{"id":"https://openalex.org/W4414229301","doi":"https://doi.org/10.1109/ojcoms.2025.3610365","title":"Deep Learning-Based Autonomous Anomaly Detection for Security in SDN-IoT Networks","display_name":"Deep Learning-Based Autonomous Anomaly Detection for Security in SDN-IoT Networks","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414229301","doi":"https://doi.org/10.1109/ojcoms.2025.3610365"},"language":"en","primary_location":{"id":"doi:10.1109/ojcoms.2025.3610365","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3610365","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/ojcoms.2025.3610365","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5062703217","display_name":"Tharindu Lakshan Yasarathna","orcid":"https://orcid.org/0000-0002-7459-0600"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":true,"raw_author_name":"Tharindu Lakshan Yasarathna","raw_affiliation_strings":["UCD ASEADOS Lab, School of Computer Science, University College Dublin, Dublin 4, Ireland","School of Computer Science, University College Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"UCD ASEADOS Lab, School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068169019","display_name":"Madhusanka Liyanage","orcid":"https://orcid.org/0000-0003-4786-030X"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Madhusanka Liyanage","raw_affiliation_strings":["NetsLab, School of Computer Science, University College Dublin, Dublin 4, Ireland","School of Computer Science, University College Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"NetsLab, School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5073189627","display_name":"Nhien\u2010An Le\u2010Khac","orcid":"https://orcid.org/0000-0003-4373-2212"},"institutions":[{"id":"https://openalex.org/I100930933","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47","country_code":"IE","type":"education","lineage":["https://openalex.org/I100930933"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Nhien-An Le-Khac","raw_affiliation_strings":["ASEADOS Lab, School of Computer Science, University College Dublin, Dublin 4, Ireland","School of Computer Science, University College Dublin, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"ASEADOS Lab, School of Computer Science, University College Dublin, Dublin 4, Ireland","institution_ids":["https://openalex.org/I100930933"]},{"raw_affiliation_string":"School of Computer Science, University College Dublin, Dublin, Ireland","institution_ids":["https://openalex.org/I100930933"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5062703217"],"corresponding_institution_ids":["https://openalex.org/I100930933"],"apc_list":{"value":1750,"currency":"USD","value_usd":1750},"apc_paid":{"value":1750,"currency":"USD","value_usd":1750},"fwci":5.6784,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.96190077,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":99,"max":100},"biblio":{"volume":"6","issue":null,"first_page":"8007","last_page":"8048"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9919999837875366,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9259999990463257,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9186999797821045,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.6115999817848206},{"id":"https://openalex.org/keywords/honeypot","display_name":"Honeypot","score":0.5863999724388123},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5626999735832214},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5277000069618225},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42719998955726624},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4088999927043915},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.3862000107765198},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.3716000020503998}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6442999839782715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6406000256538391},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.6115999817848206},{"id":"https://openalex.org/C191267431","wikidata":"https://www.wikidata.org/wiki/Q911932","display_name":"Honeypot","level":2,"score":0.5863999724388123},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5626999735832214},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5277000069618225},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42719998955726624},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4088999927043915},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.3862000107765198},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3716000020503998},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3352999985218048},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.32989999651908875},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.3109000027179718},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.29409998655319214},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.28760001063346863},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.2743000090122223},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2556999921798706},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.25279998779296875},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.25049999356269836}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/ojcoms.2025.3610365","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3610365","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:2e6e7b268f4c4db1a669a169bc9b93c9","is_oa":true,"landing_page_url":"https://doaj.org/article/2e6e7b268f4c4db1a669a169bc9b93c9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Open Journal of the Communications Society, Vol 6, Pp 8007-8048 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/ojcoms.2025.3610365","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ojcoms.2025.3610365","pdf_url":null,"source":{"id":"https://openalex.org/S4210202420","display_name":"IEEE Open Journal of the Communications Society","issn_l":"2644-125X","issn":["2644-125X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310316002","host_organization_name":"IEEE Communications Society","host_organization_lineage":["https://openalex.org/P4310316002","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Communications Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Open Journal of the Communications Society","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320320858","display_name":"University College Dublin","ror":"https://ror.org/05m7pjf47"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":118,"referenced_works":["https://openalex.org/W1982359930","https://openalex.org/W2003894436","https://openalex.org/W2016258134","https://openalex.org/W2610910746","https://openalex.org/W2733765803","https://openalex.org/W2736937187","https://openalex.org/W2752560646","https://openalex.org/W2753526808","https://openalex.org/W2753580776","https://openalex.org/W2756396702","https://openalex.org/W2757312963","https://openalex.org/W2771524937","https://openalex.org/W2793723077","https://openalex.org/W2803255133","https://openalex.org/W2809471091","https://openalex.org/W2883778034","https://openalex.org/W2885478531","https://openalex.org/W2909431601","https://openalex.org/W2910055922","https://openalex.org/W2911200746","https://openalex.org/W2911505293","https://openalex.org/W2912490444","https://openalex.org/W2916681395","https://openalex.org/W2944851425","https://openalex.org/W2945132367","https://openalex.org/W2963608065","https://openalex.org/W2964190660","https://openalex.org/W2974955574","https://openalex.org/W2987228832","https://openalex.org/W2997703253","https://openalex.org/W3004207920","https://openalex.org/W3004864462","https://openalex.org/W3007023507","https://openalex.org/W3007738607","https://openalex.org/W3012082538","https://openalex.org/W3013847811","https://openalex.org/W3016650017","https://openalex.org/W3025414669","https://openalex.org/W3033113800","https://openalex.org/W3033868034","https://openalex.org/W3034648032","https://openalex.org/W3039439473","https://openalex.org/W3041059941","https://openalex.org/W3044050394","https://openalex.org/W3045823105","https://openalex.org/W3046021859","https://openalex.org/W3083957127","https://openalex.org/W3087470167","https://openalex.org/W3094345499","https://openalex.org/W3109037541","https://openalex.org/W3113418120","https://openalex.org/W3118646079","https://openalex.org/W3119708449","https://openalex.org/W3120593623","https://openalex.org/W3133516607","https://openalex.org/W3135903453","https://openalex.org/W3139008799","https://openalex.org/W3154459044","https://openalex.org/W3157118165","https://openalex.org/W3167002002","https://openalex.org/W3170851865","https://openalex.org/W3172174732","https://openalex.org/W3192676711","https://openalex.org/W3193365863","https://openalex.org/W3206177834","https://openalex.org/W4210693780","https://openalex.org/W4210960727","https://openalex.org/W4225161323","https://openalex.org/W4283368000","https://openalex.org/W4285082635","https://openalex.org/W4285106051","https://openalex.org/W4285233421","https://openalex.org/W4288690368","https://openalex.org/W4290804386","https://openalex.org/W4296193860","https://openalex.org/W4306673449","https://openalex.org/W4308167307","https://openalex.org/W4309635195","https://openalex.org/W4313891707","https://openalex.org/W4323034524","https://openalex.org/W4327517988","https://openalex.org/W4328016179","https://openalex.org/W4328053420","https://openalex.org/W4363678085","https://openalex.org/W4376141796","https://openalex.org/W4380372584","https://openalex.org/W4386168374","https://openalex.org/W4386760178","https://openalex.org/W4389781106","https://openalex.org/W4390755693","https://openalex.org/W4391068874","https://openalex.org/W4391407086","https://openalex.org/W4392158715","https://openalex.org/W4392246655","https://openalex.org/W4392552511","https://openalex.org/W4392693719","https://openalex.org/W4392910476","https://openalex.org/W4392979371","https://openalex.org/W4393007161","https://openalex.org/W4393098778","https://openalex.org/W4394840292","https://openalex.org/W4396779280","https://openalex.org/W4399038876","https://openalex.org/W4399283298","https://openalex.org/W4400424457","https://openalex.org/W4401468300","https://openalex.org/W4401658435","https://openalex.org/W4401684965","https://openalex.org/W4401862241","https://openalex.org/W4402433570","https://openalex.org/W4402811905","https://openalex.org/W4403060156","https://openalex.org/W4403378406","https://openalex.org/W4403440317","https://openalex.org/W4403555713","https://openalex.org/W4403635653","https://openalex.org/W4405600431","https://openalex.org/W4410341398"],"related_works":[],"abstract_inverted_index":{"Converging":[0],"Software-Defined":[1],"Networking":[2],"(SDN)":[3],"and":[4,15,30,44,84,96,119,139,155,159,169,185,210,248],"the":[5,74,80,91,104,231,255],"Internet":[6],"of":[7,76,98,110,116,128,148,175,234,258],"Things":[8],"(IoT)":[9],"has":[10],"directed":[11],"innovative":[12],"network":[13],"architectures":[14],"applications.":[16],"However,":[17],"this":[18,50,196,227],"fusion":[19],"exposes":[20],"security":[21,47,162,253],"vulnerabilities":[22],"due":[23],"to":[24,157,221],"SDN-IoT":[25,59,77,133,240],"networks\u2019":[26],"expanded":[27],"attack":[28,118],"surface":[29],"dynamic":[31],"nature.":[32],"Autonomous":[33],"Anomaly":[34],"Detection":[35],"(AAD)":[36],"plays":[37],"a":[38,62,113,243],"pivotal":[39],"role":[40,88],"in":[41,49,89,132,201,239],"swiftly":[42],"identifying":[43],"mitigating":[45],"real-time":[46,208],"threats":[48],"landscape.":[51],"This":[52],"survey":[53,197,229],"thoroughly":[54],"investigates":[55],"AAD":[56,130,203,236],"approaches":[57],"within":[58,212,254],"networks,":[60,134],"with":[61,187],"particular":[63],"focus":[64],"on":[65],"applying":[66],"advanced":[67],"Deep":[68],"Learning":[69],"(DL)":[70],"techniques.":[71],"It":[72],"explores":[73],"significance":[75],"architecture,":[78],"articulates":[79],"motivations":[81],"driving":[82],"AAD,":[83],"highlights":[85],"its":[86],"critical":[87],"ensuring":[90],"availability,":[92],"confidentiality,":[93],"authentication,":[94],"integrity,":[95],"authorization":[97],"networked":[99],"resources.":[100],"Furthermore,":[101],"it":[102],"defines":[103],"threat":[105],"vectors":[106],"across":[107],"different":[108],"layers":[109],"SDN-IoT,":[111],"facilitating":[112],"comprehensive":[114,228],"validation":[115],"existing":[117],"defence":[120],"approaches.":[121],"The":[122,173],"paper":[123],"provides":[124],"an":[125,145],"extensive":[126],"review":[127],"DL-based":[129,235],"methods":[131,189],"examining":[135],"their":[136],"strengths,":[137],"limitations,":[138],"practical":[140],"implications.":[141],"Notable":[142],"contributions":[143],"include":[144],"in-depth":[146],"taxonomy":[147],"DL":[149],"models\u2014such":[150],"as":[151,206],"CNNs,":[152],"RNNs,":[153],"LSTMs,":[154],"autoencoders\u2014designed":[156],"detect":[158],"mitigate":[160],"various":[161],"threats,":[163],"including":[164],"DDoS":[165],"attacks,":[166],"data":[167],"breaches,":[168],"abnormal":[170],"traffic":[171],"patterns.":[172],"performance":[174],"these":[176,223],"techniques":[177],"is":[178],"evaluated":[179],"using":[180],"measures":[181],"like":[182],"accuracy,":[183],"recall,":[184],"F1-score,":[186],"some":[188],"achieving":[190],"detection":[191],"accuracy":[192],"exceeding":[193],"99%.":[194],"Additionally,":[195],"identifies":[198],"key":[199],"challenges":[200],"implementing":[202],"systems,":[204],"such":[205],"scalability,":[207],"processing,":[209],"integration":[211],"resource-constrained":[213],"IoT":[214],"environments,":[215],"while":[216],"proposing":[217],"future":[218],"research":[219],"directions":[220],"address":[222],"issues.":[224],"In":[225],"conclusion,":[226],"summarizes":[230],"multifaceted":[232],"landscape":[233],"for":[237,245],"Security":[238],"Networks,":[241],"providing":[242],"foundation":[244],"further":[246],"exploration":[247],"innovation":[249],"that":[250],"can":[251],"advance":[252],"evolving":[256],"realm":[257],"interconnected":[259],"networks.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":4}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
