Systems 11 00296 With Cover
Systems 11 00296 With Cover
Article
Amran Mansoor, Mohammed Anbar, Abdullah Ahmed Bahashwan, Basim Ahmad Alabsi and
Shaza Dawood Ahmed Rihan
https://doi.org/10.3390/systems11060296
systems
Article
Deep Learning-Based Approach for Detecting DDoS Attack on
Software-Defined Networking Controller
Amran Mansoor 1 , Mohammed Anbar 1, * , Abdullah Ahmed Bahashwan 1 , Basim Ahmad Alabsi 2
and Shaza Dawood Ahmed Rihan 2
1 National Advanced IPv6 Centre (NAv6), Universiti Sains Malaysia, Gelugor 11800, Penang, Malaysia;
[email protected] (A.A.B.)
2 Applied College, Najran University, King Abdulaziz Street, Najran 11001, Saudi Arabia
* Correspondence: [email protected]
Abstract: The rapid growth of cloud computing has led to the development of the Software-Defined
Network (SDN), which is a network strategy that offers dynamic management and improved per-
formance. However, security threats are a growing concern, particularly with the SDN controller
becoming an attractive target for malicious actors and potential Distributed Denial of Service (DDoS)
attacks. Many researchers have proposed different approaches to detecting DDoS attacks. However,
those approaches suffer from high false positives, leading to low accuracy, and the main reason
behind this is the use of non-qualified features and non-realistic datasets. Therefore, the deep learning
(DL) algorithmic technique can be utilized to detect DDoS attacks on SDN controllers. Moreover, the
proposed approach involves three stages, (1) data preprocessing, (2) cross-feature selection, which
aims to identify important features for DDoS detection, and (3) detection using the Recurrent Neural
Networks (RNNs) model. A benchmark dataset is employed to evaluate the proposed approach
via standard evaluation metrics, including false positive rate and detection accuracy. The findings
indicate that the recommended approach effectively detects DDoS attacks with average detection
accuracy, average precision, average FPR, and average F1-measure of 94.186%, 92.146%, 8.114%, and
94.276%, respectively.
Citation: Mansoor, A.; Anbar, M.; Keywords: deep learning; Recurrent Neural Networks; Distributed Denial of Service; Software-
Bahashwan, A.A.; Alabsi, B.A.; Rihan, Defined Networking
S.D.A. Deep Learning-Based
Approach for Detecting DDoS Attack
on Software-Defined Networking
Controller. Systems 2023, 11, 296.
1. Introduction
https://doi.org/10.3390/
systems11060296
SDN is an innovative network architecture that enhances network performance by
decoupling the two major planes: the control plane and the data plane [1]. The SDN
Academic Editor:Vladimír Bureš controller manages, controls, and enables OpenFlow forwarding rules, serving as a logical
Received: 4 May 2023 node [1]. As described by [2], an SDN comprises two primary tiers: the management plane
Revised: 6 June 2023 (housing the SDN controller) and the information plane (consisting of OpenFlow switches).
Accepted: 7 June 2023 Modern cloud computing and hyper-scale cloud architecture have significantly in-
Published: 9 June 2023 creased the popularity of SDN. This is attributed to its ability to enhance network efficiency
and streamline administration processes. By separating the data and control planes, SDN
enables logical management within a physical network architecture. However, despite its
technological advancements, SDN introduces new security concerns, especially in light
Copyright: © 2023 by the authors. of existing and emerging threats [3–5]. One particular area of concern is the vulnerability
Licensee MDPI, Basel, Switzerland. of SDN controllers to DDoS attacks. In an SDN network, DDoS attacks pose a significant
This article is an open access article
threat to the controller. Figure 1 illustrates the impact of DDoS attacks targeting the SDN
distributed under the terms and
network controller.
conditions of the Creative Commons
Additionally, DDoS attacks are typically executed by leveraging numerous compro-
Attribution (CC BY) license (https://
mised machines to generate a massive influx of traffic toward the target machine or SDN
creativecommons.org/licenses/by/
controller. Consequently, the targeted machine faces an overwhelming resource burden as
4.0/).
it attempts to process the influx of network traffic, rendering it unable to fulfill its intended
functions. Over time, DDoS attacks have become increasingly prevalent and destructive,
capable of disrupting a wide range of network services. Furthermore, they are notori-
ously challenging to detect and mitigate effectively. Therefore, the timely detection and
prevention of DDoS attacks represent critical concerns for network service providers. Re-
grettably, the SDN controller lacks an integrated security defense system that can efficiently
distinguish between normal and abnormal network traffic [6,7].
• Evaluating the proposed model and demonstrating its promising findings through
various evaluation metrics, including false positive rate, F1 score, detection accuracy,
and precision. The results highlight the effectiveness and reliability of the proposed
approach.
The remaining sections of this research paper are structured as follows: Section 2
underlines the background. Sections 3–5 underline the associated works, discussion on
preliminaries of the proposed approach, and the DLADSC approach, respectively. Section 6
discusses the results of the experiments. Section 7 discusses the findings of the research
and provides further analysis and interpretation of the results. Finally, Section 8 concludes
the research paper, summarizing the main contributions and discussing potential future
research directions.
2. Background
This section provides an overview of the SDN architecture, discusses the role of
SDN controllers and the OpenFlow protocol, and highlights the significance of DL-based
approaches in the context of SDN networks.
2.1. SDN
SDN is a network architecture that fundamentally revolutionizes the design and man-
agement of modern network architectures, especially in today’s hyper-scale data centers
where extremely large networks are prevalent [13]. It involves the centralized control,
management, and configuration of all networking devices from a single controller [13].
The SDN architecture is typically represented in layers or planes, as illustrated in Figure 2,
which depicts the three layers: forwarding or infrastructure, control, and applications.
2.3. DL Approaches
Artificial intelligence (AI) is a rapidly evolving field with numerous practical appli-
cations and ongoing research interests. It enables the development of intelligent software
capable of automating tasks, analyzing images, understanding conversations, making
medical diagnoses, creating smart infrastructure, empowering individuals with physical
disabilities, and supporting scientific research. Machine learning (ML) serves as the foun-
dation for most AI solutions. With the vast amount of data available today, we can utilize it
to train ML models that can make predictions and draw inferences based on the patterns
and associations present in the data. AI, ML, and deep learning (DL) share a relationship
where DL is a type of representation learning, and ML is utilized in many, though not all,
AI systems. Each section of the Venn diagram in Figure 4 also provides an example of AI
technology [17].
Figure 4. Venn Diagram Representing the Relationships Between AI, ML and DL.
In summary, CNN, RNN, and LSTM are all popular DL approaches that have been
widely used in various domains, and every one of these approaches has its strengths and
limitations, making them suitable for different types of takes. The choice of DL models is
based on the specific problem domain and the characteristics of the data being processed.
3. Related Works
This section reviews the existing ML and DL-based approaches for detecting DDoS
against an SDN controller. This section consists of two subsections: ML-based approaches
and DL-based approaches.
showed low accuracy and detection rate performance. Additionally, the authors provided
limited information about the dataset and the types of DDoS attacks considered.
The ML-based approaches are listed in Table 2 along with their drawbacks.
Detection
Method SDN SDN
Author and Ref. Accuracy Limitations
Dataset Domain
ML DL High Low
Achieves low performance.
Sudar et al. [8] ✓ ✗ ✗ ✓ ✗ ✓
Using non-SDN dataset.
The approach is evaluated using a non-SDN
Wan et al. [9] ✗ ✓ ✗ ✓ ✓ ✗
dataset.
The approach is evaluated using a
Alanazi et al. [10] ✗ ✓ ✗ ✓ ✓ ✗
dataset not suitable for the SDN network.
Achieves low performance.
Deepa et al. [11] ✓ ✗ ✓ ✓ ✗ ✓ Inadequate information about the dataset
and the types of attacks involving DDoS.
Achieves low detection accuracy for SDN
Santos et al. [12] ✓ ✗ ✓ ✓ ✗ ✓
controller DDoS attacks.
Systems 2023, 11, 296 8 of 21
Table 2. Cont.
Detection
Method SDN SDN
Author and Ref. Accuracy Limitations
Dataset Domain
ML DL High Low
The approach performs at Controller,
increasing the workload during attacks.
Khashab et al. [24] ✓ ✗ ✓ ✓ ✓ ✗ It is recommended to select relevant features that
increase other ML algorithms’ system performance
and detection accuracy.
Achieves low performance.
Celesova et al. [25] ✓ ✗ ✗ ✓ ✗ ✓
Uses a non-SDN dataset.
Achieves low performance.
Hsieh et al. [26] ✗ ✓ ✓ ✓ ✗ ✓ The proposed approach operated at the controller,
which increases the overhead during DDoS attacks.
A lack of information about the
Lee et al. [27] ✗ ✓ - ✓ ✓ ✗
dataset and the used traffic features.
The approach is evaluated using
a non-SDN dataset.
Boukria et al. [28] ✗ ✓ ✗ ✓ ✓ ✗
It is limited to protecting the communication
channels only.
As shown in Table 2, several approaches in the literature have achieved low detec-
tion accuracies, such as those of Santos et al. [12], Sudar et al. [8], Celesova et al. [25],
Hsieh et al. [26], and Deepa et al. [11]. Additionally, some of these approaches have
been evaluated using non-SDN datasets, including Celesova et al. [25], Sudar et al. [8],
Boukria et al. [28], and Alanazi et al. [10]. Moreover, most of the existing approaches are
implemented on SDN controllers, which can increase overhead during DDoS attacks. Over-
all, the proposed system addresses these limitations by offering an RNN-based approach
to detect DDoS attacks in the context of SDN with low FPR and high detection accuracy.
4. Preliminaries
This preliminary section aims to address the security concerns that arise within the
layers of SDN. SDN architectures encompass multiple layers, including the forwarding
or infrastructure layer, the controlling layer, and the applications layer. However, each of
these layers is susceptible to various security vulnerabilities and threats.
enforcement security can impact the upper layers, while attacks on the authorization
process may deny users access to the controller.
Security Threats in SDN Layers Data Layer Controller Layer Application Layer
Unauthorized application. ✗ ✓ ✓
Illegitimate Access
Hijacking SDN controller. ✓ ✓ ✗
Lack of TLS implementation. ✓ ✓ ✓
Configuration Issues
Enforcement of policy. ✓ ✓ ✓
Flooding controller. ✓ ✓ ✗
DoS Attack
Flooding switch. ✓ ✗ ✗
Modification Data Data flow tampering. ✓ ✓ ✗
Credential management. ✗ ✓ ✗
Data Leakage
Forwarding policy discovery. ✗ ✓ ✗
Various forms of malicious attacks can compromise the security of SDN networks,
including DDoS attacks, ARP spoofing attacks, packet sniffing, API exploitation, and guess-
ing the passwords or brute force attacks [30]. This research takes into account a mechanism
for aggregating feature selection that contributes to detecting DDoS attacks. We recommend
a DL RNN-based approach, which will be discussed as follows.
5. DLADSC Approach
This section presents the proposed approach, a Deep Learning-Based Approach for
Detecting DDoS Attacks on a Software-Defined Networking Controller (DLADSC), which
aims to detect DDoS attacks by identifying distinctive features that differentiate DDoS
network traffic from regular traffic. DLADSC consists of three stages: data preprocessing,
cross-feature selection, and an RNN-based model for detecting DDoS attacks. Each stage
plays a crucial role in the overall detection process.
The first stage involves data preprocessing, where the input data are prepared for
further analysis. This includes applying necessary transformations and normalization
techniques to ensure the data are suitable for feature extraction and selection. By cleaning
and organizing the data, they become more suitable for accurate detection.
Systems 2023, 11, 296 10 of 21
The second stage focuses on cross-feature selection, which is essential for identifying
the most important features in detecting DDoS attacks on the SDN controller. This is
achieved through the use of feature selection techniques such as Chi-square and IGR.
By selecting the most relevant features, the detection accuracy can be improved significantly,
leading to a more effective identification of DDoS attacks.
Once the features are selected, they are utilized in training the RNN-based detection
model. The RNN model is designed to capture the temporal patterns and dependencies
present in network traffic, making it well-suited for detecting DDoS attacks. By utilizing
the selected features, the model can learn and classify incoming traffic as either normal
or malicious.
Figure 5 provides a visual representation of these three stages, illustrating the flow of
the proposed approach. In the following sections, each stage will be described in detail,
highlighting their significance in achieving accurate and robust DDoS attack detection on
SDN controllers.
was created through network simulations that included both benign traffic (TCP, UDP, ICMP)
and various types of malicious traffic, such as TCP Syn, ICMP, and UDP Flood attacks.
Table 4 provides a detailed description of the benchmark dataset, highlighting its
characteristics that closely mimic a real-world SDN network environment. To ensure the
quality and effectiveness of the dataset, thorough preprocessing is essential before feeding
it into the DL model.
Specification Details
Total Number of Records 175,305
Number of Attack Records 43,446
Number of Normal Records 131,859
Type of Category Attack and Normal.
Normal Classes TCP, UDP, and ICMP
Abnormal Classes ICMP, TCP Syn, and UDP Flooding Attacks
Total Number of Features in the Dataset 22 features
- Packet rate is the number of packets sent per second and is calculated by
dividing the packet per flow by monitoring interval.
- Packet per flow, which is the packet count during a single flow.
- Total flow entries in the switch.
The Calculated Features
- A number of Packet_ins messages.
- Port Bandwidth is the sum of tx_kbps and rx_kbps.
- Byte per flow is the byte count during a single flow.
- tx_kbps, rx_kbps represent the data transfer and receiving rate.
1. Data scrubbing or data cleaning refers to the process of correcting or eliminating data
that is duplicated, corrupted, improperly formatted, or incomplete within a dataset.
2. The data transformation process involves converting data from one format or struc-
ture into another, for example, transforming string data into numerical data so that it
applies to DL algorithms.
3. Data normalization is to minimize or even exclude duplicated data. The Mix–Max
scaler is one of the common methods to normalize the input features or variables.
It transforms all features into the range between 0 and 1. To avoid bias caused by
features that have been measured at different scales and that do not equally contribute
to model fitting, we implement a normalization approach. Specifically, we adopt
feature-wise normalization, such as Min–Max scaling, to standardize feature vectors,
as depicted in Equation (1).
x − xmin
xScale = (1)
xmin − xmin
4. The data-balancing approach is used to ensure that the two classes in the dataset
(normal and attack) are distributed evenly. Table 4, for example, displays an im-
balanced class distribution with 131,859 normal records and 43,446 attack records.
We utilized the SMOTE oversampling method [33] to boost the number of normal
Systems 2023, 11, 296 12 of 21
classes to 131,859 data points in order to address this issue. The accuracy of data
categorization is greatly helped by this balancing process.
( f i ) = {switch, dt, src, dst, bytecount, dur, pktcount dur_nsec, tot_dur, f lows,
packetins, pktper f low, yteper f low, Pair f low, pktrate Protocol, port_no, tx_bytes, (2)
rx_bytes, _kbpsrx_kbps, tx_kbpstot}.
In a nutshell, the f f inal is used as input for the next phase. Figure 6 depicts the
cross-feature selection mechanism process.
6. Results of Experiment
Here, we explain the experimental outcomes and provide the metrics used to assess
the proposed approach.
Class Prediction
Normal Attack
Actual Class False Negative (FN) True Positive (TP)
True Negative (TN) False Positive (FP)
Where True Positive (TP) means that the classifier identified the attack accurately,
False Negative (FN) represents occasions when an attack was mistakenly labeled to be
normal by the classifier, False Positive (FP) means that the classifier has mistakenly labeled
Systems 2023, 11, 296 14 of 21
a benign instance as malicious, and True Negative (TN) represents instances in which the
classifier appropriately classified normal instances. Additionally, other evaluation metrics,
such as precision, false alarm rate (FAR), detection accuracy (DA), and F-measure, are also
used by researchers in their studies as described below:
• FAR (False Alarm Rate): This metric is used to determine how many attack samples
were mistakenly predicted relative to the total number of normal samples. The follow-
ing Equation (4) is used to calculate FAR:
FP
FAR = (4)
TN + FP
• Precision: This metric represents the percentage of attacks successfully predicted from
a set of test samples. Equation (5) can be used to calculate precision:
TP
Precision = (5)
TP + FP
• F1-Measure: This metric is the harmonic mean of precision and recall and is used to
evaluate the accuracy of a system. The below Equation (6) is used to calculate the F1
measure:
Precision × Recall
F1 Measure = 2 × ( ) (6)
Precision + Recall
• DA (Detection Accuracy): The proportion of correctly labeled cases relative to the
total number of instances is what this indicator measures. However, it is only useful
when a balanced dataset is used. The accuracy can be calculated using Equation (7):
TP + TN
DA = (7)
TP + TN + FP + FN
The performance evaluation metrics utilized in this study are widely accepted in the
field to assess IDS performance [34]. Hence, the proposed approach is evaluated using all
these metrics.
Based on the comparison tabulated in Table 11, the proposed DLADSC approach
achieved remarkable performance with a detection accuracy of 94.186%, precision of
92.146%, FPR of 8.114%, F-measure of 94.276%, and a detection time of 1.627 s. In contrast,
Hsieh et al.’s SPIFFY approach achieved slightly lower results with a detection accuracy of
91.976%, precision of 91.772%, FPR of 8.138%, F-measure of 91.932%, and a detection time
of 1.618 s. Furthermore, Boukria et al.’s DL logarithm function approach showed compara-
tively lower performance with a detection accuracy of 93.203%, precision of 88.472%, FPR
of 12.746%, F-measure of 93.546%, and a detection time of 1.681 s.
The superior performance of the proposed DLADSC approach can be attributed to
the effective cross-feature selection mechanism, which aims to identify the most relevant
features (f) for detecting DDoS flooding attacks on the SDN controller. This approach
outperformed both the SPIFFY approach and the DL logarithm function approach in terms
of detection accuracy, precision, FPR, and F-measure. Additionally, the proposed approach
demonstrated a relatively lower detection time, indicating its efficiency and effectiveness
in detecting DDoS attacks.
coders to assess their performance in detecting DDoS attacks on SDN controllers. Secondly,
employing various feature selection algorithms could help identify features that enhance
the SDN controller’s ability to detect DDoS attacks. Lastly, optimizing the hyperparameter
values of the RNN model using bio-inspired algorithms such as gray wolf and whale could
lead to further improvements in performance.
Author Contributions: Conceptualization, designing, A.M., M.A. and A.A.B.; Methodology, M.A.;
Writing the original draft, A.M., M.A. and A.A.B.; Writing—review and editing, A.M., M.A., A.A.B.,
B.A.A. and S.D.A.R.; Supervision, M.A.; Funding acquisition, B.A.A. and S.D.A.R. All authors have
read and agreed to the published version of the manuscript.
Funding: The authors are thankful to the Deanship of Scientific Research at Najran University for
funding this work under the Research Groups Funding program grant code (NU/RG/SERC/12/50).
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest.
References
1. Aladaileh, M.A.; Anbar, M.; Hasbullah, I.H.; Bahashwan, A.A.; Al-Sarawn, S. Dynamic Threshold-Based Approach to Detect
Low-Rate DDoS Attacks on Software-Defined Networking Controller. Comput. Mater. Contin. 2022, 73, 1403–1416. [CrossRef]
2. Zubaydi, H.D.; Anbar, M.; Wey, C.Y. Review on detection techniques against DDoS attacks on a software-defined networking
controller. In Proceedings of the 2017 Palestinian International Conference on Information and Communication Technology
(PICICT), Gaza, Palestine, 8–9 May 2017; pp. 10–16. [CrossRef]
3. Alanazi, S.T.; Anbar, M.; Karuppayah, S.; Al-Ani, A.K.; Sanjalawe, Y.K. Detection Techniques for DDoS Attacks in Cloud
Environment: Review Paper. In Proceedings of the Intelligent and Interactive Computing, Melaka, Malaysia, 17 May 2019;
Lecture Notes in Networks and Systems; Springer: Singapore, 2019; pp. 337–354. [CrossRef]
4. Deeb Al-Mo, A.A.; Wan, T.C.; Al-Saedi, K.; Altaher, A.; Ramadass, S.; Manasrah, A.; Melhiml, L.B.; Anbar, M. An online model on
evolving phishing e-mail detection and classification method. J. Appl. Sci. 2011, 11, 3301–3307. [CrossRef]
5. Bahashwan, A.A.; Anbar, M.; Abdullah, N. New architecture design of cloud computing using software defined networking
and network function virtualization technology. In Proceedings of the International Conference of Reliable Information and
Communication Technology, 2019 (IRICT 2019), Johor, Malaysia, 22–23 September 2019; pp. 705–713. [CrossRef]
6. Mousavi, S.M.; St-Hilaire, M. Early detection of DDoS attacks against SDN controllers. In Proceedings of the 2015 International
Conference on Computing, Networking and Communications (ICNC), Garden Grove, CA, USA, 16–19 February 2015; pp. 77–81.
[CrossRef]
7. Aladaileh, M.A.; Anbar, M.; Hintaw, A.J.; Hasbullah, I.H.; Bahashwan, A.A.; Al-Sarawi, S. Renyi Joint Entropy-Based Dynamic
Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates. Appl. Sci. 2022, 12, 6127.
[CrossRef]
8. Sudar, K.M.; Beulah, M.; Deepalakshmi, P.; Nagaraj, P.; Chinnasamy, P. Detection of Distributed Denial of Service Attacks in SDN
using Machine learning techniques. In Proceedings of the 2021 International Conference on Computer Communication and
Informatics (ICCCI), Coimbatore, India, 27–29 January 2021; pp. 1–5. [CrossRef]
9. Wan, L.; Wang, Q.; Zheng, S. Deep SSAE-BiLSTM Model for DDoS Detection In SDN. In Proceedings of the 2nd International
Conference on Computer Communication and Network Security (CCNS), Xining, China, 30 July–1 August 2021; pp. 1–4.
[CrossRef]
10. Alanazi, F.; Jambi, K.; Eassa, F.; Khemakhem, M.; Basuhail, A.; Alsubhi, K. Ensemble Deep Learning Models for Mitigating DDoS
Attack in Software-Defined Network. Intell. Autom. Soft Comput. 2022, 33, 923–938. [CrossRef]
11. Deepa, V.; Sudar, K.M.; Deepalakshmi, P. Detection of DDoS attack on SDN control plane using hybrid machine learning
techniques. In Proceedings of the 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli,
India, 13–14 December 2018; pp. 299–303. [CrossRef]
12. Santos, R.; Souza, D.; Santo, W.; Ribeiro, A.; Moreno, E. Machine learning algorithms to detect DDoS attacks in SDN. Concurr.
Comput. Pract. Exp. 2020, 32, e5402. [CrossRef]
13. Goransson, P.; Black, C.; Culver, T. Software Defined Networks: A Comprehensive Approach; Morgan Kaufmann: Burlington, MA,
USA, 2015.
14. Bahashwan, A.A.; Anbar, M.; Manickam, S.; Al-Amiedy, T.A.; Aladaileh, M.A.; Hasbullah, I.H. A Systematic Literature Review
on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking. Sensors
2023, 23, 4441. [CrossRef] [PubMed]
Systems 2023, 11, 296 21 of 21
15. Nadeau, T.D.; Gray, K. SDN: Software Defined Networks: An Authoritative Review of Network Programmability Technologies; O’Reilly
Media, Inc.: Sebastopol, CA, USA, 2013.
16. Stallings, W. Software-defined networks and openflow. Internet Protoc. J. 2013, 16, 2–14.
17. Goodfellow, I.; Bengio, Y.; Courville, A. Deep Learning; MIT Press: Cambridge, MA, USA, 2016.
18. Schmidhuber, J. Deep learning in neural networks: An overview. Neural Netw. 2015, 61, 85–117. [CrossRef] [PubMed]
19. Elejla, O.E.; Anbar, M.; Hamouda, S.; Faisal, S.; Bahashwan, A.A.; Hasbullah, I.H. Deep-Learning-Based Approach to Detect
ICMPv6 Flooding DDoS Attacks on IPv6 Networks. Appl. Sci. 2022, 12, 6150. [CrossRef]
20. LeCun, Y.; Bengio, Y. Convolutional networks for images, speech, and time series. Handb. Brain Theory Neural Netw. 1995,
3361, 1995.
21. Pan, X.; Yang, Y.; Xia, C.Q.; Mirza, A.H.; Shen, H.B. Recent methodology progress of deep learning for RNA–protein interaction
prediction. Wiley Interdiscip. Rev. RNA 2019, 10, e1544. [CrossRef] [PubMed]
22. Dongare, A.; Kharde, R.; Kachare, A.D. Introduction to artificial neural network. Int. J. Eng. Innov. Technol. (IJEIT) 2012,
2, 189–194.
23. Karhunen, J.; Raiko, T.; Cho, K. Chapter 7—Unsupervised deep learning: A short review. In Advances in Independent Component
Analysis and Learning Machines; Bingham, E., Kaski, S., Laaksonen, J., Lampinen, J., Eds.; Academic Press: Cambridge, MA, USA,
2015; pp. 125–142. [CrossRef]
24. Khashab, F.; Moubarak, J.; Feghali, A.; Bassil, C. DDoS attack detection and mitigation in SDN using machine learning. In
Proceedings of the 2021 IEEE 7th International Conference on Network Softwarization (NetSoft), Tokyo, Japan, 28 June–2 July
2021; pp. 395–401. [CrossRef]
25. Celesova, B.; Val’ko, J.; Grezo, R.; Helebrandt, P. Enhancing security of SDN focusing on control plane and data plane. In
Proceedings of the 2019 7th International Symposium on Digital Forensics and Security (ISDFS), Barcelos, Portugal, 10–12 June
2019; pp. 1–6. [CrossRef]
26. Hsieh, C.H.; Wang, W.K.; Wang, C.X.; Tsai, S.C.; Lin, Y.B. Efficient Detection of Link-Flooding Attacks with Deep Learning.
Sustainability 2021, 13, 12514. [CrossRef]
27. Lee, T.H.; Chang, L.H.; Syu, C.W. Deep learning enabled intrusion detection and prevention system over SDN networks. In
Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11
June 2020; pp. 1–6. [CrossRef]
28. Boukria, S.; Guerroumi, M. Intrusion detection system for SDN network using deep learning approach. In Proceedings of the
2019 International Conference on Theoretical and Applicative Aspects of Computer Science (ICTAACS), Skikda, Algeria, 15–16
December 2019; Volume 1, pp. 1–6. [CrossRef]
29. Akhunzada, A.; Ahmed, E.; Gani, A.; Khan, M.K.; Imran, M.; Guizani, S. Securing software defined networks: Taxonomy,
requirements, and open issues. IEEE Commun. Mag. 2015, 53, 36–44. [CrossRef]
30. Pradhan, A.; Mathew, R. Solutions to Vulnerabilities and Threats in Software Defined Networking (SDN). Procedia Comput. Sci.
2020, 171, 2581–2589. [CrossRef]
31. Amidi, A.; Amidi, S. Vip Cheatsheet: Recurrent Neural Networks; Stanford University: Stanford, CA, USA, 2018 .
32. Ahuja, N.; Singal, G.; Mukhopadhyay, D. DDOS attack SDN dataset. Mendeley Data 2020, 1. [CrossRef]
33. Fernández, A.; Garcia, S.; Herrera, F.; Chawla, N.V. SMOTE for learning from imbalanced data: Progress and challenges, marking
the 15-year anniversary. J. Artif. Intell. Res. 2018, 61, 863–905. [CrossRef]
34. Anbar, M.; Abdullah, R.; Al-Tamimi, B.N.; Hussain, A. A machine learning approach to detect router advertisement flooding
attacks in next-generation IPv6 networks. Cogn. Comput. 2018, 10, 201–214. [CrossRef]
35. Ullah, I.; Mahmoud, Q.H. Design and Development of a Deep Learning-Based Model for Anomaly Detection in IoT Networks.
IEEE Access 2021, 9, 103906–103926. [CrossRef]
36. Iqbal, M.; Rizwan, M. Application of 80/20 rule in software engineering Waterfall Model. In Proceedings of the 2009 International
Conference on Information and Communication Technologies, Karachi, Pakistan, 15–16 August 2009; pp. 223–228. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.