{"id":"https://openalex.org/W4377008974","doi":"https://doi.org/10.1109/access.2023.3277397","title":"Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques","display_name":"Detecting and Mitigating Botnet Attacks in Software-Defined Networks Using Deep Learning Techniques","publication_year":2023,"publication_date":"2023-01-01","ids":{"openalex":"https://openalex.org/W4377008974","doi":"https://doi.org/10.1109/access.2023.3277397"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3277397","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10128125.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10128125.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004863525","display_name":"Muhammad Waqas Nadeem","orcid":"https://orcid.org/0000-0002-9195-9529"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Muhammad Waqas Nadeem","raw_affiliation_strings":["Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086673383","display_name":"Hock Guan Goh","orcid":"https://orcid.org/0000-0003-2416-5777"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Hock Guan Goh","raw_affiliation_strings":["Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053649812","display_name":"Yichiet Aun","orcid":"https://orcid.org/0000-0001-5977-7912"},"institutions":[{"id":"https://openalex.org/I931681460","display_name":"Universiti Tunku Abdul Rahman","ror":"https://ror.org/050pq4m56","country_code":"MY","type":"education","lineage":["https://openalex.org/I931681460"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Yichiet Aun","raw_affiliation_strings":["Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia"],"affiliations":[{"raw_affiliation_string":"Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia","institution_ids":["https://openalex.org/I931681460"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041935786","display_name":"Vasaki Ponnusamy","orcid":"https://orcid.org/0000-0002-7761-9552"},"institutions":[{"id":"https://openalex.org/I119744171","display_name":"Higher Colleges of Technology","ror":"https://ror.org/00qmy9z88","country_code":"AE","type":"education","lineage":["https://openalex.org/I119744171"]}],"countries":["AE"],"is_corresponding":false,"raw_author_name":"Vasaki Ponnusamy","raw_affiliation_strings":["Fujairah Men’s Campus, Higher Colleges of Technology, Fujairah, United Arab Emirates"],"affiliations":[{"raw_affiliation_string":"Fujairah Men’s Campus, Higher Colleges of Technology, Fujairah, United Arab Emirates","institution_ids":["https://openalex.org/I119744171"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850,"provenance":"doaj"},"fwci":7.502,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":19,"citation_normalized_percentile":{"value":0.809319,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"11","issue":null,"first_page":"49153","last_page":"49171"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.8842096},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7660532},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.5877788}],"concepts":[{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.8842096},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.87023056},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8176631},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7660532},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6116579},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.5877788},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.5492027},{"id":"https://openalex.org/C165136773","wikidata":"https://www.wikidata.org/wiki/Q1363179","display_name":"Single point of failure","level":2,"score":0.4815955},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.43868},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.43130723},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42668104},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41068614},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.37491006},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37089118},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.36515862},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11709222},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3277397","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10128125.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2023.3277397","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/10005208/10128125.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":45,"referenced_works":["https://openalex.org/W2519428799","https://openalex.org/W2560162835","https://openalex.org/W2625013748","https://openalex.org/W2752291283","https://openalex.org/W2799843691","https://openalex.org/W2921382838","https://openalex.org/W2956839102","https://openalex.org/W2981025625","https://openalex.org/W2999113954","https://openalex.org/W2999221729","https://openalex.org/W3003591012","https://openalex.org/W3005630930","https://openalex.org/W3009543108","https://openalex.org/W3014544816","https://openalex.org/W3015447130","https://openalex.org/W3025125719","https://openalex.org/W3042433202","https://openalex.org/W3047132966","https://openalex.org/W3081430061","https://openalex.org/W3082263548","https://openalex.org/W3083616926","https://openalex.org/W3091945716","https://openalex.org/W3102091066","https://openalex.org/W3122864121","https://openalex.org/W3181610599","https://openalex.org/W3197983285","https://openalex.org/W3198565628","https://openalex.org/W3201440045","https://openalex.org/W3209291644","https://openalex.org/W3211772915","https://openalex.org/W4212986808","https://openalex.org/W4244657151","https://openalex.org/W4281615114","https://openalex.org/W4282003105","https://openalex.org/W4283368000","https://openalex.org/W4284700239","https://openalex.org/W4293577564","https://openalex.org/W4306168955","https://openalex.org/W4310353354","https://openalex.org/W4311089294","https://openalex.org/W4312863192","https://openalex.org/W4313516700","https://openalex.org/W4319316360","https://openalex.org/W4319350107","https://openalex.org/W4319997993"],"related_works":["https://openalex.org/W4377008240","https://openalex.org/W4230824443","https://openalex.org/W4220837700","https://openalex.org/W2559738661","https://openalex.org/W2558363974","https://openalex.org/W2295167007","https://openalex.org/W2097156747","https://openalex.org/W2038807247","https://openalex.org/W2012852954","https://openalex.org/W1675062406"],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN)":[2],"is":[3,139,180],"an":[4,132],"emerging":[5],"architecture":[6],"that":[7,199,206,243],"enables":[8],"flexible":[9],"and":[10,13,21,30,38,48,63,66,85,106,118,149,163,170,197,219,250,264],"easy":[11],"management":[12],"communication":[14],"of":[15,61,71,75,88,122,157,177,210,215,223,234,257],"large-scale":[16],"networks.":[17],"It":[18],"offers":[19],"programmable":[20],"centralized":[22],"interfaces":[23],"for":[24,36,141,261,266],"making":[25],"complex":[26],"network":[27,42],"decisions":[28],"dynamically":[29],"seamlessly.":[31],"However,":[32],"SDN":[33],"provides":[34],"opportunities":[35],"businesses":[37],"individuals":[39],"to":[40,56,91,126,152,181,190],"build":[41],"applications":[43,101],"based":[44,237],"on":[45,238],"their":[46,50],"demands":[47],"improve":[49],"services.":[51],"In":[52,113],"contrast,":[53],"it":[54],"started":[55],"face":[57],"a":[58,72,167,183,231],"new":[59],"array":[60],"security":[62,100],"privacy":[64],"challenges":[65],"simultaneously":[67],"introduced":[68],"the":[69,92,120,123,142,154,161,207,213,216,220,224,244,248],"threats":[70,109],"single":[73],"point":[74],"failure.":[76],"Usually,":[77],"attackers":[78],"launch":[79],"malicious":[80],"attacks":[81,130,194],"such":[82],"as":[83],"botnets":[84],"Distributed":[86],"Denial":[87],"Service":[89],"(DDoS)":[90],"controller":[93],"through":[94],"OpenFlow":[95],"switches.":[96],"Deep":[97],"learning":[98],"(DL)-based":[99],"are":[102],"trending,":[103],"effectively":[104],"detecting":[105],"mitigating":[107],"potential":[108],"with":[110,187,195,230],"fast":[111],"response.":[112],"this":[114,178],"article,":[115],"we":[116,241],"analyze":[117],"show":[119],"performance":[121,214],"DL":[124,185,217],"methods":[125,151],"detect":[127,191],"botnet-based":[128,192],"DDoS":[129,193],"in":[131],"SDN-supported":[133],"environment.":[134],"A":[135],"newly":[136],"self-generated":[137,168],"dataset":[138,169,249],"used":[140,146],"evaluation.":[143],"We":[144,159,204],"also":[145],"feature":[147],"weighting":[148],"tuning":[150],"select":[153],"best":[155,208],"subset":[156,209],"features.":[158,235],"verify":[160],"measurements":[162],"simulation":[164],"outcomes":[165],"over":[166],"real":[171,251],"testbed":[172,252],"settings.":[173,253],"The":[174,254],"main":[175],"aim":[176],"study":[179],"find":[182],"lightweight":[184],"method":[186,226,246],"baseline":[188],"hyper-parameters":[189],"features":[196,211],"data":[198],"can":[200],"be":[201,228],"easily":[202],"acquired.":[203],"observed":[205],"influences":[212],"method,":[218],"prediction":[221],"accuracy":[222],"same":[225],"could":[227],"variated":[229],"different":[232],"set":[233],"Finally,":[236],"empirical":[239],"results,":[240],"found":[242],"CNN":[245,258],"outperforms":[247],"detection":[255],"rate":[256],"reaches":[259],"99%":[260],"normal":[262],"flows":[263],"97%":[265],"attack":[267],"flows.":[268]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W4377008974","counts_by_year":[{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":8}],"updated_date":"2025-01-22T04:00:27.714718","created_date":"2023-05-19"}