Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
DMSTG-AD: an SDN intrusion detection method based on dynamic multi-scale spatio-temporal graph neural network
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 22 March 2026

DMSTG-AD: an SDN intrusion detection method based on dynamic multi-scale spatio-temporal graph neural network

  • Ji Zhao1,
  • Damin Zhang1,
  • Qing He1,
  • Mu Lin1 &
  • …
  • Yuhan Yang1 

Scientific Reports , Article number:  (2026) Cite this article

  • 526 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Software-defined networking (SDN) centralizes control, simplifying network management and configuration while simultaneously increasing vulnerability to attacks, such as large-scale Distributed Denial-of-Service (DDoS) attacks or network topology spoofing. Conventional intrusion detection methods that rely on feature engineering or static graph modeling often fail to capture the complex topological dependencies and dynamic temporal patterns inherent in network traffic. To address this issue, a dynamic multi-scale spatio-temporal graph neural network framework, named DMSTG-AD, is proposed for intrusion detection. The model employs Gated Recurrent Unit (GRU)-driven dynamic node embeddings, an adaptive adjacency matrix, and edge–node collaborative convolution to extract spatial dependencies, while multi-scale dilated convolutions and a bidirectional GRU jointly capture short-term fluctuations and long-term trends. A spatio-temporal cross-attention mechanism is designed to integrate spatial and temporal features, thereby enhancing anomaly detection capabilities. Experimental results demonstrate that the proposed DMSTG-AD model achieves a multi-classification accuracy of 99.34% on the CIC-IDS2017 dataset and an overall accuracy of 99.88% on the InSDN dataset, both of which significantly exceed those of existing mainstream methods. Ablation experiments further validate the critical importance of dynamic modeling, dual-channel feature extraction, and the cross-attention mechanism in improving detection performance. This study not only offers a novel approach for high-precision intrusion detection in SDN environments but also broadens the application prospects of dynamic graph neural networks in the field of network security.

Similar content being viewed by others

Dynamic graph neural network-based framework to increase detection accuracy in SDN under DDOS

Article Open access 29 December 2025

Detection and mitigation of DDoS attacks based on multi-dimensional characteristics in SDN

Article Open access 16 July 2024

DDoS classification of network traffic in software defined networking SDN using a hybrid convolutional and gated recurrent neural network

Article Open access 09 August 2025

Data availability

The data supporting this study are available when reasonably requested from the corresponding author.

References

  1. Tang, Y., Wang, W.-Z., Wang, W.-Y. & Xu, B.-W. Design and implementation of the interconnected architecture of SDN and traditional IP network. Computer Eng. Sci. 39, 2210 (2017).

    Google Scholar 

  2. Kreutz, D. et al. Software-defined networking: A comprehensive survey. Proc. IEEE 103, 14–76 (2014).

    Google Scholar 

  3. Yoon, C. et al. Flow wars: Systemizing the attack surface and defenses in software-defined networks. IEEE/ACM Trans. Networking 25, 3514–3530 (2017).

    Google Scholar 

  4. Taheri, R., Ahmed, H. & Arslan, E. Deep learning for the security of software-defined networks: A review. Cluster Comput. 26, 3089–3112 (2023).

    Google Scholar 

  5. Chica, J. C. C., Imbachi, J. C. & Vega, J. F. B. Security in SDN: A comprehensive survey. J. Netw. Comput. Appl. 159, 102595 (2020).

    Google Scholar 

  6. Balakrishnan, S., Ivy, B. P. U. & Ilango, S. S. A novel and secured intrusion detection system for wireless sensor networks using identity based online/offline signature. ARPN J. Eng. Appl. Sci. 13, 8544–8547 (2018).

    Google Scholar 

  7. Saathvika, S., Accamma, B. & Santhosh Kumar, B. in 2024 Control Instrumentation System Conference (CISCON). 1–7 (IEEE).

  8. Mishra, P., Varadharajan, V., Tupakula, U. & Pilli, E. S. A detailed investigation and analysis of using machine learning techniques for intrusion detection. IEEE Commun. Surv. Tut. 21, 686–728 (2018).

    Google Scholar 

  9. Gu, J. & Lu, S. An effective intrusion detection approach using SVM with naïve Bayes feature embedding. Comput. Secur. 103, 102158 (2021).

    Google Scholar 

  10. Ahuja, N., Singal, G., Mukhopadhyay, D. & Kumar, N. Automated DDOS attack detection in software defined networking. J. Netw. Comput. Appl. 187, 103108 (2021).

    Google Scholar 

  11. Wu, K., Chen, Z. & Li, W. A novel intrusion detection model for a massive network using convolutional neural networks. IEEE Access 6, 50850–50859 (2018).

    Google Scholar 

  12. Malik, J. et al. Hybrid deep learning: An efficient reconnaissance and surveillance detection mechanism in SDN. IEEE Access 8, 134695–134706 (2020).

    Google Scholar 

  13. Bilot, T., El Madhoun, N., Al Agha, K. & Zouaoui, A. Graph neural networks for intrusion detection: A survey. IEEE Access 11, 49114–49139 (2023).

    Google Scholar 

  14. Caville, E., Lo, W. W., Layeghy, S. & Portmann, M. Anomal-E: A self-supervised network intrusion detection system based on graph neural networks. Knowl. Based Syst. 258, 110030 (2022).

    Google Scholar 

  15. Altaf, T., Wang, X., Ni, W., Liu, R. P. & Braun, R. NE-GConv: A lightweight node edge graph convolutional network for intrusion detection. Comput. Secur. 130, 103285 (2023).

    Google Scholar 

  16. Liu, H. & Lang, B. Machine learning and deep learning methods for intrusion detection systems: A survey. Appl. Sci. (Basel) 9, 4396 (2019).

    Google Scholar 

  17. ElSayed, M. S., Le-Khac, N.-A., Albahar, M. A. & Jurcut, A. A novel hybrid model for intrusion detection systems in SDNs based on CNN and a new regularization technique. J. Netw. Comput. Appl. 191, 103160 (2021).

    Google Scholar 

  18. Ravi, V., Chaganti, R. & Alazab, M. Recurrent deep learning-based feature fusion ensemble meta-classifier approach for intelligent network intrusion detection system. Comput. Electr. Eng. 102, 108156 (2022).

    Google Scholar 

  19. Assis, M. V., Carvalho, L. F., Lloret, J. & Proença, M. L. Jr. A GRU deep learning system against attacks in software defined networks. J. Netw. Comput. Appl. 177, 102942 (2021).

    Google Scholar 

  20. Elsayed, R. A., Hamada, R. A., Abdalla, M. I. & Elsaid, S. A. Securing IoT and SDN systems using deep-learning based automatic intrusion detection. Ain Shams Eng. J. 14, 102211 (2023).

    Google Scholar 

  21. Nguyen, T. G., Phan, T. V., Hoang, D. T., Nguyen, T. N. & So-In, C. Federated deep reinforcement learning for traffic monitoring in SDN-based IoT networks. IEEE Trans Cognit Commun Netw 7, 1048–1065 (2021).

    Google Scholar 

  22. Wang, H. & Li, W. DDosTC: A transformer-based network attack detection hybrid mechanism in SDN. Sensors 21, 5047 (2021).

    Google Scholar 

  23. Behera, A., Sahoo, K. S., Mishra, T. K. & Bhuyan, M. A combination learning framework to uncover cyber attacks in IoT networks. Internet of Things 28, 101395 (2024).

    Google Scholar 

  24. Guo, Y. et al. Traffic management in IoT backbone networks using GNN and MAB with SDN orchestration. Sensors 23, 7091 (2023).

    Google Scholar 

  25. Zhou, X. et al. Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system. IEEE Internet Things J. 9, 9310–9319 (2021).

    Google Scholar 

  26. Lo, W. W., Layeghy, S., Sarhan, M., Gallagher, M. & Portmann, M. E-graphsage: A graph neural network based intrusion detection system for iot. arXiv preprint arXiv:2103.16329 (2021).

  27. Lan, J. et al. E-minBatch GraphSAGE: An Industrial Internet Attack Detection Model. Security and Communication Networks 2022, 5363764 (2022).

    Google Scholar 

  28. Deng, P. & Huang, Y. Edge-featured multi-hop attention graph neural network for intrusion detection system. Comput. Secur. 148, 104132 (2025).

    Google Scholar 

  29. Wang, Y. et al. N-STGAT: Spatio-temporal graph neural network based network intrusion detection for near-earth remote sensing. Remote Sensing 15, 3611 (2023).

    Google Scholar 

  30. Duan, G., Lv, H., Wang, H., Feng, G. & Li, X. Practical cyber attack detection with continuous temporal graph in dynamic network system. IEEE Trans. Inf. Forensics Secur. 19, 4851–4864 (2024).

    Google Scholar 

  31. Duan, G., Lv, H., Wang, H. & Feng, G. Application of a dynamic line graph neural network for intrusion detection with semisupervised learning. IEEE Trans. Inf. Forensics Secur. 18, 699–714 (2022).

    Google Scholar 

  32. Xu, D., Ruan, C., Korpeoglu, E., Kumar, S. & Achan, K. Inductive representation learning on temporal graphs. arXiv preprint arXiv:2002.07962 (2020).

  33. Benzekki, K., El Fergougui, A. & Elbelrhiti Elalaoui, A. Software‐defined networking (SDN): A survey. Secur. Commun. Netw. 9, 5803–5833 (2016).

    Google Scholar 

  34. Chen, Q. et al. An adaptive adjacency matrix-based graph convolutional recurrent network for air quality prediction. Sci. Rep. 14, 4408 (2024).

    Google Scholar 

  35. Dey, R. & Salem, F. M. in 2017 IEEE 60th international midwest symposium on circuits and systems (MWSCAS). 1597–1600 (IEEE).

  36. Lea, C., Flynn, M. D., Vidal, R., Reiter, A. & Hager, G. D. in proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 156–165.

  37. Sharafaldin, I., Lashkari, A. H. & Ghorbani, A. A. Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1, 108–116 (2018).

    Google Scholar 

  38. Elsayed, M. S., Le-Khac, N.-A. & Jurcut, A. D. InSDN: A novel SDN intrusion dataset. IEEE Access 8, 165263–165284 (2020).

    Google Scholar 

  39. Kipf, T. Semi-supervised classification with graph convolutional networks. arXiv preprint arXiv:1609.02907 (2016).

  40. Veličković, P. et al. Graph attention networks. arXiv preprint arXiv:1710.10903 (2017).

  41. Said, R. B., Sabir, Z. & Askerzade, I. CNN-BiLSTM: A hybrid deep learning approach for network intrusion detection system in software-defined networking with hybrid feature selection. IEEE Access 11, 138732–138747 (2023).

    Google Scholar 

  42. Ma, Z., Liu, Y., Chen, Y., Liu, Z. & Li, Y. XMF-GNN: A cross-modality dynamic fusion heterogeneous graph neural network for network intrusion detection. Neurocomputing https://doi.org/10.1016/j.neucom.2025.131285 (2025).

    Google Scholar 

  43. Le, H.-D. & Park, M. Enhancing multi-class attack detection in graph neural network through feature rearrangement. Electronics 13, 2404 (2024).

    Google Scholar 

  44. Shoukat, S., Gao, T., Javeed, D., Saeed, M. S. & Adil, M. Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks. Comput. Secur. 149, 104191 (2025).

    Google Scholar 

  45. Zhang, Y., Jue, C., Liu, W. & Ma, Y. GRAN: A SDN intrusion detection model based on graph attention network and residual learning. Comput. J. 68, 241–260 (2025).

    Google Scholar 

Download references

Funding

This work is sponsored by the National Natural Science Foundation of China (NO.52578067).

Author information

Authors and Affiliations

  1. College of Big Data and Information Engineering, Guizhou University, Guiyang, 550025, China

    Ji Zhao, Damin Zhang, Qing He, Mu Lin & Yuhan Yang

Authors
  1. Ji Zhao
    View author publications

    Search author on:PubMed Google Scholar

  2. Damin Zhang
    View author publications

    Search author on:PubMed Google Scholar

  3. Qing He
    View author publications

    Search author on:PubMed Google Scholar

  4. Mu Lin
    View author publications

    Search author on:PubMed Google Scholar

  5. Yuhan Yang
    View author publications

    Search author on:PubMed Google Scholar

Contributions

J.Z.: Conceptualization, Methodology, Software, Validation, Formal analysis, Writing-original draft preparation. D.Z.: Validation, Resources. Q.H.: Writing—review and editing, Formal analysis. M.L.: Writing—review and editing. Y. Y.: Writing—review and editing.

Corresponding author

Correspondence to Damin Zhang.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, J., Zhang, D., He, Q. et al. DMSTG-AD: an SDN intrusion detection method based on dynamic multi-scale spatio-temporal graph neural network. Sci Rep (2026). https://doi.org/10.1038/s41598-026-44360-4

Download citation

  • Received: 26 October 2025

  • Accepted: 11 March 2026

  • Published: 22 March 2026

  • DOI: https://doi.org/10.1038/s41598-026-44360-4

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Graph neural network
  • Software-defined networking
  • Network intrusion detection system
  • Dynamic spatio-temporal modeling
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics