A Deep Convolutional Neural Network and SDN-based Closed-Loop System for Real-Time Network Attack Detection and Mitigation
DOI:
https://doi.org/10.70882/josrar.2026.v3i1.112Keywords:
Cyber Threats, Deep Convolutional Neural Network (DCNN), Software-Defined Networking (SDN), Traffic Classification, Threat MitigationAbstract
The increasing sophistication of cyber threats demands more intelligent and adaptive network defenses than traditional architectures can provide. This research bridges this gap by designing and implementing an integrated system that leverages a Deep Convolutional Neural Network (DCNN) for real-time traffic classification within a Software-Defined Networking (SDN) control loop, enabling automated threat mitigation. Evaluated in an emulated environment, the system demonstrated a perfect 100% detection rate with zero false positives against a range of common attacks while introducing minimal operational overhead, with only a 3.1% throughput reduction. Crucially, it preserved legitimate throughput by a factor of 4.2x during attacks, proving the viability of a closed-loop, DCNN-SDN framework for achieving robust, self-defending network security without compromising performance.
References
Cisco, "Cisco Annual Internet Report (2018–2023)," Cisco White Paper, 2023.
D. Kreutz, F. M. V. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, "Software-defined networking: A comprehensive survey," Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: Enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, Apr. 2008.
Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436–444, May 2015.
N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2015, pp. 1–6.
T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in 2018 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakech, Morocco, 2018, pp. 1–6.
Y. Tang, L. Gu, and X. Wang, "Real-time network intrusion detection: Challenges and solutions," IEEE Network, vol. 36, no. 4, pp. 174–181, Jul./Aug. 2022.
R. Zuech, T. M. Khoshgoftaar, and N. Seliya, "A survey of intrusion detection systems and their evaluation," ACM Computing Surveys (CSUR), vol. 47, no. 3, pp. 1–35, Feb. 2015.
Y. Zeng, Y. Gu, H. Wei, W. Wei, and Y. Guo, "Deep-Full-Range: A deep learning based network encrypted traffic classification and intrusion detection framework," IEEE Access, vol. 7, pp. 45 182–45 190, 2019.
H. Liu, B. Lang, M. Liu, and H. Yan, "CNN and RNN based payload classification methods for attack detection," Knowledge-Based Systems, vol. 218, p. 106845, Apr. 2021.
H. Zhang, Y. Li, and Z. Wang, "A CNN-based intrusion detection system for software-defined networking," Computer Networks, vol. 205, p. 108761, Feb. 2022.
W. Zhou, J. Li, and M. Zhang, "Reinforcement learning for traffic engineering in software-defined networks: A survey," Journal of Network and Computer Applications, vol. 203, p. 103394, Aug. 2022.
M. M. Badr, A. Al-Fuqaha, A. Gupta, and A. Rasheed, "Deep learning for SDN intrusion detection: A systematic review," IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 685–725, Firstquarter 2023.
S. Kiranyaz, T. Ince, and M. Gabbouj, "Real-time patient-specific ECG classification by 1-D convolutional neural networks," IEEE Transactions on Biomedical Engineering, vol. 63, no. 3, pp. 664–675, Mar. 2016.
S. Ioffe and C. Szegedy, "Batch normalization: Accelerating deep network training by reducing internal covariate shift," in Proceedings of the 32nd International Conference on Machine Learning (ICML), Lille, France, 2015, pp. 448–456.
N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, "Dropout: A simple way to prevent neural networks from overfitting," Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929–1958, Jun. 2014.
D. P. Kingma and J. Ba, "Adam: A method for stochastic optimization," in 3rd International Conference on Learning Representations (ICLR), San Diego, CA, USA, 2015.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Journal of Science Research and Reviews

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
- Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.