{"id":"https://openalex.org/W4414293264","doi":"https://doi.org/10.32604/cmc.2025.065850","title":"SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs","display_name":"SDN-Enabled IoT Based Transport Layer DDoS Attacks Detection Using RNNs","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4414293264","doi":"https://doi.org/10.32604/cmc.2025.065850"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.065850","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065850","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.065850","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5043350792","display_name":"Mohammad Nowsin Amin Sheikh","orcid":"https://orcid.org/0009-0008-8430-4023"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Mohammad Nowsin Amin Sheikh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093835909","display_name":"Muhammad Saibtain Raza","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Muhammad Saibtain Raza","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015993437","display_name":"I\u2010Shyan Hwang","orcid":"https://orcid.org/0000-0002-8746-5294"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"I-Shyan Hwang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100617252","display_name":"Md. Alamgir Hossain","orcid":"https://orcid.org/0000-0001-9382-3935"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Md. Alamgir Hossain","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103229182","display_name":"Ihsan Ullah","orcid":"https://orcid.org/0000-0003-0872-4268"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ihsan Ullah","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103144863","display_name":"Tahmid Hasan","orcid":"https://orcid.org/0009-0006-2187-186X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tahmid Hasan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5013890177","display_name":"Mohammad Syuhaimi Ab\u2013Rahman","orcid":"https://orcid.org/0000-0002-7908-1688"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mohammad Syuhaimi Ab-Rahman","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5043350792"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.6666,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.88366695,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":"85","issue":"2","first_page":"4043","last_page":"4066"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.7085999846458435},{"id":"https://openalex.org/keywords/recurrent-neural-network","display_name":"Recurrent neural network","score":0.5898000001907349},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.5552999973297119},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.5512999892234802},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.5156999826431274},{"id":"https://openalex.org/keywords/offset","display_name":"Offset (computer science)","score":0.4625000059604645},{"id":"https://openalex.org/keywords/artificial-neural-network","display_name":"Artificial neural network","score":0.38769999146461487},{"id":"https://openalex.org/keywords/application-layer","display_name":"Application layer","score":0.3691999912261963},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.362199991941452}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7904999852180481},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.7085999846458435},{"id":"https://openalex.org/C147168706","wikidata":"https://www.wikidata.org/wiki/Q1457734","display_name":"Recurrent neural network","level":3,"score":0.5898000001907349},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.5552999973297119},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.5512999892234802},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.5156999826431274},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4878000020980835},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4717999994754791},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.4625000059604645},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3978999853134155},{"id":"https://openalex.org/C50644808","wikidata":"https://www.wikidata.org/wiki/Q192776","display_name":"Artificial neural network","level":2,"score":0.38769999146461487},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3853999972343445},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.3691999912261963},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.362199991941452},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.3562999963760376},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3531000018119812},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.3102000057697296},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.3091999888420105},{"id":"https://openalex.org/C2779304628","wikidata":"https://www.wikidata.org/wiki/Q3503480","display_name":"Face (sociological concept)","level":2,"score":0.30649998784065247},{"id":"https://openalex.org/C195563490","wikidata":"https://www.wikidata.org/wiki/Q180368","display_name":"Network congestion","level":3,"score":0.2962999939918518},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2939999997615814},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.2922999858856201},{"id":"https://openalex.org/C133488467","wikidata":"https://www.wikidata.org/wiki/Q6673524","display_name":"Long short term memory","level":4,"score":0.2858999967575073},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.28529998660087585},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.28220000863075256},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.2732999920845032},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.2671000063419342},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.2508000135421753}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.065850","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065850","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.065850","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.065850","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W2586120503","https://openalex.org/W2791055416","https://openalex.org/W2802252153","https://openalex.org/W2954485493","https://openalex.org/W2963527625","https://openalex.org/W2963613787","https://openalex.org/W2965829475","https://openalex.org/W2975191072","https://openalex.org/W2983571966","https://openalex.org/W3003377235","https://openalex.org/W3006144347","https://openalex.org/W3025641346","https://openalex.org/W3031160330","https://openalex.org/W3037851023","https://openalex.org/W3161554626","https://openalex.org/W4280575251","https://openalex.org/W4285167041","https://openalex.org/W4309635195","https://openalex.org/W4319080686","https://openalex.org/W4365509004","https://openalex.org/W4382281941","https://openalex.org/W4386284232","https://openalex.org/W4386963944","https://openalex.org/W4387437810","https://openalex.org/W4387451288","https://openalex.org/W4390483481","https://openalex.org/W4390913672","https://openalex.org/W4391233295","https://openalex.org/W4392655974","https://openalex.org/W4393142222","https://openalex.org/W4394891689","https://openalex.org/W4395097557","https://openalex.org/W4400441570"],"related_works":[],"abstract_inverted_index":{"The":[0,134],"rapid":[1],"advancement":[2],"of":[3,6,13,33,91],"the":[4,11,31,48,88,120,124,129,148,169],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9,113],"heightened":[10],"importance":[12],"security,":[14],"with":[15],"a":[16,56],"notable":[17],"increase":[18],"in":[19,168],"Distributed":[20],"Denial-of-Service":[21],"(DDoS)":[22],"attacks":[23,143],"targeting":[24],"IoT":[25,45],"devices.":[26],"Network":[27,70,79,84],"security":[28,46],"specialists":[29],"face":[30],"challenge":[32],"producing":[34],"systems":[35],"to":[36,101,140],"identify":[37,141],"and":[38,81,86,107,128,152,158,166],"offset":[39],"these":[40],"attacks.":[41],"This":[42],"research":[43,112],"manages":[44],"through":[47],"emerging":[49],"Software-Defined":[50],"Networking":[51],"(SDN)":[52],"standard":[53],"by":[54,161],"developing":[55],"unified":[57],"framework":[58],"(RNN-RYU).":[59],"We":[60],"thoroughly":[61],"assess":[62],"multiple":[63],"deep":[64],"learning":[65],"frameworks,":[66],"including":[67],"Convolutional":[68,77],"Neural":[69,78,83],"(CNN),":[71],"Long":[72],"Short-Term":[73],"Memory":[74],"(LSTM),":[75],"Feed-Forward":[76],"(FFCNN),":[80],"Recurrent":[82],"(RNN),":[85],"present":[87],"novel":[89],"usage":[90],"Synthetic":[92],"Minority":[93],"Over-Sampling":[94],"Technique":[95],"(SMOTE)":[96],"tailored":[97],"for":[98],"IoT-SDN":[99],"contexts":[100],"manage":[102],"class":[103],"imbalance":[104],"during":[105],"training":[106],"enhance":[108],"performance":[109],"metrics.":[110],"Our":[111],"significant":[114],"practical":[115],"implications":[116],"as":[117],"we":[118],"authenticate":[119],"approache":[121],"using":[122],"both":[123],"self-generated":[125],"SD_IoT_Smart_City":[126],"dataset":[127],"publicly":[130],"available":[131],"CICIoT23":[132],"dataset.":[133],"system":[135],"utilizes":[136],"only":[137],"eleven":[138],"features":[139],"DDoS":[142,156],"efficiently.":[144],"Results":[145],"indicate":[146],"that":[147],"RNN":[149],"can":[150],"reliably":[151],"precisely":[153],"differentiate":[154],"between":[155],"traffic":[157,160],"benign":[159],"easily":[162],"identifying":[163],"temporal":[164],"relationships":[165],"sequences":[167],"data.":[170]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-10T00:00:00"}
