A Deep Convolutional Neural Network and SDN-based Closed-Loop System for Real-Time Network Attack Detection and Mitigation

Authors

  • Luqman Muhammad Ghali Federal University Dutsin-Ma Author
  • Eli Adama Jiya Federal University Dutsin-Ma image/svg+xml Author
  • Ahmed Ibrahim Mahmud Federal University Dutsin-Ma image/svg+xml Author

DOI:

https://doi.org/10.70882/josrar.2026.v3i1.112

Keywords:

Cyber Threats, Deep Convolutional Neural Network (DCNN), Software-Defined Networking (SDN), Traffic Classification, Threat Mitigation

Abstract

The increasing sophistication of cyber threats demands more intelligent and adaptive network defenses than traditional architectures can provide. This research bridges this gap by designing and implementing an integrated system that leverages a Deep Convolutional Neural Network (DCNN) for real-time traffic classification within a Software-Defined Networking (SDN) control loop, enabling automated threat mitigation. Evaluated in an emulated environment, the system demonstrated a perfect 100% detection rate with zero false positives against a range of common attacks while introducing minimal operational overhead, with only a 3.1% throughput reduction. Crucially, it preserved legitimate throughput by a factor of 4.2x during attacks, proving the viability of a closed-loop, DCNN-SDN framework for achieving robust, self-defending network security without compromising performance.

Author Biographies

  • Eli Adama Jiya, Federal University Dutsin-Ma

    PhD, Department of Computer Science, Federal University Dutsin Ma

  • Ahmed Ibrahim Mahmud, Federal University Dutsin-Ma

    Department of computer science, Federal University Dutsinma, Katsina state

     

References

Cisco, "Cisco Annual Internet Report (2018–2023)," Cisco White Paper, 2023.

D. Kreutz, F. M. V. Ramos, P. E. Verissimo, C. E. Rothenberg, S. Azodolmolky, and S. Uhlig, "Software-defined networking: A comprehensive survey," Proceedings of the IEEE, vol. 103, no. 1, pp. 14–76, Jan. 2015.

N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: Enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, Apr. 2008.

Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436–444, May 2015.

N. Moustafa and J. Slay, "UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)," in 2015 Military Communications and Information Systems Conference (MilCIS), Canberra, Australia, 2015, pp. 1–6.

T. A. Tang, L. Mhamdi, D. McLernon, S. A. R. Zaidi, and M. Ghogho, "Deep learning approach for network intrusion detection in software defined networking," in 2018 International Conference on Wireless Networks and Mobile Communications (WINCOM), Marrakech, Morocco, 2018, pp. 1–6.

Y. Tang, L. Gu, and X. Wang, "Real-time network intrusion detection: Challenges and solutions," IEEE Network, vol. 36, no. 4, pp. 174–181, Jul./Aug. 2022.

R. Zuech, T. M. Khoshgoftaar, and N. Seliya, "A survey of intrusion detection systems and their evaluation," ACM Computing Surveys (CSUR), vol. 47, no. 3, pp. 1–35, Feb. 2015.

Y. Zeng, Y. Gu, H. Wei, W. Wei, and Y. Guo, "Deep-Full-Range: A deep learning based network encrypted traffic classification and intrusion detection framework," IEEE Access, vol. 7, pp. 45 182–45 190, 2019.

H. Liu, B. Lang, M. Liu, and H. Yan, "CNN and RNN based payload classification methods for attack detection," Knowledge-Based Systems, vol. 218, p. 106845, Apr. 2021.

H. Zhang, Y. Li, and Z. Wang, "A CNN-based intrusion detection system for software-defined networking," Computer Networks, vol. 205, p. 108761, Feb. 2022.

W. Zhou, J. Li, and M. Zhang, "Reinforcement learning for traffic engineering in software-defined networks: A survey," Journal of Network and Computer Applications, vol. 203, p. 103394, Aug. 2022.

M. M. Badr, A. Al-Fuqaha, A. Gupta, and A. Rasheed, "Deep learning for SDN intrusion detection: A systematic review," IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 685–725, Firstquarter 2023.

S. Kiranyaz, T. Ince, and M. Gabbouj, "Real-time patient-specific ECG classification by 1-D convolutional neural networks," IEEE Transactions on Biomedical Engineering, vol. 63, no. 3, pp. 664–675, Mar. 2016.

S. Ioffe and C. Szegedy, "Batch normalization: Accelerating deep network training by reducing internal covariate shift," in Proceedings of the 32nd International Conference on Machine Learning (ICML), Lille, France, 2015, pp. 448–456.

N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov, "Dropout: A simple way to prevent neural networks from overfitting," Journal of Machine Learning Research, vol. 15, no. 1, pp. 1929–1958, Jun. 2014.

D. P. Kingma and J. Ba, "Adam: A method for stochastic optimization," in 3rd International Conference on Learning Representations (ICLR), San Diego, CA, USA, 2015.

System Architecture and Methodology

Downloads

Published

2026-02-09

How to Cite

Ghali, L. M., Jiya, E. A., & Mahmud, A. I. (2026). A Deep Convolutional Neural Network and SDN-based Closed-Loop System for Real-Time Network Attack Detection and Mitigation. Journal of Science Research and Reviews, 3(1), 78-86. https://doi.org/10.70882/josrar.2026.v3i1.112