{"id":"https://openalex.org/W2889109290","doi":"https://doi.org/10.1109/netsoft.2018.8460090","title":"Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks","display_name":"Deep Recurrent Neural Network for Intrusion Detection in SDN-based Networks","publication_year":2018,"publication_date":"2018-06-01","ids":{"openalex":"https://openalex.org/W2889109290","doi":"https://doi.org/10.1109/netsoft.2018.8460090","mag":"2889109290"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft.2018.8460090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2018.8460090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002383822","display_name":"Tuan Anh Tang","orcid":null},"institutions":[{"id":"https://openalex.org/I130828816","display_name":"University of Leeds","ror":"https://ror.org/024mrxd33","country_code":"GB","type":"education","lineage":["https://openalex.org/I130828816"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Tuan A Tang","raw_affiliation_strings":["School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK","institution_ids":["https://openalex.org/I130828816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038175535","display_name":"Lotfi Mhamdi","orcid":"https://orcid.org/0009-0000-6492-2088"},"institutions":[{"id":"https://openalex.org/I130828816","display_name":"University of Leeds","ror":"https://ror.org/024mrxd33","country_code":"GB","type":"education","lineage":["https://openalex.org/I130828816"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Lotfi Mhamdi","raw_affiliation_strings":["School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK","institution_ids":["https://openalex.org/I130828816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5084710654","display_name":"Des McLernon","orcid":"https://orcid.org/0000-0001-8278-6171"},"institutions":[{"id":"https://openalex.org/I130828816","display_name":"University of Leeds","ror":"https://ror.org/024mrxd33","country_code":"GB","type":"education","lineage":["https://openalex.org/I130828816"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Des McLernon","raw_affiliation_strings":["School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK","institution_ids":["https://openalex.org/I130828816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011903629","display_name":"Syed Ali Raza Zaidi","orcid":"https://orcid.org/0000-0003-1969-3727"},"institutions":[{"id":"https://openalex.org/I130828816","display_name":"University of Leeds","ror":"https://ror.org/024mrxd33","country_code":"GB","type":"education","lineage":["https://openalex.org/I130828816"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Syed Ali Raza Zaidi","raw_affiliation_strings":["School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Electrical Engineering, The University of Leeds, Leeds, UK","institution_ids":["https://openalex.org/I130828816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057324156","display_name":"Mounir Ghogho","orcid":"https://orcid.org/0000-0002-0055-7867"},"institutions":[{"id":"https://openalex.org/I4210106663","display_name":"International University of Rabat","ror":"https://ror.org/01t9czq80","country_code":"MA","type":"education","lineage":["https://openalex.org/I4210106663"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mounir Ghogho","raw_affiliation_strings":["International University, Rabat, Morocco"],"affiliations":[{"raw_affiliation_string":"International University, Rabat, Morocco","institution_ids":["https://openalex.org/I4210106663"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5002383822"],"corresponding_institution_ids":["https://openalex.org/I130828816"],"apc_list":null,"apc_paid":null,"fwci":23.8404,"has_fulltext":false,"cited_by_count":298,"citation_normalized_percentile":{"value":0.99628695,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"202","last_page":"206"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8156907558441162},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.7090250253677368},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.7004191279411316},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6798291802406311},{"id":"https://openalex.org/keywords/agile-software-development","display_name":"Agile software development","score":0.6148473620414734},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5425752401351929},{"id":"https://openalex.org/keywords/flexibility","display_name":"Flexibility (engineering)","score":0.5424116849899292},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4863048493862152},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4639325737953186},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.45428940653800964},{"id":"https://openalex.org/keywords/enabling","display_name":"Enabling","score":0.4362223446369171},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4290798604488373},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.408434122800827},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.35831403732299805},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3289787769317627},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20938566327095032},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1470758616924286},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.08504527807235718}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8156907558441162},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.7090250253677368},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.7004191279411316},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6798291802406311},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.6148473620414734},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5425752401351929},{"id":"https://openalex.org/C2780598303","wikidata":"https://www.wikidata.org/wiki/Q65921492","display_name":"Flexibility (engineering)","level":2,"score":0.5424116849899292},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4863048493862152},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4639325737953186},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.45428940653800964},{"id":"https://openalex.org/C22607594","wikidata":"https://www.wikidata.org/wiki/Q5375150","display_name":"Enabling","level":2,"score":0.4362223446369171},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4290798604488373},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.408434122800827},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.35831403732299805},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3289787769317627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20938566327095032},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1470758616924286},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.08504527807235718},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/netsoft.2018.8460090","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2018.8460090","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:eprints.whiterose.ac.uk:129091","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400854","display_name":"White Rose Research Online (University of Leeds, The University of Sheffield, University of York)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I2800616092","host_organization_name":"White Rose University Consortium","host_organization_lineage":["https://openalex.org/I2800616092"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Proceedings Paper"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1577498723","https://openalex.org/W1583113493","https://openalex.org/W1899504021","https://openalex.org/W1924770834","https://openalex.org/W1985987493","https://openalex.org/W2040340473","https://openalex.org/W2064675550","https://openalex.org/W2067551786","https://openalex.org/W2099940443","https://openalex.org/W2101234009","https://openalex.org/W2147118406","https://openalex.org/W2157331557","https://openalex.org/W2163375756","https://openalex.org/W2275015310","https://openalex.org/W2460037574","https://openalex.org/W2513093253","https://openalex.org/W2529878036","https://openalex.org/W2548015322","https://openalex.org/W2553230590","https://openalex.org/W2560162835","https://openalex.org/W2567496709","https://openalex.org/W2571254578","https://openalex.org/W2903382683","https://openalex.org/W3098576337","https://openalex.org/W6674887505","https://openalex.org/W6675354045"],"related_works":["https://openalex.org/W1974860256","https://openalex.org/W4321381871","https://openalex.org/W4383065492","https://openalex.org/W2111901522","https://openalex.org/W2289630402","https://openalex.org/W4225394202","https://openalex.org/W1994033552","https://openalex.org/W2472522135","https://openalex.org/W2392326020","https://openalex.org/W3118368399"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Networking":[2],"(SDN)":[3],"has":[4],"emerged":[5],"as":[6],"a":[7,38,56,116],"key":[8],"enabler":[9],"for":[10,46,68,119],"future":[11,47],"agile":[12],"Internet":[13],"architecture.":[14],"Nevertheless,":[15],"the":[16,76,97,103,112,123],"flexibility":[17],"provided":[18],"by":[19],"SDN":[20,48,124],"architecture":[21],"manifests":[22],"several":[23],"new":[24],"design":[25],"issues":[26,33],"in":[27,37,51,122],"terms":[28],"of":[29,84],"network":[30,44,104],"security.":[31],"These":[32],"must":[34],"be":[35],"addressed":[36],"unified":[39],"way":[40],"to":[41],"strengthen":[42],"overall":[43],"security":[45],"deployments.":[49],"Consequently,":[50],"this":[52],"paper,":[53],"we":[54,80,109],"propose":[55],"Gated":[57],"Recurrent":[58,60],"Unit":[59],"Neural":[61],"Network":[62],"(GRU-RNN)":[63],"enabled":[64],"intrusion":[65,120],"detection":[66,121],"systems":[67],"SDNs.":[69],"The":[70],"proposed":[71,98,113],"approach":[72,114],"is":[73],"tested":[74],"using":[75],"NSL-KDD":[77],"dataset,":[78],"and":[79],"achieve":[81],"an":[82],"accuracy":[83],"89%":[85],"with":[86],"only":[87],"six":[88],"raw":[89],"features.":[90],"Our":[91],"experiment":[92],"results":[93],"also":[94],"show":[95],"that":[96,111],"GRU-RNN":[99],"does":[100],"not":[101],"deteriorate":[102],"performance.":[105],"Through":[106],"extensive":[107],"experiments,":[108],"conclude":[110],"exhibits":[115],"strong":[117],"potential":[118],"environments.":[125]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":29},{"year":2024,"cited_by_count":42},{"year":2023,"cited_by_count":48},{"year":2022,"cited_by_count":53},{"year":2021,"cited_by_count":48},{"year":2020,"cited_by_count":40},{"year":2019,"cited_by_count":27},{"year":2018,"cited_by_count":7}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
