{"id":"https://openalex.org/W7118163340","doi":"https://doi.org/10.1109/access.2025.3650705","title":"An Approach to Attack Classification for Programmable Network Infrastructure Using Machine Learning and Deep Learning Solutions","display_name":"An Approach to Attack Classification for Programmable Network Infrastructure Using Machine Learning and Deep Learning Solutions","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118163340","doi":"https://doi.org/10.1109/access.2025.3650705"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3650705","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3650705","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3650705","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5119514706","display_name":"Bao Pham-Thai","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bao Pham-Thai","raw_affiliation_strings":["Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5119514707","display_name":"My Nguyen-Le-Ha","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"My Nguyen-Le-Ha","raw_affiliation_strings":["Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031806874","display_name":"Thuat Nguyen-Khanh","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Thuat Nguyen-Khanh","raw_affiliation_strings":["Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121505788","display_name":"Quan Le-Trung","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Quan Le-Trung","raw_affiliation_strings":["Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam"],"affiliations":[{"raw_affiliation_string":"Faculty of Computer Networks and Communications, University of Information Technology, Ho Chi Minh City, Vietnam","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5119514706"],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03332052,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"4886","last_page":"4916"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.8414000272750854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.8414000272750854,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.0697999969124794,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.037700001150369644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5950000286102295},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.5834000110626221},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5680999755859375},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.475600004196167},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.40459999442100525},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.38589999079704285},{"id":"https://openalex.org/keywords/traffic-classification","display_name":"Traffic classification","score":0.3817000091075897},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.35109999775886536},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.3393999934196472}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8253999948501587},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.720300018787384},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.6184999942779541},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5950000286102295},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.5834000110626221},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5680999755859375},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.475600004196167},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4453999996185303},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.40459999442100525},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.38589999079704285},{"id":"https://openalex.org/C169988225","wikidata":"https://www.wikidata.org/wiki/Q7832484","display_name":"Traffic classification","level":3,"score":0.3817000091075897},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.35109999775886536},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.3393999934196472},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3280999958515167},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.30959999561309814},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.29789999127388},{"id":"https://openalex.org/C34413123","wikidata":"https://www.wikidata.org/wiki/Q170978","display_name":"Robotics","level":3,"score":0.29280000925064087},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.2904999852180481},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.28949999809265137},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.2809000015258789},{"id":"https://openalex.org/C67186912","wikidata":"https://www.wikidata.org/wiki/Q367664","display_name":"Data modeling","level":2,"score":0.27570000290870667},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.274399995803833},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.2721000015735626},{"id":"https://openalex.org/C2778820799","wikidata":"https://www.wikidata.org/wiki/Q3454688","display_name":"Cost reduction","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.25189998745918274}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3650705","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3650705","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3650705","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3650705","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.663312554359436,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":36,"referenced_works":["https://openalex.org/W1993558273","https://openalex.org/W2040340473","https://openalex.org/W2275015310","https://openalex.org/W2516809705","https://openalex.org/W2586120503","https://openalex.org/W2805557887","https://openalex.org/W2937711216","https://openalex.org/W2960791616","https://openalex.org/W3036749504","https://openalex.org/W3088849871","https://openalex.org/W3091945716","https://openalex.org/W3114263020","https://openalex.org/W3117041256","https://openalex.org/W3159238871","https://openalex.org/W3179651445","https://openalex.org/W3191161603","https://openalex.org/W3207320473","https://openalex.org/W4319080686","https://openalex.org/W4382249075","https://openalex.org/W4386370455","https://openalex.org/W4390481680","https://openalex.org/W4392637503","https://openalex.org/W4393146420","https://openalex.org/W4400126538","https://openalex.org/W4401278076","https://openalex.org/W4401590300","https://openalex.org/W4403061487","https://openalex.org/W4406526576","https://openalex.org/W4406882703","https://openalex.org/W4409814309","https://openalex.org/W4411173759","https://openalex.org/W4413416187","https://openalex.org/W4413918317","https://openalex.org/W4413943652","https://openalex.org/W4414229301","https://openalex.org/W4414314561"],"related_works":[],"abstract_inverted_index":{"The":[0,142],"rapid":[1],"development":[2],"of":[3,10,16,83,169,182],"Internet-connected":[4],"devices":[5],"has":[6],"driven":[7],"the":[8,51,55,72,167,172,183,208],"rise":[9],"smart":[11],"cities,":[12],"where":[13],"large-scale":[14],"Internet":[15],"Things":[17],"(IoT)":[18],"systems":[19],"require":[20],"efficient":[21],"infrastructure":[22],"management":[23,43],"with":[24,88,120,161],"centralized":[25,42],"monitoring":[26],"and":[27,45,67,114,130,138,155,162,204,211],"control.":[28],"In":[29,95],"this":[30,96],"context,":[31],"Software-Defined":[32],"Networking":[33],"(SDN)":[34],"architecture":[35],"offers":[36],"an":[37],"effective":[38],"solution":[39],"to":[40,77,147,174,196],"fulfill":[41],"needs":[44],"optimize":[46],"network":[47,62,101,152],"quality.":[48],"By":[49],"decoupling":[50],"data":[52],"plane":[53],"from":[54],"control":[56,60],"plane,":[57],"SDN":[58,76,106],"consolidates":[59],"over":[61],"traffic,":[63],"allowing":[64],"flexible":[65],"configuration":[66],"real-time":[68,214],"traffic":[69,102],"optimization.":[70],"However,":[71],"separation":[73],"also":[74],"exposes":[75],"severe":[78],"attacks,":[79,86],"particularly":[80],"Distributed":[81],"Denial":[82],"Service":[84],"(DDoS)":[85],"along":[87],"other":[89],"exploitation":[90],"techniques":[91],"targeting":[92],"its":[93],"architecture.":[94],"study,":[97],"we":[98],"propose":[99],"a":[100],"classification":[103,140,156],"model":[104,132,144,173,205],"for":[105,213],"environments":[107],"that":[108],"leverages":[109],"multiple":[110],"Machine":[111],"Learning":[112,116],"(ML)":[113],"Deep":[115],"(DL)":[117],"models":[118,189],"integrated":[119],"Explainable":[121],"Artificial":[122],"Intelligence":[123],"(XAI)":[124],"technology.":[125],"This":[126,192],"approach":[127],"enables":[128],"precise":[129],"transparent":[131],"decisions":[133],"while":[134],"reducing":[135],"computational":[136],"costs":[137],"improving":[139],"accuracy.":[141],"proposed":[143],"achieves":[145],"up":[146],"99%":[148],"accuracy":[149],"across":[150],"various":[151],"attack":[153],"detection":[154],"scenarios":[157],"within":[158],"SDN,":[159],"both":[160],"without":[163,190],"XAI":[164,170],"assistance.":[165],"Notably,":[166],"incorporation":[168],"allows":[171],"retain":[175],"high":[176],"performance":[177],"using":[178],"only":[179],"approximately":[180],"15%":[181],"original":[184],"feature":[185,193],"set,":[186],"significantly":[187],"outperforming":[188],"XAI.":[191],"reduction":[194],"contributes":[195],"substantial":[197],"decreases":[198],"in":[199,216],"training":[200],"time,":[201,203],"inference":[202],"size,":[206],"demonstrating":[207],"method\u2019s":[209],"feasibility":[210],"effectiveness":[212],"deployment":[215],"SDN-based":[217],"networks.":[218]},"counts_by_year":[],"updated_date":"2026-01-14T23:40:02.550235","created_date":"2026-01-05T00:00:00"}
