{"id":"https://openalex.org/W4416455440","doi":"https://doi.org/10.7717/peerj-cs.3266","title":"SDN-enabled adaptive security framework for multi-cloud infrastructures using deep learning-based threat detection and policy management","display_name":"SDN-enabled adaptive security framework for multi-cloud infrastructures using deep learning-based threat detection and policy management","publication_year":2025,"publication_date":"2025-11-21","ids":{"openalex":"https://openalex.org/W4416455440","doi":"https://doi.org/10.7717/peerj-cs.3266"},"language":"en","primary_location":{"id":"doi:10.7717/peerj-cs.3266","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3266","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.7717/peerj-cs.3266","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027113790","display_name":"Rashmi Verma","orcid":"https://orcid.org/0000-0002-8786-0104"},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Rashmi Verma","raw_affiliation_strings":["Research Scholar at Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, India"],"raw_orcid":"https://orcid.org/0000-0002-8786-0104","affiliations":[{"raw_affiliation_string":"Research Scholar at Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, India","institution_ids":["https://openalex.org/I102117144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078179158","display_name":"Manisha Jailia","orcid":"https://orcid.org/0000-0002-4291-106X"},"institutions":[{"id":"https://openalex.org/I102117144","display_name":"Banasthali University","ror":"https://ror.org/05ycegt40","country_code":"IN","type":"education","lineage":["https://openalex.org/I102117144"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Manisha Jailia","raw_affiliation_strings":["Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, India"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Banasthali Vidyapith, Banasthali, Rajasthan, India","institution_ids":["https://openalex.org/I102117144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5027113790"],"corresponding_institution_ids":["https://openalex.org/I102117144"],"apc_list":{"value":1395,"currency":"USD","value_usd":1395},"apc_paid":{"value":1395,"currency":"USD","value_usd":1395},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39228077,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"11","issue":null,"first_page":"e3266","last_page":"e3266"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.8137000203132629,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.8137000203132629,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.0406000018119812,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.02969999983906746,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.767300009727478},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.6247000098228455},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.6039999723434448},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5385000109672546},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.447299987077713},{"id":"https://openalex.org/keywords/orchestration","display_name":"Orchestration","score":0.426800012588501},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.41110000014305115},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.38690000772476196},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.3547999858856201},{"id":"https://openalex.org/keywords/enforcement","display_name":"Enforcement","score":0.35280001163482666}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.767300009727478},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.670199990272522},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.6247000098228455},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6222000122070312},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.6039999723434448},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5385000109672546},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.447299987077713},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.426800012588501},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.41110000014305115},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.38690000772476196},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.3547999858856201},{"id":"https://openalex.org/C2779777834","wikidata":"https://www.wikidata.org/wiki/Q4202277","display_name":"Enforcement","level":2,"score":0.35280001163482666},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.3495999872684479},{"id":"https://openalex.org/C83163435","wikidata":"https://www.wikidata.org/wiki/Q3954104","display_name":"Security management","level":2,"score":0.3379000127315521},{"id":"https://openalex.org/C20136886","wikidata":"https://www.wikidata.org/wiki/Q749647","display_name":"Interoperability","level":2,"score":0.32919999957084656},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.32749998569488525},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.32019999623298645},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.3156000077724457},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.30820000171661377},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.2962999939918518},{"id":"https://openalex.org/C2779886121","wikidata":"https://www.wikidata.org/wiki/Q288682","display_name":"XACML","level":3,"score":0.2955999970436096},{"id":"https://openalex.org/C57041688","wikidata":"https://www.wikidata.org/wiki/Q220644","display_name":"Service-oriented architecture","level":3,"score":0.2922999858856201},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.2906999886035919},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.28999999165534973},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.28859999775886536},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.26980000734329224},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.26739999651908875},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.25459998846054077},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.25189998745918274},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2517000138759613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.7717/peerj-cs.3266","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3266","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a74eaab6a4084e1b8b365a7da578e066","is_oa":true,"landing_page_url":"https://doaj.org/article/a74eaab6a4084e1b8b365a7da578e066","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"PeerJ Computer Science, Vol 11, p e3266 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.7717/peerj-cs.3266","is_oa":true,"landing_page_url":"https://doi.org/10.7717/peerj-cs.3266","pdf_url":null,"source":{"id":"https://openalex.org/S4210178049","display_name":"PeerJ Computer Science","issn_l":"2376-5992","issn":["2376-5992"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320104","host_organization_name":"PeerJ, Inc.","host_organization_lineage":["https://openalex.org/P4310320104"],"host_organization_lineage_names":["PeerJ, Inc."],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"PeerJ Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W2968578416","https://openalex.org/W3031267632","https://openalex.org/W3047861058","https://openalex.org/W3111413330","https://openalex.org/W3145266239","https://openalex.org/W3200845768","https://openalex.org/W3200850369","https://openalex.org/W3215803191","https://openalex.org/W4205584976","https://openalex.org/W4234905049","https://openalex.org/W4283738204","https://openalex.org/W4285801505","https://openalex.org/W4289329534","https://openalex.org/W4292411761","https://openalex.org/W4298110865","https://openalex.org/W4303578926","https://openalex.org/W4305033829","https://openalex.org/W4317390695","https://openalex.org/W4319965142","https://openalex.org/W4320920814","https://openalex.org/W4382884928","https://openalex.org/W4386960783","https://openalex.org/W4387213781","https://openalex.org/W4388193534","https://openalex.org/W4391522505","https://openalex.org/W4392821438","https://openalex.org/W4393064740","https://openalex.org/W4399474986","https://openalex.org/W4400322829","https://openalex.org/W4401047161","https://openalex.org/W4402003968","https://openalex.org/W4412628207"],"related_works":[],"abstract_inverted_index":{"Background":[0],"Organizations":[1],"achieve":[2],"agility,":[3],"scalability,":[4,239],"and":[5,18,28,37,43,49,85,112,201,213,216,227,237,256,289],"enhanced":[6],"resource":[7,235],"utilization":[8],"in":[9,15,26,164,284],"multi-cloud":[10,53,275],"environments,":[11],"but":[12],"face":[13],"challenges":[14],"ensuring":[16],"uniform":[17],"robust":[19],"security":[20,29,87,107,173,189,195],"across":[21,125,175,210,254],"diverse":[22],"cloud":[23,126,177,188,211,220],"platforms.":[24],"Variations":[25],"configuration":[27],"mechanisms":[30],"among":[31],"providers":[32],"hinder":[33],"consistent":[34,207,263],"policy":[35,88,108,169,203,208,252,295],"enforcement":[36,109,209,296],"expose":[38],"systems":[39],"to":[40,261],"data":[41],"breaches":[42],"evasive":[44],"threats.":[45],"Additionally,":[46,157],"the":[47,56,97,113,137,144,151,158,165],"dynamic":[48,234],"distributed":[50,122],"nature":[51],"of":[52,93],"operations":[54],"broadens":[55],"attack":[57,83],"surface,":[58],"making":[59],"real-time":[60,106,258],"threat":[61,123,199,259],"mitigation":[62],"more":[63],"complex.":[64],"Methods":[65],"To":[66],"address":[67],"these":[68],"challenges,":[69],"we":[70],"introduced":[71],"a":[72,270],"groundbreaking":[73],"software-defined":[74],"networking":[75],"(SDN)-enabled":[76],"framework":[77,91,268],"that":[78],"incorporates":[79],"deep":[80],"learning":[81],"for":[82,167],"detection":[84,124,200],"adaptive":[86,241],"management.":[89,170,204,299],"The":[90,130,183,231,247,266],"consists":[92],"two":[94],"primary":[95],"components:":[96],"Software-Defined":[98],"Multicloud":[99,114],"Defense":[100],"Controller":[101],"(SDMDC),":[102],"which":[103,120],"enables":[104,250],"centralized,":[105],"(control":[110],"plane),":[111],"Intrusion":[115],"Detection":[116],"System":[117],"Gateways":[118],"(MCIDS-G),":[119],"facilitate":[121],"platforms":[127,255],"(data":[128],"plane).":[129],"SDMDC\u2019s":[131],"integrated":[132],"IDS":[133,147],"is":[134,148,162],"built":[135],"using":[136],"Cross-Cloud":[138],"Threat":[139],"Transformer":[140],"(CCTT)":[141],"model,":[142],"while":[143],"MCIDS-G\u2019s":[145],"regional":[146],"based":[149],"on":[150],"Long":[152],"Short-Term":[153],"Memory":[154],"(LSTM)":[155],"model.":[156],"Lemurs":[159],"Optimizer":[160],"(LO)":[161],"employed":[163],"SDMDC":[166,171,205],"cost-efficient":[168],"enforces":[172],"standards":[174],"all":[176],"environments":[178,212],"where":[179],"applications":[180],"operate.":[181],"Results":[182],"proposed":[184],"solution":[185],"addresses":[186],"long-standing":[187],"issues":[190],"by":[191],"combining":[192],"coordinated":[193],"global":[194],"strategies":[196],"with":[197,297],"automated":[198],"centralized":[202],"ensures":[206],"manages":[214],"ingress/egress":[215],"east\u2013west":[217],"traffic":[218,285],"between":[219],"domains,":[221],"including":[222],"Amazon":[223],"Web":[224],"Service":[225],"(AWS)":[226],"other":[228],"service":[229],"providers.":[230],"architecture":[232],"supports":[233],"orchestration":[236],"horizontal":[238],"enabling":[240],"performance":[242],"under":[243],"varying":[244],"load":[245],"conditions.":[246],"system":[248],"also":[249],"automatic":[251],"implementation":[253],"facilitates":[257],"response":[260],"maintain":[262],"security.":[264],"Conclusion":[265],"presented":[267],"represents":[269],"significant":[271],"advancement":[272],"over":[273],"existing":[274],"protection":[276],"solutions.":[277],"It":[278],"introduces":[279],"new":[280],"research":[281],"directions,":[282],"particularly":[283],"management,":[286],"firewall":[287],"integration,":[288],"fully":[290],"qualified":[291],"domain":[292],"name":[293],"(FQDN)":[294],"proxy":[298]},"counts_by_year":[],"updated_date":"2025-11-28T14:38:25.530388","created_date":"2025-11-23T00:00:00"}
