{"id":"https://openalex.org/W4410863764","doi":"https://doi.org/10.1145/3737875","title":"DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network","display_name":"DeepSDN: Deep Learning Based Software Defined Network Model for Cyberthreat Detection in IoT Network","publication_year":2025,"publication_date":"2025-05-29","ids":{"openalex":"https://openalex.org/W4410863764","doi":"https://doi.org/10.1145/3737875"},"language":"en","primary_location":{"id":"doi:10.1145/3737875","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3737875","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Kokila M","orcid":"https://orcid.org/0009-0006-4062-8494"},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]},{"id":"https://openalex.org/I4401726783","display_name":"VIT-AP University","ror":"https://ror.org/007v4hf75","country_code":null,"type":"education","lineage":["https://openalex.org/I4401726783"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Kokila M","raw_affiliation_strings":["School of Computer Science and Engineering, VIT-AP University","School of Computer Science and Engineering, VIT-AP University Campus, Amaravati, India"],"raw_orcid":"https://orcid.org/0009-0006-4062-8494","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, VIT-AP University","institution_ids":["https://openalex.org/I4401726783"]},{"raw_affiliation_string":"School of Computer Science and Engineering, VIT-AP University Campus, Amaravati, India","institution_ids":["https://openalex.org/I4210131147","https://openalex.org/I4401726783"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039051695","display_name":"K. Srinivasa Reddy","orcid":"https://orcid.org/0000-0002-4371-2169"},"institutions":[{"id":"https://openalex.org/I4210131147","display_name":"SRM University","ror":"https://ror.org/037skf023","country_code":"IN","type":"education","lineage":["https://openalex.org/I145286018","https://openalex.org/I4210131147"]},{"id":"https://openalex.org/I4401726783","display_name":"VIT-AP University","ror":"https://ror.org/007v4hf75","country_code":null,"type":"education","lineage":["https://openalex.org/I4401726783"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Srinivasa Reddy K","raw_affiliation_strings":["School of Computer Science and Engineering, VIT-AP University","SCOPE, VIT-AP University Campus, Amaravati India"],"raw_orcid":"https://orcid.org/0000-0002-4371-2169","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, VIT-AP University","institution_ids":["https://openalex.org/I4401726783"]},{"raw_affiliation_string":"SCOPE, VIT-AP University Campus, Amaravati India","institution_ids":["https://openalex.org/I4210131147","https://openalex.org/I4401726783"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I4210131147","https://openalex.org/I4401726783"],"apc_list":null,"apc_paid":null,"fwci":5.034,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.95213866,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"26","issue":"1","first_page":"1","last_page":"29"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.9318050146102905},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5393301248550415},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5237469673156738},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5026707649230957},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4887235164642334},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4403917193412781},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.16541069746017456},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11440697312355042}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.9318050146102905},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5393301248550415},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5237469673156738},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5026707649230957},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4887235164642334},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4403917193412781},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.16541069746017456},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11440697312355042}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3737875","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3737875","pdf_url":null,"source":{"id":"https://openalex.org/S97833917","display_name":"ACM Transactions on Internet Technology","issn_l":"1533-5399","issn":["1533-5399","1557-6051"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319798","host_organization_name":"Association for Computing Machinery","host_organization_lineage":["https://openalex.org/P4310319798"],"host_organization_lineage_names":["Association for Computing Machinery"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ACM Transactions on Internet Technology","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":39,"referenced_works":["https://openalex.org/W3085955590","https://openalex.org/W3161694586","https://openalex.org/W4226319939","https://openalex.org/W4313593157","https://openalex.org/W4315865692","https://openalex.org/W4362508995","https://openalex.org/W4363678907","https://openalex.org/W4379383020","https://openalex.org/W4384159781","https://openalex.org/W4385549122","https://openalex.org/W4386067420","https://openalex.org/W4387696208","https://openalex.org/W4389306074","https://openalex.org/W4391065622","https://openalex.org/W4392028635","https://openalex.org/W4392429805","https://openalex.org/W4392976453","https://openalex.org/W4392979371","https://openalex.org/W4395702952","https://openalex.org/W4396608759","https://openalex.org/W4396661117","https://openalex.org/W4396980145","https://openalex.org/W4399303788","https://openalex.org/W4399826760","https://openalex.org/W4400158804","https://openalex.org/W4400276081","https://openalex.org/W4400590855","https://openalex.org/W4401295443","https://openalex.org/W4401684965","https://openalex.org/W4402511068","https://openalex.org/W4402568867","https://openalex.org/W4403123735","https://openalex.org/W4403912215","https://openalex.org/W4403985089","https://openalex.org/W4404117786","https://openalex.org/W4404643988","https://openalex.org/W4404884150","https://openalex.org/W4406137977","https://openalex.org/W4406335193"],"related_works":["https://openalex.org/W2731899572","https://openalex.org/W2961085424","https://openalex.org/W3215138031","https://openalex.org/W4306674287","https://openalex.org/W3009238340","https://openalex.org/W4360585206","https://openalex.org/W4321369474","https://openalex.org/W4285208911","https://openalex.org/W4387369504","https://openalex.org/W3082895349"],"abstract_inverted_index":{"The":[0,69,184,213],"Internet":[1],"of":[2,15,24,186],"Things":[3],"(IoT)":[4],"presents":[5],"new":[6],"challenges":[7],"to":[8,46,109,135,137,166,179],"traditional":[9],"communication":[10,100],"models,":[11,34],"particularly":[12],"in":[13],"terms":[14],"security,":[16],"which":[17,90],"are":[18,208],"exacerbated":[19],"by":[20,59,173],"the":[21,38,50,72,138,187,206],"rapid":[22],"evolution":[23],"cyberthreats.":[25],"Traditional":[26],"security":[27,61,77,89,164],"methods,":[28],"especially":[29],"those":[30],"using":[31,105,119,192,249],"Machine":[32],"Learning":[33],"often":[35],"struggle":[36],"with":[37,194,210,233],"limited":[39],"computational":[40],"resources":[41],"available,":[42],"making":[43],"it":[44],"difficult":[45],"detect":[47],"attacks":[48,172,204],"across":[49],"entire":[51],"network.":[52],"Software-defined":[53],"networks":[54,169],"(SDN)":[55],"offer":[56],"a":[57,76,82,98,106,114,142,161,180,241],"solution":[58],"centralizing":[60],"policies,":[62],"enabling":[63],"more":[64],"effective":[65],"implementation":[66],"and":[67,131,152,200,205,218,227,240],"enforcement.":[68],"study":[70],"investigates":[71],"SDN":[73,85,156,182],"architecture":[74,86],"from":[75,170,176],"perspective.":[78],"This":[79],"article":[80],"proposes":[81],"Deep":[83],"Learning-based":[84],"for":[87,253],"IoT":[88,168,255],"can":[91],"significantly":[92],"enhance":[93],"real-time":[94,154,254],"cyberthreat":[95],"detection.":[96],"Specifically,":[97],"secure":[99],"channel":[101],"is":[102,145,157,190],"first":[103],"designed":[104],"blockchain-based":[107],"authentication":[108],"resist":[110],"well-known":[111],"intruders.":[112],"Second,":[113],"deep":[115],"learning":[116],"convergence":[117],"model":[118,129,140,215],"an":[120,246],"adaptive":[121],"threshold":[122],"scoring":[123],"method":[124],"that":[125],"stops":[126],"all":[127],"local":[128],"training":[130],"allows":[132],"edge":[133,177],"models":[134],"contribute":[136],"cloud":[139,181],"until":[141],"specified":[143],"accuracy":[144],"achieved.":[146],"To":[147],"achieve":[148],"low":[149],"CPU":[150,251],"usage":[151],"provide":[153],"services,":[155],"next":[158],"used":[159],"as":[160,222],"cloud-based":[162],"system":[163],"administrator":[165],"protect":[167],"zero-day":[171],"sending":[174],"requests":[175],"devices":[178],"controller.":[183],"efficiency":[185],"proposed":[188,214],"framework":[189],"demonstrated":[191],"simulations":[193],"two":[195],"different":[196],"network":[197,256],"datasets":[198],"E-IIoT":[199],"ToN-IoT":[201],"against":[202],"various":[203],"results":[207],"compared":[209],"similar":[211],"works.":[212],"effectively":[216],"detects":[217],"mitigates":[219],"cyberthreats":[220],"such":[221],"DDoS,":[223],"Black-Sink-Worm":[224],"hole,":[225],"MitM,":[226],"Ransomware.":[228],"It":[229],"achieves":[230],"high":[231],"performance":[232],"99.15%":[234],"accuracy,":[235],"99.31%":[236],"precision,":[237],"98.97%":[238],"recall,":[239],"99.14%":[242],"F1":[243],"score,":[244],"on":[245],"average":[247],"while":[248],"less":[250],"power":[252],"protection.":[257]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":1}],"updated_date":"2026-05-12T08:28:47.272897","created_date":"2025-10-10T00:00:00"}
