singh, V., Khan, M.W., Agrawal, A., Kumar, R., and Khan, R.A. (2020). Trends in Malware Attacks. Advances in Digital Crime, Forensics, and Cyber Terrorism, IGI Global.","DOI":"10.4018\/978-1-7998-1558-7.ch004"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Suresh, P., Daniel, J.V., Parthasarathy, V., and Aswathy, R.H. (2014, January 27\u201329). A state of the art review on the Internet of Things (IoT) history, technology and fields of deployment. Proceedings of the International Conference on Science Engineering and Management Research (ICSEMR), Chennai, India.","DOI":"10.1109\/ICSEMR.2014.7043637"},{"key":"ref_10","unstructured":"International Telecommunication Union (2005). ITU Internet Report 2005: The Internet of Things, Internationa Telecommunication Union. Technical Report."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Alieyan, K., Almomani, A., Abdullah, R., Almutairi, B., and Alauthman, M. (2020). Botnet and Internet of Things (IoTs). Security, Privacy, and Forensics Issues in Big Data, IGI Global.","DOI":"10.4018\/978-1-5225-9742-1.ch013"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"tyz005","DOI":"10.1093\/cybsec\/tyz005","article-title":"What security features and crime prevention advice is communicated in consumer IoT device manuals and support pages?","volume":"5","author":"Blythe","year":"2019","journal-title":"J. Cybersecur."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Malhotra, P., Singh, Y., Anand, P., Bangotra, D.K., Singh, P.K., and Hong, W.C. (2021). Internet of Things: Evolution, Concerns and Security Challenges. Sensors, 21.","DOI":"10.3390\/s21051809"},{"key":"ref_14","unstructured":"Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., and Dagon, D. (2007). Peer-to-Peer Botnets: Overview and Case Study. First Workshop on Hot Topics in Understanding Botnets (HotBots 07), USENIX Association."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Beltr\u00e1n-Garc\u00eda, P., Aguirre-Anaya, E., Escamilla-Ambrosio, P.J., and Acosta-Bermejo, R. (2019). IoT Botnets. Communications in Computer and Information Science, Springer International Publishing.","DOI":"10.1007\/978-3-030-33229-7_21"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Wazzan, M., Algazzawi, D., Bamasaq, O., Albeshri, A., and Cheng, L. (2021). Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research. Appl. Sci., 11.","DOI":"10.3390\/app11125713"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1109\/MPRV.2018.03367731","article-title":"N-BaIoT\u2014Network-Based Detection of IoT Botnet Attacks Using Deep Autoencoders","volume":"17","author":"Meidan","year":"2018","journal-title":"IEEE Pervasive Comput."},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Dange, S., and Chatterjee, M. (2019). IoT Botnet: The Largest Threat to the IoT Network. Advances in Intelligent Systems and Computing, Springer.","DOI":"10.1007\/978-981-15-0132-6_10"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Hussain, M., Shah, N., Amin, R., Alshamrani, S.S., Alotaibi, A., and Raza, S.M. (2022). Software-Defined Networking: Categories, Analysis, and Future Directions. Sensors, 22.","DOI":"10.3390\/s22155551"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"012073","DOI":"10.1088\/1757-899X\/1099\/1\/012073","article-title":"Software Defined Networking: A review on Architecture, Security and Applications","volume":"1099","author":"Gaur","year":"2021","journal-title":"IOP Conf. Ser. Mater. Sci. Eng."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"e4855","DOI":"10.1002\/dac.4855","article-title":"An approach based on Yet Another Next Generation for software-defined networking management","volume":"34","author":"Rendon","year":"2021","journal-title":"Int. J. Commun. Syst."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Shaghaghi, A., Kaafar, M.A., Buyya, R., and Jha, S. (2020). Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. Handbook of Computer Networks and Cyber Security, Springer International Publishing.","DOI":"10.1007\/978-3-030-22277-2_14"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Li, Y., Su, X., Ding, A.Y., Lindgren, A., Liu, X., Prehofer, C., Riekki, J., Rahmani, R., Tarkoma, S., and Hui, P. (2020). Enhancing the Internet of Things with Knowledge-Driven Software-Defined Networking Technology: Future Perspectives. Sensors, 20.","DOI":"10.3390\/s20123459"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"9971705","DOI":"10.1155\/2021\/9971705","article-title":"Software-Defined Networking: An Evolving Network Architecture\u2014Programmability and Security Perspective","volume":"2021","author":"Kaliyamurthy","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Wang, S., Gomez, K., Sithamparanathan, K., Asghar, M.R., Russello, G., and Zanna, P. (2021). Mitigating DDoS Attacks in SDN-Based IoT Networks Leveraging Secure Control and Data Plane Algorithm. Appl. Sci., 11.","DOI":"10.3390\/app11030929"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3011","DOI":"10.1007\/s10586-021-03309-0","article-title":"A novel mechanism to handle address spoofing attacks in SDN based IoT","volume":"24","author":"Aldabbas","year":"2021","journal-title":"Clust. Comput."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Zheng, J., and Namin, A.S. (2018, January 10\u201313). Defending SDN-based IoT Networks Against DDoS Attacks Using Markov Decision Process. Proceedings of the IEEE International Conference on Big Data (Big Data), Seattle, WA, USA.","DOI":"10.1109\/BigData.2018.8622064"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Sarica, A.K., and Angin, P. (2020). Explainable Security in SDN-Based IoT Networks. Sensors, 20.","DOI":"10.3390\/s20247326"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Hamza, A., Gharakheili, H.H., and Sivaraman, V. (2018, January 20). Combining MUD Policies with SDN for IoT Intrusion Detection. Proceedings of the Workshop on IoT Security and Privacy, Budapest, Hungary.","DOI":"10.1145\/3229565.3229571"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Li, Y., Su, X., Riekki, J., Kanter, T., and Rahmani, R. (2016, January 22\u201327). A SDN-based architecture for horizontal Internet of Things services. Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICC.2016.7511053"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"6549","DOI":"10.1109\/JIOT.2020.3043740","article-title":"SDN-Enabled Secure IoT Architecture","volume":"8","author":"Karmakar","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Rebala, G., Ravi, A., and Churiwala, S. (2019). Machine Learning Definition and Basics. An Introduction to Machine Learning, Springer International Publishing.","DOI":"10.1007\/978-3-030-15729-6"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Rebala, G., Ravi, A., and Churiwala, S. (2019). Learning Models. An Introduction to Machine Learning, Springer International Publishing.","DOI":"10.1007\/978-3-030-15729-6"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Dake, D.K., Gadze, J.D., Klogo, G.S., and Nunoo-Mensah, H. (2021). Multi-Agent Reinforcement Learning Framework in SDN-IoT for Transient Load Detection and Prevention. Technologies, 9.","DOI":"10.3390\/technologies9030044"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Megersa, Y., and Alemu, G. (2015, January 14\u201317). Brain tumor detection and segmentation using hybrid intelligent algorithms. Proceedings of the AFRICON 2015, Addis Ababa, Ethiopia.","DOI":"10.1109\/AFRCON.2015.7331938"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Debelee, T.G., Amirian, M., Ibenthal, A., Palm, G., and Schwenker, F. (2018). Classification of Mammograms Using Convolutional Neural Network Based Feature Extraction. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer International Publishing.","DOI":"10.1007\/978-3-319-95153-9_9"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Biratu, E.S., Schwenker, F., Ayano, Y.M., and Debelee, T.G. (2021). A Survey of Brain Tumor Segmentation and Classification Algorithms. J. Imaging, 7.","DOI":"10.3390\/jimaging7090179"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/s12530-019-09310-8","article-title":"Automatic pectoral muscle removal in mammograms","volume":"12","author":"Rahimeto","year":"2019","journal-title":"Evol. Syst."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"131","DOI":"10.4028\/www.scientific.net\/JERA.51.131","article-title":"Detection of Bacterial Wilt on Enset Crop Using Deep Learning Approach","volume":"51","author":"Afework","year":"2020","journal-title":"Int. J. Eng. Res. Afr."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"4967","DOI":"10.1002\/int.22747","article-title":"Coffee disease detection using a robust HSV color-based segmentation and transfer learning for use on smartphones","volume":"37","author":"Waldamichael","year":"2022","journal-title":"Int. J. Intell. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Waldamichael, F.G., Debelee, T.G., Schwenker, F., Ayano, Y.M., and Kebede, S.R. (2022). Machine Learning in Cereal Crops Disease Detection: A Review. Algorithms, 15.","DOI":"10.3390\/a15030075"},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"35365","DOI":"10.1109\/ACCESS.2018.2836950","article-title":"Machine Learning and Deep Learning Methods for Cybersecurity","volume":"6","author":"Xin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"2823","DOI":"10.1007\/s13042-018-00906-1","article-title":"Review: Machine learning techniques applied to cybersecurity","volume":"10","author":"Torres","year":"2019","journal-title":"Int. J. Mach. Learn. Cybern."},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Shaukat, K., Luo, S., Varadharajan, V., Hameed, I.A., Chen, S., Liu, D., and Li, J. (2020). Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity. Energies, 13.","DOI":"10.3390\/en13102509"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","article-title":"A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems","volume":"21","author":"Farris","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Kanagavelu, R., and Aung, K.M.M. (2018). A Survey on SDN Based Security in Internet of Things. Advances in Intelligent Systems and Computing, Springer International Publishing.","DOI":"10.1007\/978-3-030-03405-4_39"},{"key":"ref_47","unstructured":"Pajila, P.J.B., and Julie, E.G. (2019). Detection of DDoS Attack Using SDN in IoT: A Survey. Intelligent Communication Technologies and Virtual Mobile Networks, Springer International Publishing."},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Shinan, K., Alsubhi, K., Alzahrani, A., and Ashraf, M.U. (2021). Machine Learning-Based Botnet Detection in Software-Defined Network: A Systematic Review. Symmetry, 13.","DOI":"10.3390\/sym13050866"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"160391","DOI":"10.1109\/ACCESS.2021.3130714","article-title":"Detecting Internet of Things Bots: A Comparative Study","volume":"9","author":"Stephens","year":"2021","journal-title":"IEEE Access"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"4829","DOI":"10.1109\/JIOT.2018.2846040","article-title":"Securing the Internet of Things in the Age of Machine Learning and Software-Defined Networking","volume":"5","author":"Restuccia","year":"2018","journal-title":"IEEE Internet Things J."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"100371","DOI":"10.1016\/j.cosrev.2021.100371","article-title":"Vulnerability retrospection of security solutions for software-defined Cyber\u2013Physical System against DDoS and IoT-DDoS attacks","volume":"40","author":"Snehi","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"103156","DOI":"10.1016\/j.jnca.2021.103156","article-title":"Towards DDoS detection mechanisms in Software-Defined Networking","volume":"190","author":"Cui","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"100389","DOI":"10.1016\/j.cosrev.2021.100389","article-title":"A systematic review on Deep Learning approaches for IoT security","volume":"40","author":"Aversano","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"103093","DOI":"10.1016\/j.jnca.2021.103093","article-title":"Emerging DDoS attack detection and mitigation strategies in software-defined networks: Taxonomy, challenges and future directions","volume":"187","author":"Valdovinos","year":"2021","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/MWC.001.1900318","article-title":"Software Defined Internet of Things Security: Properties, State of the Art, and Future Research","volume":"27","author":"Mishra","year":"2020","journal-title":"IEEE Wirel. Commun."},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"Wilhelm, T., and Andress, J. (2011). Sabotage. Ninja Hacking, Elsevier.","DOI":"10.1016\/B978-1-59749-588-2.00016-0"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"107678","DOI":"10.1109\/ACCESS.2019.2932438","article-title":"SeArch: A Collaborative and Intelligent NIDS Architecture for SDN-Based Cloud IoT Networks","volume":"7","author":"Nguyen","year":"2019","journal-title":"IEEE Access"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1007\/s41650-018-0022-5","article-title":"Critical Analysis of DDoS\u2014An Emerging Security Threat over IoT Networks","volume":"3","author":"Lohachab","year":"2018","journal-title":"J. Commun. Inf. Netw."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Silva, F.S.D., Silva, E., Neto, E.P., Lemos, M., Neto, A.J.V., and Esposito, F. (2020). A Taxonomy of DDoS Attack Mitigation Approaches Featured by SDN Technologies in IoT Scenarios. Sensors, 20.","DOI":"10.3390\/s20113078"},{"key":"ref_60","unstructured":"Hamza, A., Gharakheili, H.H., and Sivaraman, V. (2020). IoT Network Security: Requirements, Threats, and Countermeasures. arXiv."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Alshamrani, A. (2020, January 5\u20137). Reconnaissance Attack in SDN based Environments. Proceedings of the IEEE 27th International Conference on Telecommunications (ICT), Bali, Indonesia.","DOI":"10.1109\/ICT49546.2020.9239510"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"41757","DOI":"10.1109\/ACCESS.2021.3065123","article-title":"Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey","volume":"9","author":"Mazhar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"e4142","DOI":"10.1002\/ett.4142","article-title":"Internet of Things backdoors: Resource management issues, security challenges, and detection methods","volume":"32","author":"Hashemi","year":"2020","journal-title":"Trans. Emerg. Telecommun. Technol."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/s13635-020-00111-0","article-title":"IoT cyber risk: A holistic analysis of cyber risk assessment frameworks, risk vectors, and risk ranking process","volume":"2020","author":"Kandasamy","year":"2020","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/IJDCF.2021030101","article-title":"Detection of Phishing in Internet of Things Using Machine Learning Approach","volume":"13","author":"Naaz","year":"2021","journal-title":"Int. J. Digit. Crime Forensics"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Abbas, S.G., Vaccari, I., Hussain, F., Zahid, S., Fayyaz, U.U., Shah, G.A., Bakhshi, T., and Cambiaso, E. (2021). Identifying and Mitigating Phishing Attack Threats in IoT Use Cases Using a Threat Modelling Approach. Sensors, 21.","DOI":"10.3390\/s21144816"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"42516","DOI":"10.1109\/ACCESS.2018.2837889","article-title":"Phishlimiter: A Phishing Detection and Mitigation Approach Using Software-Defined Networking","volume":"6","author":"Chin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Bhunia, S.S., and Gurusamy, M. (2017, January 22\u201324). Dynamic attack detection and mitigation in IoT using SDN. Proceedings of the 27th International Telecommunication Networks and Applications Conference (ITNAC), Melbourne, VIC, Australia.","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1002\/spe.2761","article-title":"SDN\/NFV security framework for fog-to-things computing infrastructure","volume":"50","author":"Krishnan","year":"2020","journal-title":"Softw. Pract. Exp."},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Park, Y., Kengalahalli, N.V., and Chang, S.Y. (2018, January 27\u201329). Distributed Security Network Functions against Botnet Attacks in Software-defined Networks. Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Verona, Italy.","DOI":"10.1109\/NFV-SDN.2018.8725657"},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"2093","DOI":"10.1109\/JIOT.2018.2883344","article-title":"AI-Based Two-Stage Intrusion Detection for Software Defined IoT Networks","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"194269","DOI":"10.1109\/ACCESS.2020.3033942","article-title":"Bandwidth Control Mechanism and Extreme Gradient Boosting Algorithm for Protecting Software-Defined Networks Against DDoS Attacks","volume":"8","author":"Alamri","year":"2020","journal-title":"IEEE Access"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Aslam, M., Ye, D., Hanif, M., and Asad, M. (2020). Machine Learning Based SDN-enabled Distributed Denial-of-Services Attacks Detection and Mitigation System for Internet of Things. Machine Learning for Cyber Security, Springer International Publishing.","DOI":"10.1007\/978-3-030-62223-7_16"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Aslam, M., Ye, D., Tariq, A., Asad, M., Hanif, M., Ndzi, D., Chelloug, S.A., Elaziz, M.A., Al-Qaness, M.A.A., and Jilani, S.F. (2022). Adaptive Machine Learning Based Distributed Denial-of-Services Attacks Detection and Mitigation System for SDN-Enabled IoT. Sensors, 22.","DOI":"10.3390\/s22072697"},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Tsogbaatar, E., Bhuyan, M.H., Taenaka, Y., Fall, D., Gonchigsumlaa, K., Elmroth, E., and Kadobayashi, Y. (2020). SDN-Enabled IoT Anomaly Detection Using Ensemble Learning. IFIP Advances in Information and Communication Technology, Springer International Publishing.","DOI":"10.1007\/978-3-030-49186-4_23"},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Thorat, P., and Dubey, N.K. (2020, January 2\u20134). SDN-based Machine Learning Powered Alarm Manager for Mitigating the Traffic Spikes at the IoT Gateways. Proceedings of the IEEE International Conference on Electronics, Computing and Communication Technologies (CONECCT), Bangalore, India.","DOI":"10.1109\/CONECCT50063.2020.9198356"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"e232","DOI":"10.1002\/itl2.232","article-title":"Intrusion detection systems using classical machine learning techniques vs. integrated unsupervised feature learning and deep neural network","volume":"5","author":"Rawat","year":"2020","journal-title":"Internet Technol. Lett."},{"key":"ref_78","unstructured":"Zolotukhin, M., Kumar, S., and Hamalainen, T. (July, January 29). Reinforcement Learning for Attack Mitigation in SDN-enabled Networks. Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Pashamokhtari, A., Batista, G., and Gharakheili, H.H. (2022). AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks. arXiv.","DOI":"10.1016\/j.cose.2022.102801"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"220","DOI":"10.29207\/resti.v6i2.3878","article-title":"LRDDoS Attack Detection on SD-IoT Using Random Forest with Logistic Regression Coefficient","volume":"6","author":"Nanda","year":"2022","journal-title":"J. RESTI (Rekayasa Sist. Teknol. Inf.)"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1504\/IJSNET.2020.109720","article-title":"Machine learning based low-rate DDoS attack detection for SDN enabled IoT networks","volume":"34","author":"Cheng","year":"2020","journal-title":"Int. J. Sens. Netw."},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Dong, P., Du, X., Zhang, H., and Xu, T. (2016, January 22\u201327). A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows. Proceedings of the IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICC.2016.7510992"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"2295","DOI":"10.1007\/s11277-021-08127-6","article-title":"Detection and Analysis of TCP-SYN DDoS Attack in Software-Defined Networking","volume":"118","author":"Swami","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_84","unstructured":"Sarica, A.K., and Angin, P. (2022, September 28). SDN Dataset. Available online: https:\/\/github.com\/AlperKaan35\/SDN-Dataset."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s40031-020-00442-z","article-title":"DDoS Detection and Alleviation in IoT using SDN (SDIoT-DDoS-DA)","volume":"101","author":"Wani","year":"2020","journal-title":"J. Inst. Eng. (India) Ser. B"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.1109\/ACCESS.2021.3139511","article-title":"Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM","volume":"10","author":"Wang","year":"2022","journal-title":"IEEE Access"},{"key":"ref_87","first-page":"5593214","article-title":"Efficient Intrusion Detection System for SDN Orchestrated Internet of Things","volume":"2021","author":"Zeleke","year":"2021","journal-title":"J. Comput. Netw. Commun."},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Abri, F., Siami-Namini, S., Khanghah, M.A., Soltani, F.M., and Namin, A.S. Can Machine\/Deep Learning Classifiers Detect Zero-Day Malware with High Accuracy? In Proceedings of the IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 9\u201312 December 2019.","DOI":"10.1109\/BigData47090.2019.9006514"},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Ugurlu, M., and Dogru, I.A. (2019, January 11\u201315). A Survey on Deep Learning Based Intrusion Detection System. Proceedings of the 4th International Conference on Computer Science and Engineering (UBMK), Samsun, Turkey.","DOI":"10.1109\/UBMK.2019.8907206"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Shen, H. (2018, January 18\u201323). Towards a Mathematical Understanding of the Difficulty in Learning with Feedforward Neural Networks. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition, Salt Lake City, UT, USA.","DOI":"10.1109\/CVPR.2018.00091"},{"key":"ref_91","unstructured":"Goodfellow, I., Bengio, Y., and Courville, A. (2016). Deep Learning, MIT Press. Available online: http:\/\/www.deeplearningbook.org."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"100379","DOI":"10.1016\/j.cosrev.2021.100379","article-title":"A survey on deep learning and its applications","volume":"40","author":"Dong","year":"2021","journal-title":"Comput. Sci. Rev."},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Khan, W.U., Malik, J., Hasan, T., Bibi, I., Al-Wesabi, F.N., Dev, K., and Huang, G. (2022). Securing Industrial Internet of Things Against Botnet Attacks Using Hybrid Deep Learning Approach. IEEE Trans. Netw. Sci. Eng., 1.","DOI":"10.36227\/techrxiv.19313318.v1"},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"83965","DOI":"10.1109\/ACCESS.2020.2992249","article-title":"An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System","volume":"8","author":"Karimipour","year":"2020","journal-title":"IEEE Access"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Tang, T.A., Mhamdi, L., McLernon, D., Zaidi, S.A.R., and Ghogho, M. (2016, January 26\u201329). Deep learning approach for Network Intrusion Detection in Software Defined Networking. Proceedings of the International Conference on Wireless Networks and Mobile Communications (WINCOM), Fez, Morocco.","DOI":"10.1109\/WINCOM.2016.7777224"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Narayanadoss, A.R., Truong-Huu, T., Mohan, P.M., and Gurusamy, M. (May, January 28). Crossfire Attack Detection Using Deep Learning in Software Defined ITS Networks. Proceedings of the IEEE 89th Vehicular Technology Conference (VTC2019-Spring), Kuala Lumpur, Malaysia.","DOI":"10.1109\/VTCSpring.2019.8746594"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Shu, L., Djallel, H., and Choo, K.K.R. (2021). Deep Learning-Based Intrusion Detection for Distributed Denial of Service Attack in Agriculture 4.0. Electronics, 10.","DOI":"10.3390\/electronics10111257"},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"11041","DOI":"10.1109\/JIOT.2020.2993410","article-title":"Semisupervised-Learning-Based Security to Detect and Mitigate Intrusions in IoT Network","volume":"7","author":"Ravi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s42979-021-00467-1","article-title":"Deep Neural Network (DNN) Solution for Real-time Detection of Distributed Denial of Service (DDoS) Attacks in Software Defined Networks (SDNs)","volume":"2","author":"Makuvaza","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1109\/JIOT.2020.2973176","article-title":"Learning-Driven Detection and Mitigation of DDoS Attack in IoT via SDN-Cloud Architecture","volume":"7","author":"Ravi","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Maeda, S., Kanai, A., Tanimoto, S., Hatashima, T., and Ohkubo, K. (2019, January 11\u201313). A Botnet Detection Method on SDN using Deep Learning. Proceedings of the IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2019.8662080"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"77039","DOI":"10.1109\/ACCESS.2022.3188635","article-title":"A Hybrid Deep Learning Approach for Bottleneck Detection in IoT","volume":"10","author":"Sattari","year":"2022","journal-title":"IEEE Access"},{"key":"ref_103","doi-asserted-by":"crossref","first-page":"107398","DOI":"10.1016\/j.ymssp.2020.107398","article-title":"1D convolutional neural networks and applications: A survey","volume":"151","author":"Kiranyaz","year":"2021","journal-title":"Mech. Syst. Signal Process."},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"106738","DOI":"10.1016\/j.compeleceng.2020.106738","article-title":"Near real-time security system applied to SDN environments in IoT networks using convolutional neural network","volume":"86","author":"Carvalho","year":"2020","journal-title":"Comput. Electr. Eng."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Khan, A., and Cotton, C. (2021, January 26\u201328). Detecting Attacks on IoT Devices using Featureless 1D-CNN. Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), Rhodes, Greece.","DOI":"10.1109\/CSR51186.2021.9527910"},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.comcom.2020.07.006","article-title":"SDN orchestration to combat evolving cyber threats in Internet of Medical Things (IoMT)","volume":"160","author":"Liaqat","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_107","first-page":"6136670","article-title":"Software Defined Network Enabled Fog-to-Things Hybrid Deep Learning Driven Cyber Threat Detection System","volume":"2021","author":"Arif","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1016\/j.comcom.2021.01.013","article-title":"A hybrid DL-driven intelligent SDN-enabled malware detection framework for Internet of Medical Things (IoMT)","volume":"170","author":"Khan","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","article-title":"A Deep CNN Ensemble Framework for Efficient DDoS Attack Detection in Software Defined Networks","volume":"8","author":"Haider","year":"2020","journal-title":"IEEE Access"},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Wang, J., Liu, Y., Su, W., and Feng, H. (2020, January 16\u201318). A DDoS attack detection based on deep learning in software-defined Internet of things. Proceedings of the IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada.","DOI":"10.1109\/VTC2020-Fall49728.2020.9348652"},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1007\/s42979-021-00815-1","article-title":"Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions","volume":"2","author":"Sarker","year":"2021","journal-title":"SN Comput. Sci."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"107039","DOI":"10.1016\/j.compeleceng.2021.107039","article-title":"Stacked recurrent neural network for botnet detection in smart homes","volume":"92","author":"Popoola","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_113","unstructured":"Hasan, T., Adnan, A., Giannetsos, T., and Malik, J. (July, January 29). Orchestrating SDN Control Plane towards Enhanced IoT Security. Proceedings of the 6th IEEE Conference on Network Softwarization (NetSoft), Ghent, Belgium."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Javeed, D., Gao, T., Khan, M.T., and Ahmad, I. (2021). A Hybrid Deep Learning-Driven SDN Enabled Mechanism for Secure Communication in Internet of Things (IoT). Sensors, 21.","DOI":"10.3390\/s21144884"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1016\/j.procs.2021.07.032","article-title":"Deep Learning Algorithms for Detecting Denial of Service Attacks in Software-Defined Networks","volume":"191","author":"Farhat","year":"2021","journal-title":"Procedia Comput. Sci."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"134695","DOI":"10.1109\/ACCESS.2020.3009849","article-title":"Hybrid Deep Learning: An Efficient Reconnaissance and Surveillance Detection Mechanism in SDN","volume":"8","author":"Malik","year":"2020","journal-title":"IEEE Access"},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"107859","DOI":"10.1016\/j.asoc.2021.107859","article-title":"Securing Smart Cities using LSTM algorithm and lightweight containers against botnet attacks","volume":"113","author":"Salim","year":"2021","journal-title":"Appl. Soft Comput."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Yeom, S., Choi, C., and Kim, K. (2021, January 22\u201326). Source-side DoS attack detection with LSTM and seasonality embedding. Proceedings of the 36th Annual ACM Symposium on Applied Computing, Virtual Event, Republic of Korea.","DOI":"10.1145\/3412841.3441987"},{"key":"ref_119","unstructured":"Fredj, O.B., Mihoub, A., Krichen, M., Cheikhrouhou, O., and Derhab, A. (2020, January 4\u20137). CyberSecurity Attack Prediction: A Deep Learning Approach. Proceedings of the 13th International Conference on Security of Information and Networks, Merkez, Turkey."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1561\/2000000039","article-title":"Deep Learning: Methods and Applications","volume":"7","author":"Deng","year":"2014","journal-title":"Found. Trends Signal Process."},{"key":"ref_121","doi-asserted-by":"crossref","first-page":"100391","DOI":"10.1016\/j.iot.2021.100391","article-title":"DeL-IoT: A deep ensemble learning approach to uncover anomalies in IoT","volume":"14","author":"Tsogbaatar","year":"2021","journal-title":"Internet Things"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/j.future.2019.10.015","article-title":"Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN","volume":"111","author":"Ujjan","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.comcom.2019.09.014","article-title":"VARMAN: Multi-plane security framework for software defined networks","volume":"148","author":"Krishnan","year":"2019","journal-title":"Comput. Commun."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","article-title":"Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments","volume":"62","author":"Giotis","year":"2014","journal-title":"Comput. Netw."},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/TETCI.2017.2772792","article-title":"A Deep Learning Approach to Network Intrusion Detection","volume":"2","author":"Shone","year":"2018","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"ref_126","doi-asserted-by":"crossref","unstructured":"Ahuja, N., Singal, G., and Mukhopadhyay, D. (2021, January 28\u201329). DLSDN: Deep Learning for DDOS attack detection in Software Defined Networking. Proceedings of the 11th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India.","DOI":"10.1109\/Confluence51648.2021.9376879"},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1007\/s11277-021-09139-y","article-title":"Detection and Multi-Class Classification of Intrusion in Software Defined Networks Using Stacked Auto-Encoders and CICIDS2017 Dataset","volume":"123","author":"Choobdar","year":"2021","journal-title":"Wirel. Pers. Commun."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"3187","DOI":"10.1007\/s10586-021-03311-6","article-title":"Edge computing in SDN-IoT networks: A systematic review of issues, challenges and solutions","volume":"24","author":"Jazaeri","year":"2021","journal-title":"Clust. Comput."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/24\/9837\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:41:21Z","timestamp":1760146881000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/24\/9837"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,14]]},"references-count":128,"journal-issue":{"issue":"24","published-online":{"date-parts":[[2022,12]]}},"alternative-id":["s22249837"],"URL":"https:\/\/doi.org\/10.3390\/s22249837","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,14]]}}}