{"id":"https://openalex.org/W4409961699","doi":"https://doi.org/10.1093/comjnl/bxaf049","title":"A DDoS attack detection method combining federated learning and hybrid deep learning in software-defined networking","display_name":"A DDoS attack detection method combining federated learning and hybrid deep learning in software-defined networking","publication_year":2025,"publication_date":"2025-04-11","ids":{"openalex":"https://openalex.org/W4409961699","doi":"https://doi.org/10.1093/comjnl/bxaf049"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxaf049","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaf049","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Qi Zhou","orcid":"https://orcid.org/0009-0000-7717-3469"},"institutions":[{"id":"https://openalex.org/I82760581","display_name":"Taizhou University","ror":"https://ror.org/04fzhyx73","country_code":"CN","type":"education","lineage":["https://openalex.org/I82760581"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Zhou","raw_affiliation_strings":["Department of Computer Science , Taizhou University, No. 1139 Shifu Avenue, Jiaojiang District, Taizhou City, Zhejiang Province 318000, P. R"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , Taizhou University, No. 1139 Shifu Avenue, Jiaojiang District, Taizhou City, Zhejiang Province 318000, P. R","institution_ids":["https://openalex.org/I82760581"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036007946","display_name":"Xuechun Mao","orcid":"https://orcid.org/0000-0001-7292-020X"},"institutions":[{"id":"https://openalex.org/I82760581","display_name":"Taizhou University","ror":"https://ror.org/04fzhyx73","country_code":"CN","type":"education","lineage":["https://openalex.org/I82760581"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuechun Mao","raw_affiliation_strings":["Department of Computer Science , Taizhou University, No. 1139 Shifu Avenue, Jiaojiang District, Taizhou City, Zhejiang Province 318000, P. R"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , Taizhou University, No. 1139 Shifu Avenue, Jiaojiang District, Taizhou City, Zhejiang Province 318000, P. R","institution_ids":["https://openalex.org/I82760581"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024713152","display_name":"Ying Chen","orcid":"https://orcid.org/0000-0002-9520-3008"},"institutions":[{"id":"https://openalex.org/I82760581","display_name":"Taizhou University","ror":"https://ror.org/04fzhyx73","country_code":"CN","type":"education","lineage":["https://openalex.org/I82760581"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ying Chen","raw_affiliation_strings":["Department of Computer Science , Taizhou University, No. 1139 Shifu Avenue, Jiaojiang District, Taizhou City, Zhejiang Province 318000, P. R"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science , Taizhou University, No. 1139 Shifu Avenue, Jiaojiang District, Taizhou City, Zhejiang Province 318000, P. R","institution_ids":["https://openalex.org/I82760581"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I82760581"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":7.4355,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.96930065,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"68","issue":"10","first_page":"1463","last_page":"1475"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.891007661819458},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8483812808990479},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.6359009742736816},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5205153822898865},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4358588457107544},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19480770826339722},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.0645393431186676}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.891007661819458},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8483812808990479},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.6359009742736816},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5205153822898865},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4358588457107544},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19480770826339722},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0645393431186676}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxaf049","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxaf049","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":31,"referenced_works":["https://openalex.org/W2148143831","https://openalex.org/W2276629685","https://openalex.org/W2799900537","https://openalex.org/W3008535060","https://openalex.org/W3025204993","https://openalex.org/W3086579950","https://openalex.org/W3093659890","https://openalex.org/W3108671495","https://openalex.org/W3114263020","https://openalex.org/W3120795858","https://openalex.org/W3126855403","https://openalex.org/W3169649651","https://openalex.org/W3174223893","https://openalex.org/W3180608480","https://openalex.org/W4205423013","https://openalex.org/W4210912339","https://openalex.org/W4233415207","https://openalex.org/W4284994113","https://openalex.org/W4291743636","https://openalex.org/W4303857474","https://openalex.org/W4312760756","https://openalex.org/W4317813238","https://openalex.org/W4318570420","https://openalex.org/W4323655380","https://openalex.org/W4366590727","https://openalex.org/W4381492746","https://openalex.org/W4388765979","https://openalex.org/W4391503438","https://openalex.org/W4392386117","https://openalex.org/W4392902282","https://openalex.org/W4403123735"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W4387369504","https://openalex.org/W3082895349"],"abstract_inverted_index":{"Abstract":[0],"Software-defined":[1],"networking":[2],"(SDN)":[3],"improves":[4],"network":[5,66],"flexibility":[6],"by":[7],"separating":[8],"the":[9,21,70,144,148,181,191,205],"control":[10,17],"plane":[11],"and":[12,75,97,125,134,139,173,198,212],"data":[13,94],"plane,":[14],"but":[15],"centralized":[16,87],"architecture":[18],"also":[19],"increases":[20],"risk":[22],"of":[23,26,65,73,115,183,196,202],"distributed":[24],"denial":[25],"service":[27],"(DDoS)":[28],"attacks.":[29],"Traditional":[30],"detection":[31,54,221],"methods":[32,84],"often":[33],"face":[34],"performance":[35,218],"bottlenecks":[36],"when":[37],"dealing":[38],"with":[39,44],"large-scale":[40],"data.":[41],"Deep":[42],"learning,":[43],"its":[45],"powerful":[46],"automatic":[47],"feature":[48,118,128],"extraction":[49,119,129],"capabilities,":[50],"can":[51],"significantly":[52],"improve":[53],"accuracy.":[55],"However,":[56],"single":[57],"models":[58],"typically":[59],"focus":[60],"on":[61,86,122,132,204],"a":[62,107,116,123,126],"specific":[63],"dimension":[64],"traffic":[67],"features,":[68],"neglecting":[69],"comprehensive":[71],"processing":[72,137],"spatial":[74,117,138],"temporal":[76,127,140],"features.":[77],"In":[78],"addition,":[79],"most":[80],"existing":[81,209],"deep":[82,213],"learning":[83,157,211,214],"rely":[85],"training,":[88],"leading":[89],"to":[90,150,160,165,179],"issues":[91],"such":[92],"as":[93],"transmission":[95],"delays":[96],"privacy":[98,182],"breaches.":[99],"To":[100],"address":[101],"these":[102],"issues,":[103],"this":[104],"paper":[105],"proposes":[106],"hybrid":[108],"model":[109,113,145,184,192],"named":[110],"1DCNN-TransBiLSTM.":[111],"The":[112,186],"consists":[114],"module":[120,130],"based":[121,131],"1DCNN":[124],"Transformer":[133],"BiLSTM.":[135],"By":[136],"features":[141],"in":[142,167,219,222],"parallel,":[143],"effectively":[146],"enhances":[147],"ability":[149],"identify":[151],"complex":[152],"attack":[153],"patterns.":[154],"Additionally,":[155],"federated":[156],"is":[158,177],"employed":[159],"enable":[161],"multiple":[162],"SDN":[163,223],"controllers":[164],"collaborate":[166],"training":[168],"without":[169],"sharing":[170],"raw":[171],"data,":[172],"multi-key":[174],"homomorphic":[175],"encryption":[176],"used":[178],"protect":[180],"gradients.":[185],"experimental":[187],"results":[188],"show":[189],"that":[190],"achieves":[193],"an":[194,199],"accuracy":[195],"99.925%":[197],"F1":[200],"score":[201],"99.962%":[203],"CICDDoS2019":[206],"dataset,":[207],"outperforming":[208],"machine":[210],"methods,":[215],"demonstrating":[216],"outstanding":[217],"DDoS":[220],"environments.":[224]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4}],"updated_date":"2026-03-30T08:08:38.191290","created_date":"2025-10-10T00:00:00"}
