{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:21:38Z","timestamp":1772727698898,"version":"3.50.1"},"reference-count":29,"publisher":"Wiley","issue":"26","license":[{"start":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T00:00:00Z","timestamp":1725321600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>In order to make networks more adaptable and flexible, software\u2010defined networking (SDN) is an architecture that abstracts the many, easily distinct layers of a network. By enabling businesses and service providers to react swiftly to shifting business requirements, SDN aims to improve network control. SDN has become an important framework for Internet of Things (IoT) and 5G. Despite recent research endeavors focused on pinpointing constraints within SDN design components, various security attacks persist, including man\u2010in\u2010the\u2010middle attacks, host hijacking, ARP poisoning, and saturation attacks. Overcoming these limitations poses a challenge, necessitating robust security techniques to detect and counteract such attacks in SDN environments. This study is dedicated to developing a method for detecting and mitigating control plane attacks within Software Defined Network Environments utilizing Deep Learning Algorithms. The study presents a deep\u2010learning\u2010based approach to identifying malicious hosts within SDN networks, thus thwarting unauthorized access to the controller. Experimental results demonstrate the effectiveness of the proposed model in host classification, exhibiting high accuracy and performance compared to alternative approaches.<\/jats:p>","DOI":"10.1002\/cpe.8256","type":"journal-article","created":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T01:24:38Z","timestamp":1725413078000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detection and mitigation of few control plane attacks in software defined network environments using deep learning algorithm"],"prefix":"10.1002","volume":"36","author":[{"given":"M. Anand","family":"Kumar","sequence":"first","affiliation":[{"name":"School of Information Science Presidency University  Bangalore India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4067-3256","authenticated-orcid":false,"given":"Edeh Michael","family":"Onyema","sequence":"additional","affiliation":[{"name":"Department of Mathematics and Computer Science Coal City University  Emene Nigeria"},{"name":"Adjunct Faculty, Saveetha School of Engineering Saveetha Institute of Medical and Technical Sciences  Chennai India"}]},{"given":"B.","family":"Sundaravadivazhagan","sequence":"additional","affiliation":[{"name":"Department of Information Technology University of Technology and Applied Sciences\u2010Al Mussanah  Muscat Oman"}]},{"given":"Manish","family":"Gupta","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering Amity University  Jaipur India"}]},{"given":"Achyut","family":"Shankar","sequence":"additional","affiliation":[{"name":"Department of Cyber Systems Engineering, WMG University of Warwick  Coventry UK"},{"name":"University Centre for Research &amp; Development Chandigarh University  Mohali India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1392-3385","authenticated-orcid":false,"given":"Venkataramaiah","family":"Gude","sequence":"additional","affiliation":[{"name":"Software Engineer in GP Technologies LLC  Troy Michigan USA"}]},{"given":"Nagendar","family":"Yamsani","sequence":"additional","affiliation":[{"name":"School of Computer Science and Artificial Intelligence SR University  Warangal India"}]}],"member":"311","published-online":{"date-parts":[[2024,9,3]]},"reference":[{"key":"e_1_2_11_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3109564"},{"key":"e_1_2_11_3_1","doi-asserted-by":"publisher","DOI":"10.3390\/su141911950"},{"key":"e_1_2_11_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2762291"},{"key":"e_1_2_11_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2586999"},{"key":"e_1_2_11_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2020.01.060"},{"key":"e_1_2_11_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"e_1_2_11_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2959025"},{"key":"e_1_2_11_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2939780"},{"key":"e_1_2_11_10_1","doi-asserted-by":"publisher","DOI":"10.3390\/s19143119"},{"key":"e_1_2_11_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2839348"},{"key":"e_1_2_11_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2003.818498"},{"key":"e_1_2_11_13_1","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.11.000A84"},{"key":"e_1_2_11_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.measen.2023.100718"},{"key":"e_1_2_11_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"e_1_2_11_16_1","unstructured":"Anand KumarM GhanshalaA PurohitKC SinghA EzhilarasiM.Control plane TCP attacks detection and prevention in SDN networks using deep learning model. In: 2023 10th International Conference on Computing for Sustainable Global Development; 2023: 373\u2013378."},{"key":"e_1_2_11_17_1","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/6382467"},{"key":"e_1_2_11_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-0609-3_22"},{"key":"e_1_2_11_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2018.2889842"},{"key":"e_1_2_11_20_1","doi-asserted-by":"crossref","unstructured":"SinghA Nithin KumarKC KumarMA Singh NegiH.An improved deep learning framework approach for detecting the psoriasis disease. In: 2023 International Conference on Artificial Intelligence and Knowledge Discovery in Concurrent Engineering (ICECONF) Chennai India; 2023: 1\u20135.","DOI":"10.1109\/ICECONF57129.2023.10083536"},{"key":"e_1_2_11_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.020"},{"key":"e_1_2_11_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978\u2010981\u201019\u20101960\u20102_2"},{"key":"e_1_2_11_23_1","doi-asserted-by":"crossref","unstructured":"NagarathnaR ShalinieSM.SLAMHHA: a supervised learning approach to mitigate host location hijacking attack on SDN controllers. In: Proceedings of 4th International Conference on Signal Processing Communication and Networking (ICSCN); 2017: 1\u20137.","DOI":"10.1109\/ICSCN.2017.8085680"},{"key":"e_1_2_11_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSTE.2018.2889451"},{"key":"e_1_2_11_25_1","doi-asserted-by":"crossref","unstructured":"KumarMA PaiAH AgarwalJ ChristaS PrasadGMS SaifiS.Deep learning model to defend against covert channel attacks in the SDN networks. In: IEEE 2023 Advanced Computing and Communication Technologies for High Performance Applications (ACCTHPA); 2023: 1\u20135.","DOI":"10.1109\/ACCTHPA57160.2023.10083336"},{"key":"e_1_2_11_26_1","doi-asserted-by":"crossref","unstructured":"BrooksM YangB.A man\u2010in\u2010the\u2010middle attack against OpenDay\u2010light SDN controller. In: Proceedings of the 4th Annual ACM Conference on Research in\u2009Information Technology (RIIT); 2019: 45\u201349.","DOI":"10.1145\/2808062.2808073"},{"key":"e_1_2_11_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2020.04.280"},{"key":"e_1_2_11_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13677\u2010023\u201000443\u20105"},{"key":"e_1_2_11_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3019330"},{"key":"e_1_2_11_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3190008"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.8256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T08:35:51Z","timestamp":1729758951000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.8256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,3]]},"references-count":29,"journal-issue":{"issue":"26","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1002\/cpe.8256"],"URL":"https:\/\/doi.org\/10.1002\/cpe.8256","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"value":"1532-0626","type":"print"},{"value":"1532-0634","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,3]]},"assertion":[{"value":"2023-12-10","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e8256"}}