{"id":"https://openalex.org/W4413180498","doi":"https://doi.org/10.1109/gcwkshp64532.2024.11100907","title":"Deep Learning Empowered DDoS Attack Detection in Software Defined Network","display_name":"Deep Learning Empowered DDoS Attack Detection in Software Defined Network","publication_year":2024,"publication_date":"2024-12-08","ids":{"openalex":"https://openalex.org/W4413180498","doi":"https://doi.org/10.1109/gcwkshp64532.2024.11100907"},"language":"en","primary_location":{"id":"doi:10.1109/gcwkshp64532.2024.11100907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshp64532.2024.11100907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110645550","display_name":"Hira Akhtar Butt","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089805","display_name":"University of Management and Technology","ror":null,"country_code":"PK","type":null,"lineage":["https://openalex.org/I4210089805"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Hira Akhtar Butt","raw_affiliation_strings":["University of Management and Technology,Sialkot,Pakistan"],"affiliations":[{"raw_affiliation_string":"University of Management and Technology,Sialkot,Pakistan","institution_ids":["https://openalex.org/I4210089805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061880171","display_name":"Kai Fang","orcid":"https://orcid.org/0000-0003-0419-1468"},"institutions":[{"id":"https://openalex.org/I1284762954","display_name":"Zhejiang A & F University","ror":"https://ror.org/02vj4rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I1284762954"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kai Fang","raw_affiliation_strings":["Zhejiang A&amp;F University,College of Mathematics and Computer Science,Hangzhou,China,311300"],"affiliations":[{"raw_affiliation_string":"Zhejiang A&amp;F University,College of Mathematics and Computer Science,Hangzhou,China,311300","institution_ids":["https://openalex.org/I1284762954"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Mumtaz Ali Shah","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089805","display_name":"University of Management and Technology","ror":null,"country_code":"PK","type":null,"lineage":["https://openalex.org/I4210089805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mumtaz Ali Shah","raw_affiliation_strings":["University of Management and Technology,Sialkot,Pakistan"],"affiliations":[{"raw_affiliation_string":"University of Management and Technology,Sialkot,Pakistan","institution_ids":["https://openalex.org/I4210089805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045404488","display_name":"Mujeeb Ur Rehman","orcid":"https://orcid.org/0000-0002-9879-7374"},"institutions":[{"id":"https://openalex.org/I4210089805","display_name":"University of Management and Technology","ror":null,"country_code":"PK","type":null,"lineage":["https://openalex.org/I4210089805"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Mujeeb Ur Rehman","raw_affiliation_strings":["University of Management and Technology,Sialkot,Pakistan"],"affiliations":[{"raw_affiliation_string":"University of Management and Technology,Sialkot,Pakistan","institution_ids":["https://openalex.org/I4210089805"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037977430","display_name":"Rutvij H. Jhaveri","orcid":"https://orcid.org/0000-0002-3285-7346"},"institutions":[{"id":"https://openalex.org/I33586908","display_name":"Pandit Deendayal Energy University","ror":"https://ror.org/02nsv5p42","country_code":"IN","type":"education","lineage":["https://openalex.org/I33586908"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Rutvij Jhaveri","raw_affiliation_strings":["Pandit Deendayal Energy University,School of Technology,Gandhinagar,Gujarat,India"],"affiliations":[{"raw_affiliation_string":"Pandit Deendayal Energy University,School of Technology,Gandhinagar,Gujarat,India","institution_ids":["https://openalex.org/I33586908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034832697","display_name":"Hailin Feng","orcid":"https://orcid.org/0000-0003-2734-480X"},"institutions":[{"id":"https://openalex.org/I1284762954","display_name":"Zhejiang A & F University","ror":"https://ror.org/02vj4rn06","country_code":"CN","type":"education","lineage":["https://openalex.org/I1284762954"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hailin Feng","raw_affiliation_strings":["Zhejiang A &amp; F University,School of Mathematics and Computer Science,China"],"affiliations":[{"raw_affiliation_string":"Zhejiang A &amp; F University,School of Mathematics and Computer Science,China","institution_ids":["https://openalex.org/I1284762954"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056586306","display_name":"Jehad Ali","orcid":"https://orcid.org/0000-0002-0589-7924"},"institutions":[{"id":"https://openalex.org/I4210120602","display_name":"Advanced Institute of Convergence Technology","ror":"https://ror.org/01w62yz22","country_code":"KR","type":"facility","lineage":["https://openalex.org/I139264467","https://openalex.org/I4210120602"]},{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jehad Ali","raw_affiliation_strings":["Ajou University,Department of AI Convergence Network,Suwon,South Korea"],"affiliations":[{"raw_affiliation_string":"Ajou University,Department of AI Convergence Network,Suwon,South Korea","institution_ids":["https://openalex.org/I57664883","https://openalex.org/I4210120602"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5110645550"],"corresponding_institution_ids":["https://openalex.org/I4210089805"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.35996554,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8592098355293274},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7800582647323608},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5841565132141113},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.506719172000885},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.48744964599609375},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.45784562826156616},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.44665971398353577},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.438179612159729},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.2923588752746582},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.20597103238105774},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13464486598968506}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8592098355293274},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7800582647323608},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5841565132141113},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.506719172000885},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.48744964599609375},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.45784562826156616},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.44665971398353577},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.438179612159729},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.2923588752746582},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.20597103238105774},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13464486598968506}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/gcwkshp64532.2024.11100907","is_oa":false,"landing_page_url":"https://doi.org/10.1109/gcwkshp64532.2024.11100907","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Globecom Workshops (GC Wkshps)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2104692292","https://openalex.org/W2785495041","https://openalex.org/W2804956791","https://openalex.org/W2989255594","https://openalex.org/W3036012999","https://openalex.org/W3093459272","https://openalex.org/W3134031829","https://openalex.org/W4210779665","https://openalex.org/W4318570420","https://openalex.org/W4362639200","https://openalex.org/W4367624273","https://openalex.org/W4399918187"],"related_works":["https://openalex.org/W2360429410","https://openalex.org/W2898696280","https://openalex.org/W2204131204","https://openalex.org/W2383770723","https://openalex.org/W2921433547","https://openalex.org/W2958385475","https://openalex.org/W2783466926","https://openalex.org/W4286539397","https://openalex.org/W2370216173","https://openalex.org/W2276629685"],"abstract_inverted_index":{"In":[0],"the":[1,30,35,117,150,163,179],"rapidly":[2],"growing":[3],"domain":[4],"of":[5,13,29,72,119,170,187],"Software":[6],"Define-Networks":[7],"(SDN),":[8],"protecting":[9],"against":[10,60],"Distributed":[11],"Denial":[12],"Service":[14],"(DDoS)":[15],"attacks":[16,23,40,81],"is":[17,27,56,114,159],"a":[18,42,52,143,183],"challenging":[19,32],"task.":[20],"Detecting":[21],"sophisticated":[22],"with":[24,155,168],"unpredictable":[25],"patterns":[26],"one":[28],"most":[31],"issues":[33],"on":[34],"Internet":[36],"today.":[37],"Thwarting":[38],"DDoS":[39,80],"remains":[41],"difficult":[43],"task":[44],"for":[45,58,78],"both":[46],"conventional":[47],"and":[48,69,86,105,126,139,165,172],"SDN-based":[49],"networks.":[50],"Hence,":[51],"smart":[53],"detection":[54],"method":[55],"essential":[57],"defending":[59],"these":[61,120],"attacks.":[62],"This":[63,129],"paper":[64],"provides":[65],"an":[66],"in-depth":[67],"discussion":[68],"comparative":[70],"analysis":[71],"various":[73],"Deep":[74,101],"Learning":[75],"(DL)":[76],"approaches":[77],"detecting":[79],"in":[82,122],"SDN.":[83],"We":[84],"tested":[85],"evaluated":[87],"four":[88],"advanced":[89],"DL":[90],"methods,":[91],"namely":[92],"Convolutional":[93],"Neural":[94,102,107],"Network":[95,103,108],"(CNN),":[96],"Long":[97],"Short-Term":[98],"Memory":[99],"(LSTM),":[100],"(DNN),":[104],"Artificial":[106],"(ANN).":[109],"The":[110],"primary":[111],"goal,":[112],"therefore,":[113],"to":[115,141],"assess":[116],"performance":[118,145],"algorithms":[121],"distinguishing":[123],"between":[124],"normal":[125],"anomalous":[127],"traffic.":[128],"article":[130],"evaluates":[131],"models":[132],"using":[133],"accuracy,":[134],"precision,":[135],"recall,":[136],"F1":[137],"score,":[138],"specificity":[140],"provide":[142],"comprehensive":[144],"overview.":[146],"Our":[147],"results":[148],"show":[149],"LSTM":[151],"model":[152,181],"outperforms":[153],"others":[154],"99.85%":[156],"accuracy.":[157],"It":[158],"closely":[160],"followed":[161],"by":[162],"DNN":[164],"CNN":[166],"models,":[167],"accuracies":[169],"99.73%":[171],"99.66%,":[173],"respectively.":[174],"While":[175],"still":[176],"highly":[177],"effective,":[178],"ANN":[180],"achieved":[182],"slightly":[184],"lower":[185],"accuracy":[186],"98.2%.":[188]},"counts_by_year":[],"updated_date":"2026-04-17T18:11:37.981687","created_date":"2025-10-10T00:00:00"}
