Software-Defined Networking Security Detection Strategies and Their Limitations with a Focus on Distributed Denial-of-Service for Small to Medium-Sized Enterprises
Abstract
1. Introduction
- What are the predominant cybersecurity threats—particularly related to DDoS—faced by SMEs adopting SDN?
- What detection and mitigation methods for these threats were proposed in recent peer-reviewed literature (between 2020 and 2025)?
- To what extent were any of these solutions evaluated in real-world SME or resource-constrained settings?
2. Materials and Methods
- i.
- Articles addressing DDoS or related network-based threats in the context of SDN and SMEs;
- ii.
- Articles proposing, implementing, or evaluating a detection or mitigation technique in the context of (i);
- iii.
- Articles peer-reviewed and published in journals or conference proceedings;
- iv.
- Articles published in English.
3. Synthesis and Analysis of Information
3.1. Analysis of Review Articles
- (i)
- High-volume and low-rate DDoS focused on the data plane;
- (ii)
- Control plane saturation and ternary content addressable memory exhaustion via flooding of flow rules;
- (iii)
- Topology and host discovery misuse (e.g., address resolution protocol/link layer discovery protocol spoofing, poisoning);
- (iv)
- Misuse of northbound application programming interfaces/controller apps.
3.1.1. SME Cybersecurity Challenges
3.1.2. Emerging Technologies
3.1.3. Threat Detection and Mitigation
3.2. Analysis of DDoS Detection Articles
3.3. Analysis of DDoS Mitigation
3.4. Integrating Detection and Mitigation
3.5. Gaps and Future Directions
3.6. Section Summary
4. Discussion
4.1. Future Work
4.2. Practical SDN Tools and Implementations
5. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Conflicts of Interest
Appendix A
| Experimental Rollout or Review | Target Environment | Methodology—Machine Learning, Blockchain, etc. | Position in Network | Dataset Used | Simulation or Practical Deployment | Article |
|---|---|---|---|---|---|---|
| Experimental Rollout | SDN network | Machine learning-based DDoS detection and mitigation framework | SDN controller | CICIDS2017 | Simulation only | [29] |
| Experimental Rollout | SDN network | ML-based DDoS detection using multiple classification algorithms | SDN controller | UNSW-NB15 | Simulation only | [25] |
| Experimental Rollout | SDN network | MULTI-BLOCK intrusion detection framework using new packet- and flow-level features | SDN controller | UNSW-NB15, BoT-IoT | Simulation only | [44] |
| Experimental Rollout | SDN network | Low-rate DDoS detection model using MQTT traffic features and ML classification | SDN controller | Custom dataset | Simulation only | [24] |
| Experimental Rollout | SDN network | ML-based DDoS detection framework with feature selection and ensemble learning | SDN controller | CICDDoS2019 | Simulation only | [22] |
| Experimental Rollout | SDN network | Deep learning-based DDoS detection with counter-based mitigation | SDN controller | CICDDoS2019 | Simulation only | [7] |
| Experimental Rollout | SDN network | Time-efficient ML-based DDoS detection | SDN controller | CICDDoS2019 | Simulation only | [22] |
| Experimental Rollout | SDN network | Hybrid deep learning-based detection framework for emerging cyber threats | SDN controller | CICIDS2017, NSL-KDD | Simulation only | [9] |
| Experimental Rollout | SDN network | ML-driven DDoS detection and mitigation system | SDN controller in cloud | NSL-KDD | Simulation only | [35] |
| Experimental Rollout | SDN network | Blockchain and federated learning | Federated placement | E-IIoT and ToN-IoT | Simulation only | [10] |
| Experimental Rollout | SDN network | RAPID Flow aggregation with network segmentation for DDoS mitigation; algorithm for rapid flow rule install | SDN controller | Custom dataset | Simulation only | [34] |
| Experimental Rollout | SDN network | Hybrid CNN–ELM deep learning model + IP traceback for mitigation | SDN controller | CICIDS2017 | Simulation only | [8] |
| Experimental Rollout | General network | Optimized hybrid classification model (Moth Flame Optimisation + Ensemble ML classifiers) | Edge/gateway | CICIoT2023 | Simulation only | [37] |
| Experimental Rollout | General network | Integration of threat-occurrence predictive models into security risk analysis | Edge Server | Live traffic | Simulation and practical implementation | [56] |
| Experimental Rollout | General network | EA-based feature selection (ENTER), multi-correlation info, multiple classifiers | Security Anaytics Server | Custom dataset | Simulation only | [57] |
| Experimental Rollout | General network | Manifold Regularized Broad Learning System (MRBLS) with LU decomposition | IDS Module | NSL-KDD, UNSW-NB15 | Simulation only | [28] |
| Experimental Rollout | General network | Distributed edge ML framework with task offloading and optimisation for constrained devices | Edge nodes | Live traffic | Simulation and practical implementation | [58] |
| Experimental Rollout | General network | Cloud Server Intrusion Detection and Response module to reduce VM-level collateral damage DDoS | Cloud servers/VM layer | CAIDA DDoS Attack 2007 | Simulation only | [59] |
| Experimental Rollout | General network | Autonomous cybersecurity framework integrating AI/ML for detection and response | Within service chain | Live traffic | Practical implementation | [38] |
| Experimental Rollout | General network | Machine learning-based approach for detecting IoT-generated DDoS traffic | Edge nodes | CICIDS2017 | Simulation only | [23] |
| Experimental Rollout | SDN network | Hybrid deep learning-based modelfor bonet detection in a fog environment | SDN Controller | N-BaloT 2018 | Simulation only | [41] |
| Experimental Rollout | SDN Network | Flow-table overflow detection using ML classification; DTW-style flow dynamics | SDN Controller | Custom dataset | Simulation only | [60] |
| Experimental Rollout | SDN Network | Data-plane ML (KNN/SVM/RF) with controller coordination | SDN Controller + Switch data plane | Not stated | Simulation only | [39] |
| Experimental Rollout | SDN Network | Entropy features + ML classifier | SDN Controller | Not stated | Simulation only | [61] |
| Experimental Rollout | SDN Network | Spiking Elman neural network for intrusion/DDoS | SDN Controller | Custom dataset | Simulation only | [62] |
| Experimental Rollout | SDN Network | Distributed ML pipeline using Kafka/Hadoop | Controller + distributed workers | Not stated | Simulation only | [63] |
| Experimental Rollout | SDN Network | Continual Federated Learning IDS (edge + controller) | Edge nodes + controller | Not stated | Simulation only | [33] |
| Experimental Rollout | SDN Network | Optimized DNN detection + bait/decoy mitigation | Controller + decoy | Not stated | Simulation only | [64] |
| Experimental Rollout | SDN Network | Risk-scoring IDS with ML prioritisation | SDN Controller | Not stated | Simulation only | [65] |
| Experimental Rollout | SDN Network | ML on 5 flow stats; proactive rule install | Controller (Ryu) | Not stated | Simulation only | [14] |
| Experimental Rollout | SDN Network | Autoencoder feature learning + XGBoost; SHAP explainability | SDN Controller | CICDDoS2019 | Simulation only | [40] |
| Experimental Rollout | SDN Network | Multi-ML detection + traceback mitigation; timing and confidence intervals reported | SDN Controller + sFlow-RT | Custom dataset | Simulation only | [42] |
| Experimental Rollout | SDN Network | Multi-Stage Learning Framework Using Convolutional Neural Network and Decision Tree | Supervisory Control and Data Acquisition | Custom dataset | Simulation Only | [66] |
| Experimental Rollout | SDN Network | DL IDS (TS-RBDM) + Streebog user authentication | SDN Controller + auth module | Not stated | Simulation only | [67] |
| Experimental Rollout | SDN Network | Feature engineering + ML (RF, XGBoost); Improved Binary Grey Wolf Optimisation for feature selection; controller installs drop rules | SDN controller | CSE-CIC-IDS2018 | Simulation only | [68] |
| Experimental Rollout | SDN Network | Ensemble (SVM, NB, RF, kNN, LR → Voting); lightweight 5-feature set; traceback + flow rules | SDN controller + Edge switch | Custom dataset | Simulation only | [34] |
| Experimental Rollout | SDN Network | Hybrid deep learning (Transformer + CNN) for DDoS detection | SDN controller | CICDDoS2019 | Simulation only | [31] |
| Experimental Rollout | SDN Network | Entropy-based anomaly detection + OpenState stateful data plane; controller pushes drop rules | SDN Controller + Switch (data plane) | BigFlows, Bot-IoT + Mininet traces | Simulation only | [32] |
| Experimental Rollout | SDN Network | ML models (RF, DT, SVM, KNN, NB, LR); real-time detection; controller flow updates | SDN Controller | CICDDoS2019 | Simulation only | [36] |
| Experimental Rollout | SDN Network | DT-based ensembles (AdaBoost/Bagging/RUSBoost) + feature selection; Bayesian tuning | SDN Controller | Custom dataset | Simulation only | [69] |
| Experimental Rollout | SDN Network | Hybrid 1D-CNN feature extractor + Decision Tree classifier | SDN Controller | Custom dataset | Simulation only | [70] |
| Experimental Rollout | SDN Network | SDN/NFV architecture; lightweight anomaly filter + quarantine slice for deep inspection | SDN controller + NFV edge | N/A | Simulation only | [15] |
| Experimental Rollout | SDN Network | Hybrid CNN-ELM for online detection; IP traceback + flow rule mitigation | SDN controller | CICIDS-2017; InSDN | Simulation only | [39] |
| Experimental Rollout | SDN Network | OvR ML (RF, kNN, NB, LR) with RFE feature selection; controller drop rules | SDN controller | Custom dataset | Simulation only | [18] |
| Experimental Rollout | SDN Network | XRDI feature selection (XGBoost/RF/DT/IG) + classic ML (DT, RF, SVM, LR); alerting | SDN controller | InSDN; CICIDS2017; CICIDS2018 | Simulation only | [71] |
| Review | N/A | Systematic review (70 studies) on ML/DL for SDN DDoS; gaps: datasets, controller overhead | N/A | N/A | N/A | [21] |
| Review | N/A | Survey of SDN-IoT security including DDoS | N/A | N/A | N/A | [20] |
| Review | N/A | Survey of distributed DDoS frameworks | N/A | N/A | N/A | [19] |
| Review | N/A | Qualitative analysis of SME cybercrime perceptions, fear taxonomy, and barriers to security adoption | N/A | N/A | N/A | [11] |
| Review | N/A | Survey-based organisational readiness assessment for information security threats | N/A | N/A | N/A | [13] |
| Review | N/A | Analysis of cybersecurity threats, vulnerabilities, and mitigation strategies for SatCom in the context of IRIS | N/A | N/A | N/A | [72] |
| Review | N/A | Survey and statistical analysis of cybercrime prevalence, nature, and impact during pandemic | N/A | N/A | N/A | [12] |
| Review/empirical survey | N/A | Analysis of victims’ payment decision-making processes using survey/interview data | N/A | N/A | N/A | [73] |
| Experimental | SDN | Optimized deep neural network for DDoS detection; bait mitigation process at switches coordinated by SDN controller. | SDN Controller | CIC-DDoS2019, SDN-specific Mininet dataset (Mendeley Data) | Simulation | [74] |
| Review | N/A | Comprehensive survey of blockchain-based smart contracts: applications, opportunities, and challenges | N/A | N/A | N/A | [6] |
| Review | N/A | Review of lightweight blockchain frameworks for security and efficiency in smart city applications | N/A | N/A | N/A | [16] |
| Review | N/A | Taxonomy and systematic review of Edge AI frameworks, applications, and challenges | N/A | N/A | N/A | [17] |
| Review | N/A | Review of cybersecurity, data privacy, and blockchain integration | N/A | N/A | N/A | [4] |
| Review | N/A | Survey of ML applications, challenges, and opportunities in intelligent systems | N/A | N/A | N/A | [5] |

References
- Kaspersky Lab. B2B International. IT Security Risks Survey 2017: Protecting Your Business Against Financial and Reputational Losses with Kaspersky DDoS Protection, Kaspersky Lab Whitepaper. 2018. Available online: https://media.kaspersky.com/pdf/Kaspersky_Lab_Whitepaper_Kaspersky_DDoS_Protection_final.pdf (accessed on 19 September 2025).
- World Bank. Small and Medium Enterprises (SMEs) Finance; World Bank: Washington, DC, USA, 2019; Available online: https://www.worldbank.org/en/topic/smefinance (accessed on 18 September 2025).
- European Commission. User Guide to the SME Definition, Publications Office of the European Union. 2020. Available online: https://op.europa.eu/en/publication-detail/-/publication/756d9260-ee54-11ea-991b-01aa75ed71a1 (accessed on 19 September 2025).
- Wylde, V.; Abomhara, M.; Gerdes, R.; Morris, T.H. Cybersecurity, data privacy and blockchain: A review. SN Comput. Sci. 2022, 3, 127. [Google Scholar] [CrossRef]
- Injadat, M.; Moubayed, A.; Nassif, A.B.; Shami, A. Machine learning towards intelligent systems: Applications, challenges, and opportunities. Artif. Intell. Rev. 2021, 54, 3299–3348. [Google Scholar] [CrossRef]
- Hewa, T.; Ylianttila, M.; Liyanage, M. Survey on blockchain-based smart contracts: Applications, opportunities and challenges. J. Netw. Comput. Appl. 2021, 177, 102857. [Google Scholar] [CrossRef]
- Cherian, M.; Varma, S. Secure SDN-IoT framework for DDoS attack detection using deep learning and counter based approach. J. Netw. Syst. Manag. 2023, 31, 54. [Google Scholar] [CrossRef]
- Rajkumar, K.; Shalinie, S.M.; Stanly, H. SDN defense: Detection and mitigation of DDoS attack via IoT network. In Proceedings of the 25th International Conference on Distributed Computing and Networking (ICDCN ’24), Chennai, India, 4–7 January 2024; pp. 371–376. [Google Scholar] [CrossRef]
- Javeed, D.; Gao, T.; Khan, M. SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT. Electronics 2021, 10, 918. [Google Scholar] [CrossRef]
- Kokila, K.M.; Konda, S.R.K.S. DeepSDN: Deep learning based software defined network model for cyberthreat detection in IoT network. ACM Trans. Internet Technol. 2025, 1–29, ACM 1557-6051/2025/5-ART. [Google Scholar] [CrossRef]
- Arroyabe, M.F.; Arranz, C.F.A.; De Arroyabe, I.F.; De Arroyabe, J.C.F. Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. Comput. Secur. 2024, 141, 103826. [Google Scholar] [CrossRef]
- Van De Weijer, S.; Leukfeldt, R.; Moneva, A. Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlands. Comput. Secur. 2024, 139, 103693. [Google Scholar] [CrossRef]
- Jayarao, G.B.; Ray, S.; Panigrahi, P.K. Information security threats and organizational readiness in nWFH scenarios. Comput. Secur. 2024, 140, 103745. [Google Scholar] [CrossRef]
- Candal-Ventureira, D.; Fondo-Ferreiro, F.; Gil-Castiñeira, F.; González-Castaño, F.J. Quarantining malicious IoT devices in intelligent sliced mobile networks. Sensors 2020, 20, 5054. [Google Scholar] [CrossRef]
- Karmous, N.; Aoueileyine, M.O.-E.; Abdelkader, M.; Romdhani, L.; Youssef, N. Software-defined-networking-based one-versus-rest strategy for detecting and mitigating distributed denial-of-service attacks in Smart home internet of things devices. Sensors 2024, 24, 5022. [Google Scholar] [CrossRef]
- Padma, A.; Ramaiah, M.; Ravi, V. A comprehensive review of lightweight blockchain practices for smart cities: A security and efficacy assessment. J. Reliab. Intell. Environ. 2025, 11, 13. [Google Scholar] [CrossRef]
- Gill, S.S.; Golec, M.; Hu, J.; Xu, M.; Du, J.; Wu, H.; Walia, J.K.; Murugesan, S.S.; Ali, B.; Kumar, M.; et al. Edge AI: A taxonomy, systematic review and future directions. Clust. Comput. 2015, 28, 18. [Google Scholar] [CrossRef]
- Aslam, B.; Azam, M.A.; Imran, M.; Rizvi, S. Adaptive machine learning based distributed denial-of-service attacks detection and mitigation system in software-defined networks. Sensors 2022, 22, 2697. [Google Scholar] [CrossRef] [PubMed]
- Patil, P.; Kallurkar, S.; Kancharla, B. Distributed frameworks for detecting distributed denial of service attacks: A comprehensive review. Concurr. Comput. Pract. Exp. 2021, 33, e6197. [Google Scholar] [CrossRef]
- Mohamed, A.; Babiker, M.; Abubakar, A. A comprehensive survey on secure software-defined network for the Internet of Things. Trans. Emerg. Telecommun. Technol. 2022, 33, e4391. [Google Scholar] [CrossRef]
- Bahashwan, S.; Alazab, M.; Jolfaei, A.; Islam, A. A systematic literature review on machine learning and deep learning approaches for detecting DDoS attacks. Sensors 2023, 23, 4441. [Google Scholar] [CrossRef] [PubMed]
- Bhayo, J.; Jafaq, R.; Ahmed, A.; Hameed, S.; Shah, S.A. A time-efficient approach toward DDoS attack detection in IoT network using SDN. IEEE Internet Things J. 2022, 9, 3612–3630. [Google Scholar] [CrossRef]
- Cvitić, I.; Peraković, D.; Periša, M.; Botica, M. Novel approach for detection of IoT-generated DDoS traffic. Wirel. Netw. 2021, 27, 1573–1586. [Google Scholar] [CrossRef]
- Al-Fayoumi, M.; Abu Al-Haija, Q. Capturing low-rate DDoS attack based on MQTT protocol in a software-defined IoT environment. Array 2023, 19, 100316. [Google Scholar] [CrossRef]
- Segura, G.N.; Barboza, E.C. Machine learning for distributed denial of service attack detection in software-defined IoT. In Proceedings of the 2024 IEEE 42nd Central America and Panama Convention (CONCAPAN XLII), San Jose, CA, USA, 27–29 November 2024; pp. 1–6. [Google Scholar] [CrossRef]
- Ahmed, I.; Uddin, M.; Alshamrani, A.; Alzahrani, B. CICIoT2023: An intrusion detection dataset for Internet of Things networks. IEEE Access 2024, 12, 11256–11269. [Google Scholar]
- Moustafa, N.; Slay, J. The TON_IoT datasets: A new generation of realistic IoT traffic for intrusion detection research. Future Internet 2021, 13, 72. [Google Scholar]
- Liu, Y.; Zhang, K.; Wang, Z. Intrusion detection of manifold regularized broad learning system based on LU decomposition. J. Supercomput. 2023, 79, 20600–20648. [Google Scholar] [CrossRef]
- Belachew, H.; Beyene, M.; Desta, A.; Alemu, B.; Musa, S.; Muhammed, A. Design a robust DDoS attack detection and mitigation scheme in SDN-edge-IoT by leveraging machine learning. IEEE Access 2025, 13, 10194–10214. [Google Scholar] [CrossRef]
- Wang, W.; Wang, X. SDN-Defend: A lightweight online attack detection and mitigation system for DDoS attacks in SDN. Sensors 2022, 22, 8287. [Google Scholar] [CrossRef] [PubMed]
- Santos-Neto, M.J.; Bordim, J.L.; Alchieri, E.A.P.; Ishikawa, E. DDoS attack detection in SDN: Enhancing entropy-based detection with machine learning. Concurr. Comput. Pract. Exp. 2024, 36, e8021. [Google Scholar] [CrossRef]
- Sattari, F.; Farooqi, A.H.; Qadir, Z.; Raza, B.; Nazari, H.; Almutiry, M. A hybrid deep learning approach for bottleneck detection in IoT. IEEE Access 2022, 10, 77039–77053. [Google Scholar] [CrossRef]
- Karthikeyan, V.; Murugan, K. A novel machine learning-based classification approach to prevent flow table overflow attack in Software-Defined Networking. Concurr. Comput. Pract. Exp. 2024, 36, e7878. [Google Scholar]
- Himanshu; Saha, K.; Das, P.; De, S. A network segmentation architecture for flow aggregation and DDoS mitigation in SDN using RAPID flow rules. In Proceedings of the 25th International Conference on Distributed Computing and Networking (ICDCN ’24), Chennai, India, 4–7 January 2024; pp. 232–241. [Google Scholar] [CrossRef]
- Ravi, N.; Shalinie, S. Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture. IEEE Internet Things J. 2020, 7, 3559–3570. [Google Scholar] [CrossRef]
- Swami, R.; Dave, M.; Ranga, V. Voting-based intrusion detection framework for securing software-defined networks. Concurr. Comput. Pract. Exp. 2020, 32, e5927. [Google Scholar] [CrossRef]
- Bojarajulu, B.; Tanwar, S.; Singh, T.P. Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model. Comput. Secur. 2023, 126, 103064. [Google Scholar] [CrossRef]
- Repetto, M.; Striccoli, D.; Piro, G.; Carrega, A.; Boggia, G.; Bolla, R. An autonomous cybersecurity framework for next-generation digital service chains. J. Netw. Syst. Manag. 2021, 29, 37. [Google Scholar] [CrossRef]
- Hormozi, M.; Erfani, S. An SDN-based DDoS defense approach using route obfuscation. Concurr. Comput. Pract. Exp. 2023, 35, e7439. [Google Scholar] [CrossRef]
- Vadivu, D.S.; Rajagopalan, N. RyuGuard: Combining Ryu and machine learning for proactive DDoS defense in software-defined networks. Concurr. Comput. Pract. Exp. 2024, 36, e8289. [Google Scholar] [CrossRef]
- Chetouane, A.; Karoui, K. Risk based intrusion detection system in software defined networking. Concurr. Comput. Pr. Exp. 2024, 36, e7988. [Google Scholar] [CrossRef]
- Aslam, B.; Azam, A.; Imran, M.; Rizvi, S. ONOS flood defender: An intelligent approach to mitigate DDoS attack in SDN. Trans. Emerg. Telecommun. Technol. 2022, 33, e4534. [Google Scholar] [CrossRef]
- Carvalho, C.; Verdi, F.L.; Martinello, M. DataPlane-ML: An integrated attack detection and mitigation solution for software defined networks. Concurr. Comput. Pract. Exp. 2023, 35, e7434. [Google Scholar] [CrossRef]
- Setitra, A.; Seridi, H.; Derhab, A. An efficient approach to detect distributed denial of service attacks for software defined internet of things. Trans. Emerg. Telecommun. Technol. 2023, 34, e4827. [Google Scholar] [CrossRef]
- Sharafaldin, I.; Lashkari, A.H.; Ghorbani, A.A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. In Proceedings of the 4th International Conference on Information Systems Security and Privacy (ICISSP), Funchal, Portugal, 22–24 January 2018; pp. 108–116. [Google Scholar] [CrossRef]
- Koroniotis, N.; Moustafa, N.; Sitnikova, E.; Turnbull, B. Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset. Future Gener. Comput. Syst. 2021, 100, 779–796. [Google Scholar] [CrossRef]
- Ferrag, M.A.; Maglaras, L.; Moschoyiannis, S.; Janicke, H. Deep learning for cyber security intrusion detection: Approaches, datasets, and comparative study. J. Inf. Secur. Appl. 2020, 50, 102419. [Google Scholar] [CrossRef]
- Lashkari, A.H.; Devlin, A.; Ghorbani, A.A. A Comprehensive survey of network flow datasets for intrusion detection. Comput. Netw. 2022, 210, 108921. [Google Scholar]
- Tavallaee, M.; Bagheri, E.; Lu, W.; Ghorbani, A.A. A detailed analysis of the KDD CUP 99 data set. In Proceedings of the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, ON, Canada, 8–10 July 2009; pp. 1–6. [Google Scholar]
- Lantz, B.; Heller, B.; McKeown, N. A network in a laptop: Rapid prototyping for software-defined networks. In Proceedings of the 2010 ACM SIGCOMM Workshop on HotNets, Monteret, CA, USA, 20–21 October 2010; Article 19. pp. 1–6. [Google Scholar] [CrossRef]
- Berde, P.; Gerola, M.; Hart, J.; Higuchi, Y.; Kobayashi, M.; Koide, T.; Lantz, B.; O’Connor, B.; Radoslavov, P.; Snow, W.; et al. ONOS: Towards an open, distributed SDN OS. In Proceedings of the 2014 ACM SIGCOMM Workshop on HotSDN, Chicago, IL, USA, 22 August 2014; pp. 1–6. [Google Scholar] [CrossRef]
- Kubo, R.; Fujita, T.; Agawa, Y.; Suzuki, H. Ryu SDN framework-open-source SDN platform software. NTT Technol. Rev. 2014, 12, 18–22. [Google Scholar] [CrossRef]
- Bredel, M. OpenFlow and the Floodlight OpenFlow controller Control Center, ADMIN 17/2013. 2013. Available online: https://www.admin-magazine.com/Archive/2013/17/OpenFlow-and-the-Floodlight-OpenFlow-Controller (accessed on 11 November 2025).
- Medved, J.; Varga, R.; Tkacik, A.; Gray, K. OpenDaylight: Towards a model-driven SDN Controller architecture. In Proceedings of the 2014 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, NSW, Australia, 19 June 2014; pp. 1–6. [Google Scholar] [CrossRef]
- Pfaff, B.; Pettit, J.; Koponen, T.; Jackson, E.; Zhou, A.; Rajahalme, J.; Gross, J.; Wang, A.; Stringer, J.; Shelar, P.; et al. The design and implementation of Open vSwitch. In Proceedings of the 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI ’15), Oakland, CA, USA, 4–6 May 2015; pp. 117–130. Available online: https://www.usenix.org/system/files/conference/nsdi15/nsdi15-paper-pfaff.pdf (accessed on 11 November 2025).
- Rahman, A.; Khan, S.I.; Montieri, A.; Islam, J.; Karim, R.; Hasan, M.; Kundu, D.M.; Nasir, M.K.; Pescapè, P. BlockSD-5GNet: Enhancing security of 5G network through blockchain-SDN with ML-based bandwidth prediction. Trans. Emerg. Telecommun. Technol. 2024, 35, e4965. [Google Scholar] [CrossRef]
- Ariffin, R.; Ahmad, A. Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0. Forensic Sci. Int. Digit. Investig. 2021, 105, 102237. [Google Scholar] [CrossRef]
- Ashfaq, M.; Rehman, F.; Ali, Z. Enhancing security in 5G edge networks: Predicting real-time zero trust attacks using machine learning. Sensors 2025, 25, 1905. [Google Scholar] [CrossRef] [PubMed]
- Casaril, M.; Galletta, A. Securing SatCom user segment: A study on cybersecurity challenges in view of IRIS2. Comput. Secur. 2024, 140, 103799. [Google Scholar] [CrossRef]
- Dandotiya, M.; Makwana, R.R.S. Secured DDoS attack detection in SDN using TS-RBDM with MDPP-Streebog based user authentication. Trans. Emerg. Telecommun. Technol. 2025, 36, e70052. [Google Scholar] [CrossRef]
- Galeano-Brajones, J.; Carmona-Murillo, J.; Valenzuela-Valdés, J.F.; Luna-Valero, F. Detection and mitigation of DoS and DDoS attacks in IoT-based stateful SDN an experimental approach. Sensors 2020, 20, 816. [Google Scholar] [CrossRef]
- Han, D.; Li, H.; Fu, X.; Zhou, S. Traffic feature selection and distributed denial of service attack detection in software-defined networks based on machine learning. Sensors 2024, 24, 4344. [Google Scholar] [CrossRef] [PubMed]
- Huan, H.; Zhao, J.; Yang, H.; Li, X.; Cui, Y.; Chen, G. Towards feature selection for detecting LDDoS in SD-IoT of smart grids: A multi-correlation information EA-based method. In Proceedings of the 2023 2nd International Symposium on Computing and Artificial Intelligence, ISCAI 2023, Shanghai, China, 13–15 October 2023; pp. 60–66. [Google Scholar] [CrossRef]
- Liu, Z.; Wang, Y.; Feng, F.; Liu, Y.; Li, Z.; Shan, Y. A DDoS detection method based on feature engineering and machine learning in software-defined networks. Sensors 2023, 23, 6176. [Google Scholar] [CrossRef]
- Oyucu, S.; Polat, O.; Türkoglu, M.; Polat, H.; Aksöz, A.; Agdas, M.T. Ensemble learning framework for DDoS detection in SDN-based SCADA systems. Sensors 2024, 24, 155. [Google Scholar] [CrossRef] [PubMed]
- Polat, O.; Türkoğlu, M.; Polat, H.; Oyucu, S.; Üzen, H.; Yardımcı, F.; Aksöz, A. Multi-stage learning framework using convolutional neural network and decision tree-based classification for detection of DDoS pandemic attacks in SDN-Based SCADA systems. Sensors 2024, 24, 1040. [Google Scholar] [CrossRef] [PubMed]
- Priyadarshini, I.; Mohanty, P.; Alkhayyat, A.; Sharma, R.; Kumar, S. SDN and application layer DDoS attacks detection in IoT devices by attention-based Bi-LSTM-CNN. Trans. Emerg. Telecommun. Technol. 2023, 34, e4758. [Google Scholar] [CrossRef]
- Varma, P.R.K.; Sathiya, R.R.; Vanitha, M. Enhanced Elman spike neural network based intrusion attack detection in software defined Internet of Things network. Concurr. Comput. Pract. Exp. 2023, 35, e7503. [Google Scholar] [CrossRef]
- Toony, R.; Dandoush, A.; Salah, K. Multi-block: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new packet- and flow-level features. Internet Things 2024, 23, 101231. [Google Scholar] [CrossRef]
- Truong, H.-H.; Truong-Huu, T.; Cao, T.-D. Making distributed edge machine learning for resource-constrained communities and environments smarter: Contexts and challenges. J. Reliable Intell. Environ. 2023, 9, 119–134. [Google Scholar] [CrossRef]
- Figueira, P.T.; Bravo, C.L.; López, J.L.R. Improving information security risk analysis by including threat-predictive models. Comput. Secur. 2020, 88, 101609. [Google Scholar] [CrossRef]
- Verma, S.; Gupta, R.; Sharma, P. A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud computing. Clust. Comput. 2021, 24, 2149–2163. [Google Scholar] [CrossRef]
- Connolly, A.Y.; Borrion, H. Reducing ransomware crime analysis of victims’ payment decisions. Comput. Secur. 2022, 119, 102760. [Google Scholar] [CrossRef]
- Perumal, K.; Arockiasamy, K. Optimized deep neural network based DDoS attack detection and bait mitigation process in software defined network. Concurr. Comput. Pract. Exp. 2023, 35, e7692. [Google Scholar] [CrossRef]
| Database | Boolean Search |
|---|---|
| ACM Digital Library | (“SME” OR “small and medium enterprise” OR “small business”) AND (“DDoS” OR “distributed denial of service” OR “network attack”) AND (“detection” OR “mitigation” OR “defense” OR “security solution” OR “machine learning”) |
| IEEE Xplore | (“SME” OR “small and medium enterprise” OR “small business”) AND (“DDoS” OR “distributed denial of service” OR “network attack”) AND (“detection” OR “mitigation” OR “defense” OR “security solution” OR “machine learning”) |
| Scopus | (“SME” OR “small and medium enterprise” OR “small business”) AND (“DDoS” OR “distributed denial of service” OR “network attack”) AND (“detection” OR “mitigation” OR “defense” OR “security solution” OR “machine learning”) |
| Springer Link | (“SME” OR “small and medium enterprise” OR “small business”) AND (“DDoS” OR “distributed denial of service” OR “network attack”) AND (“detection” OR “mitigation” OR “defense” OR “security solution” OR “machine learning”) |
| Web of Science | TS = (“small business” OR “resource-constrained”) AND TS = (“network attack” OR DDoS) AND TS = (“detection” OR mitigation) AND TS = (“SDN”) |
| ScienceDirect | (“SME” OR “small and medium enterprise”) AND (“DDoS” OR (“distributed denial of service” OR “network attack”) AND (“detection” OR “mitigation”) OR (“security solution” OR “machi learning”) |
| MDPI | SDN DDoS detection Journal = Sensors |
| Wiley | (“software defined networking” OR SDN) AND (“distributed denial of service” OR DDoS) AND (detect * OR mitigate *) |
| PRISMA Details | Web of Science | Springer Link | Scopus | IEEE | Science Direct | ACM | MDPI | Wiley |
|---|---|---|---|---|---|---|---|---|
| Records Identified | 13 | 13 | 3 | 4 | 14 | 4 | 12 | 33 |
| Removed After Screening | 2 | 2 | 1 | 5 | 17 | |||
| Not in English | 1 | 1 | ||||||
| Books Excluded | 1 | 2 | ||||||
| Not in Date Range | 3 | |||||||
| Retracted | 1 | |||||||
| Records Included | 9 | 9 | 0 | 0 | 9 | 4 | 12 | 16 |
| Total Articles | 59 |
| Thematic Area | Representative Papers | Main Findings | Research Gaps/ SME Relevance |
|---|---|---|---|
| SME Cybersecurity Challenges | [11,12,13,14,15] |
|
|
| Emerging Technologies for Security | [4,5,6,14,16,17,18] |
|
|
| Threat Detection and Mitigation | [14,15,18,19,20,21] |
|
|
| Detection Approach | Representative Papers | Averaged Accuracy (%) | Resource/ Latency Profile | Dataset & Validation | Real-World Applicability (SME) | Observed Limitations |
|---|---|---|---|---|---|---|
| Lightweight ML/Heuristic | [22,23,24,28,30] | 90–95 | Very low CPU; <100 ms latency | CICIDS2017, Custom | Edge-deployable | Lower detection of novel patterns; limited adaptability |
| Hybrid Deep Learning (CNN/LSTM, ELM, GRU) | [8,9,31,32] | 97–99 | High GPU/CPU; >500 ms latency | CICDDoS2019, Bot-IoT | Limited (requires GPU) | Overfitting; poor scalability |
| Federated/Edge-AI/Adaptive | [17,29,33] | 93–97 | Moderate; distributed load | ToN-IoT, E-IIoT | Promising | Communication overhead; early-stage research |
| Tool/Framework | Typical Use in Research | Strengths | Limitations for SMEs |
|---|---|---|---|
| Ryu (Python3-based, open-source) | Used for DDoS detection and flow rule automation | Lightweight, scriptable, easily deployable on Raspberry Pi or virtual hosts | Limited scalability for multi-controller or carrier-grade networks |
| ONOS (Open Network Operating System) | Controller for carrier-scale and cloud-SDN experiments | Modular and useful for clusters, supports APIs | Complex setup and over-provisioned for SME needs |
| Floodlight [53] | Legacy Java-based OpenFlow controller used in early DDoS detection prototypes | Stable and easy integration with legacy switches | Limited modern ML interfaces and slower community updates |
| OpenDaylight (ODL) [54] | Enterprise-grade SDN controller with NFV and RESTCONF support | Supports RESTCONF, NETCONF, NFV extensions | High memory use, heavy memory use for small setups |
| Mininet | Virtual SDN emulation for experimentation and testing controller logic | Widely used, reproducible and supports Ryu/ONOS/ODL | Simulated use only and lacks physical device use |
| sFlow-RT/Open vSwitch (OVS) [55] | Real-time traffic monitoring and flow export for anomaly detection | Enables live anomaly capture and mitigation rules | Requires controller integration for automated blocking |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wainwright, R.; Bagheri, M.; Salama, A.; Saatchi, R. Software-Defined Networking Security Detection Strategies and Their Limitations with a Focus on Distributed Denial-of-Service for Small to Medium-Sized Enterprises. Appl. Sci. 2025, 15, 12389. https://doi.org/10.3390/app152312389
Wainwright R, Bagheri M, Salama A, Saatchi R. Software-Defined Networking Security Detection Strategies and Their Limitations with a Focus on Distributed Denial-of-Service for Small to Medium-Sized Enterprises. Applied Sciences. 2025; 15(23):12389. https://doi.org/10.3390/app152312389
Chicago/Turabian StyleWainwright, Ruth, Maryam Bagheri, Abdussalam Salama, and Reza Saatchi. 2025. "Software-Defined Networking Security Detection Strategies and Their Limitations with a Focus on Distributed Denial-of-Service for Small to Medium-Sized Enterprises" Applied Sciences 15, no. 23: 12389. https://doi.org/10.3390/app152312389
APA StyleWainwright, R., Bagheri, M., Salama, A., & Saatchi, R. (2025). Software-Defined Networking Security Detection Strategies and Their Limitations with a Focus on Distributed Denial-of-Service for Small to Medium-Sized Enterprises. Applied Sciences, 15(23), 12389. https://doi.org/10.3390/app152312389

