Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
A federated deep learning approach for SDN security with quantum optimized feature selection and hybrid MSDC net architecture
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 10 February 2026

A federated deep learning approach for SDN security with quantum optimized feature selection and hybrid MSDC net architecture

  • S. Rohith1,
  • G. Logeswari1,
  • K. Tamilarasi1 &
  • …
  • G. Sudhakaran2 

Scientific Reports , Article number:  (2026) Cite this article

  • 480 Accesses

  • 1 Altmetric

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Software-Defined Networking (SDN) is increasingly exposed to complex cyberattacks, requiring advanced, adaptive, and efficient intrusion detection mechanisms. This study presents LightIDS-SDN, a federated and explainable intrusion detection framework tailored for SDN environments. At its core, the system employs Dual Fitness Enhanced Quantum-Inspired Particle Swarm Optimization (DFE-GQPSO) for feature selection, which identifies the most informative network attributes while eliminating redundant or irrelevant features. This quantum-optimized feature selection significantly improves detection performance by reducing overfitting and enhancing generalization. The framework incorporates a hybrid deep learning architecture, MSDC-Net, combining Transformer layers, Capsule Networks, and BiLSTM units to capture contextual, spatial, and sequential dependencies in network traffic. Federated learning using FedAvg enables collaborative model training across multiple SDN controllers while preserving data privacy. Explainable AI modules, based on SHapley Additive exPlanations (SHAP) and Gradient-weighted Class Activation Mapping (Grad-CAM), provide both global and local interpretability, ensuring transparent and accountable decision-making. Experiments on the InSDN dataset demonstrate the effectiveness of the proposed system, achieving 98.73% accuracy, 98.80% precision, 98.65% recall, and 98.72% F1-score. Comparative analysis confirms that DFE-GQPSO outperforms traditional feature selection methods, enhancing model robustness and training efficiency. Overall, LightIDS-SDN effectively detects a wide range of SDN attacks while addressing limitations of conventional IDS approaches, including limited scalability, lack of interpretability, and computational inefficiency. This work lays the foundation for deploying quantum-optimized, explainable, and federated intrusion detection systems in SDN networks.

Data availability

The datasets analysed during the current study are available in the Kaggle repository, https://www.kaggle.com/datasets/badcodebuilder/insdn-dataset.

Code Availability

All code, preprocessing scripts, dataset splits, and model artifacts used in this study are publicly available in the GitHub repository at: [https://github.com/logeswarig/LightIDS]. A permanent archive of this repository has been deposited in Zenodo, accessible via the DOI: [https://doi.org/10.5281/zenodo.18159862].

References

  1. Singh, S. & Jha, R. K. A survey on software defined networking: architecture for next generation network. J. Netw. Syst. Manage. 25 (2), 321–374 (2017).

    Google Scholar 

  2. Kreutz, D. et al. Software-defined networking: A comprehensive survey. Proceedings of the IEEE, 103(1), 14–76. (2014).

  3. Anand, N. et al. Securing Software Defined Networks: A Comprehensive Analysis of approaches, applications, and Future Strategies against DoS Attacks (IEEE Access, 2024).

  4. Benzekki, K., El Fergougui, A. & Elbelrhiti Elalaoui, A. Software-defined networking (SDN): a survey. Secur. Communication Networks. 9 (18), 5803–5833 (2016).

    Google Scholar 

  5. Scott-Hayward, S., O’Callaghan, G. & Sezer, S. SDN security: A survey. In: 2013 IEEE SDN For Future Networks and Services (SDN4FNS) 1–7 (IEEE, 2013).

  6. Shin, S. et al. Fresco: Modular composable security services for software-defined networks. In 20th annual network & distributed system security symposium. Ndss. (2013).

  7. Hong, S., Xu, L., Wang, H. & Gu, G. Poisoning network visibility in software-defined networks: New attacks and countermeasures. In Ndss 15, 8–11 (2015).

  8. Alsmadi, I. & Xu, D. Security of software defined networks: A survey. Computers Secur. 53, 79–108 (2015).

    Google Scholar 

  9. Logeswari, G., Bose, S. & Anitha, T. J. I. A. An intrusion detection system for Sdn using machine learning. Intell. Autom. Soft Comput. 35 (1), 867–880 (2023).

    Google Scholar 

  10. Bose, S. et al. Multi-Layer Adaptive Intrusion Detection and Mitigation System for SDN Adversarial Threats using a BAT-MC Model. In: 2024 9th International Conference on Communication and Electronics Systems (ICCES) 886–891 (IEEE, 2024).

  11. Mousavi, S. M. & St-Hilaire, M. Early detection of DDoS attacks against SDN controllers. In: 2015 international conference on computing, networking and communications (ICNC) 77–81 (IEEE, 2015).

  12. Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R. & Ghogho, M. Deep learning approach for network intrusion detection in software defined networking. In: 2016 international conference on wireless networks and mobile communications (WINCOM) 258–263 (IEEE, 2016).

  13. Yan, Q., Yu, F. R., Gong, Q. & Li, J. Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Commun. Surv. Tutorials. 18 (1), 602–622 (2015).

    Google Scholar 

  14. Yan, Q., Huang, W., Luo, X., Gong, Q. & Yu, F. R. A multi-level DDoS mitigation framework for the industrial internet of things. IEEE Commun. Mag. 56 (2), 30–36 (2018).

    Google Scholar 

  15. Wang, P., Lin, S. C. & Luo, M. A framework for QoS-aware traffic classification using semi-supervised machine learning in SDNs. In: 2016 IEEE international conference on services computing (SCC). 760–765 (IEEE, 2016).

  16. Ali, D. et al. Improving the explainability and transparency of deep learning models in intrusion detection systems. Kashf J. Multidisciplinary Res. 2(02), 149–164 (2025).

    Google Scholar 

  17. Ujjan, R. M. A. et al. Towards sFlow and adaptive polling sampling for deep learning based DDoS detection in SDN. Future Generation Comput. Syst. 111, 763–779 (2020).

    Google Scholar 

  18. Hindy, H. et al. A taxonomy and survey of intrusion detection system design techniques, network threats and datasets. (2018).

  19. Kreutz, D., Ramos, F. M. & Verissimo, P. Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking 55–60 (2013).

  20. Scott-Hayward, S., Natarajan, S. & Sezer, S. A survey of security in software defined networks. IEEE Commun. Surv. Tutorials. 18 (1), 623–654 (2015).

    Google Scholar 

  21. Ahmed, R. S. & Atia, T. S. Machine learning and deep learning for distributed denial of service attack detection in software-defined networking: A review. In: AIP Conference Proceedings 3211(1), 030030 (AIP Publishing LLC, 2025).

  22. Saheed, Y. K., Abdulganiyu, O. H., Majikumna, K. U., Mustapha, M. & Workneh, A. D. ResNet50-1D-CNN: A new lightweight resNet50-One-dimensional Convolution neural network transfer learning-based approach for improved intrusion detection in cyber-physical systems. Int. J. Crit. Infrastruct. Prot. 45, 100674 (2024).

    Google Scholar 

  23. Saheed, Y. K., Misra, S. & Chockalingam, S. Autoencoder via DCNN and LSTM models for intrusion detection in industrial control systems of critical infrastructures. In: 2023 IEEE/ACM 4th International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) 9–16 (IEEE, 2023).

  24. Ingre, B. & Yadav, A. Performance analysis of NSL-KDD dataset using ANN. In: 2015 international conference on signal processing and communication engineering systems 92–96 (IEEE, 2015).

  25. Laghrissi, F., Douzi, S., Douzi, K. & Hssina, B. Intrusion detection systems using long short-term memory (LSTM). J. Big Data. 8 (1), 65 (2021).

    Google Scholar 

  26. Kang, H., Vo, T., Kim, H. K. & Hong, J. B. CANival: A multimodal approach to intrusion detection on the vehicle CAN bus. Veh. Commun. 50, 100845 (2024).

    Google Scholar 

  27. Saheed, Y. K., Abdulganiyu, O. H. & Ait Tchakoucht, T. Modified genetic algorithm and fine-tuned long short-term memory network for intrusion detection in the internet of things networks with edge capabilities. Appl. Soft Comput. 155, 111434 (2024).

    Google Scholar 

  28. Wang, W., Zhu, M., Zeng, X., Ye, X. & Sheng, Y. Malware traffic classification using convolutional neural network for representation learning. In: 2017 International conference on information networking (ICOIN) 712–717 (IEEE, 2017).

  29. Toldinas, J. et al. A novel approach for network intrusion detection using multistage deep learning image recognition. Electronics 10 (15), 1854 (2021).

    Google Scholar 

  30. Yin, C., Zhu, Y., Fei, J. & He, X. A deep learning approach for intrusion detection using recurrent neural networks. Ieee Access. 5, 21954–21961 (2017).

    Google Scholar 

  31. Fu, Y., Du, Y., Cao, Z., Li, Q. & Xiang, W. A deep learning model for network intrusion detection with imbalanced data. Electronics 11 (6), 898 (2022).

    Google Scholar 

  32. Saheed, Y. K., Abdulganiyu, O. H. & Ait Tchakoucht, T. A novel hybrid ensemble learning for anomaly detection in industrial sensor networks and SCADA systems for smart City infrastructures. J. King Saud University-Computer Inform. Sci. 35 (5), 101532 (2023).

    Google Scholar 

  33. Yang, Q., Liu, Y., Chen, T. & Tong, Y. Federated machine learning: concept and applications. ACM Trans. Intell. Syst. Technol. (TIST). 10 (2), 1–19 (2019).

    Google Scholar 

  34. Liu, Y., James, J. Q., Kang, J., Niyato, D. & Zhang, S. Privacy-preserving traffic flow prediction: A federated learning approach. IEEE Internet Things J. 7 (8), 7751–7763 (2020).

    Google Scholar 

  35. Li, T., Sahu, A. K., Talwalkar, A. & Smith, V. Federated learning: Challenges, methods, and future directions. IEEE. Signal. Process. Mag. 37 (3), 50–60 (2020).

    Google Scholar 

  36. Karimireddy, S. P. et al. Scaffold: Stochastic controlled averaging for federated learning. In International conference on machine learning 5132–5143 (PMLR, 2020).

  37. Zhao, Y. et al. Federated learning with non-iid data. ArXiv Preprint https://abs/arXiv.org/180600582. (2018).

  38. Konečný, J. et al. Federated learning: strategies for improving communication efficiency. ArXiv Preprint https://abs/arXiv .org/161005492. (2016).

  39. Khan, I. A., Pi, D., Kamal, S., Alsuhaibani, M. & Alshammari, B. M. Federated-boosting: a Distributed and Dynamic boosting-powered cyber-attack Detection Scheme for Security and Privacy of Consumer IoT (IEEE Transactions on Consumer Electronics, 2024).

  40. Khan, I. A. et al. Fed-inforce-fusion: A federated reinforcement-based fusion model for security and privacy protection of IoMT networks against cyber-attacks. Inform. Fusion. 101, 102002 (2024).

    Google Scholar 

  41. Khan, I. A. et al. A novel collaborative Sru network with dynamic behaviour aggregation, reduced communication overhead and explainable features. IEEE J. Biomedical Health Inf. 28 (6), 3228–3235 (2024).

    Google Scholar 

  42. Saheed, Y. K. & Misra, S. CPS-IoT-PPDNN: A new explainable privacy preserving DNN for resilient anomaly detection in Cyber-Physical Systems-enabled IoT networks Vol. 191, 115939 (Chaos, Solitons & Fractals, 2025).

    Google Scholar 

  43. Saheed, Y. K. & Chukwuere, J. E. CPS-IIoT-P2Attention: Explainable privacy-preserving with scaled dot-product attention in cyber physical system-industrial IoT network (IEEE Access, 2025).

    Google Scholar 

  44. Arora, S. & Anand, P. Binary butterfly optimization approaches for feature selection. Expert Syst. Appl. 116, 147–160 (2019).

    Google Scholar 

  45. Biamonte, J. et al. Quantum machine learning. Nature 549 (7671), 195–202 (2017).

    Google Scholar 

  46. Xie, M., Zhang, Y., Zhong, S. & Li, Q. Privacy-preserving quantum annealing for Quadratic Unconstrained Binary Optimization (QUBO) problems. In: 2024 IEEE International Conference on Quantum Computing and Engineering (QCE). 1, 1347–1353 (IEEE, 2024).

  47. Larkin, J., Jonsson, M., Justice, D. & Guerreschi, G. G. Evaluation of QAOA based on the approximation ratio of individual samples. Quantum Sci. Technol. 7 (4), 045014 (2022).

    Google Scholar 

Download references

Funding

Open access funding provided by Vellore Institute of Technology.

Author information

Authors and Affiliations

  1. School of Computer Science and Engineering, Vellore Institute of Technology, Chennai, 600 127, TamilNadu, India

    S. Rohith, G. Logeswari & K. Tamilarasi

  2. School of Electronics Engineering, Vellore Institute of Technology, Chennai, 600 127, TamilNadu, India

    G. Sudhakaran

Authors
  1. S. Rohith
    View author publications

    Search author on:PubMed Google Scholar

  2. G. Logeswari
    View author publications

    Search author on:PubMed Google Scholar

  3. K. Tamilarasi
    View author publications

    Search author on:PubMed Google Scholar

  4. G. Sudhakaran
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Conceptualization, L.G.; methodology, R.S., L.G., T.K and S.G.; formal analysis, L.G., and S.G.; investigation, L.G., R.S., and T.K.; writing-original draft preparation, L.G., R.S., T.K., and S.G.; writing-review and editing, R.S., L.G., and T.K; visualization, R.S., and L.G.; supervision, L.G., and T.K.;. All authors have reviewed the manuscript.

Corresponding author

Correspondence to G. Logeswari.

Ethics declarations

Competing interests

The authors declare no competing interests.

Ethical approval

All the author declares their ethics approval.

Consent for publication

All the author declares their consent for publication.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Rohith, S., Logeswari, G., Tamilarasi, K. et al. A federated deep learning approach for SDN security with quantum optimized feature selection and hybrid MSDC net architecture. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37289-1

Download citation

  • Received: 07 August 2025

  • Accepted: 21 January 2026

  • Published: 10 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-37289-1

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Software-defined networking
  • Intrusion detection system
  • Feature selection
  • Particle swarm optimization
  • Transformer
  • Capsule network
  • BiLSTM
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics