  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Fusion: Practice and Applications</full_title>
  <abbrev_title>FPA</abbrev_title>
  <issn media_type="print">2692-4048</issn>
  <issn media_type="electronic">2770-0070</issn>
  <doi_data>
   <doi>10.54216/FPA</doi>
   <resource>https://www.americaspg.com/journals/show/2528</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2018</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2018</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Intrusion Detection in Software-Defined Networks: Leveraging Deep Reinforcement Learning with Graph Convolutional Networks for Resilient Infrastructure</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">College of Dentistry, University of Al-Ameed, Iraq</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Mohanad</given_name>
    <surname>Mohanad</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Ministry of Higher Education and Scientific Research , Baghdad, Iraq; Visiting Fellow , School of Engineering and Build Environment, Anglia Ruskin University, Chelmsford , UK</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Firas</given_name>
    <surname>Hazzaa</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Medical Instruments techniques Engineering Department, Technical College of Engineering, ‏ Al-Bayan University, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Mohanad Sameer</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Department of Medical Instrumentation Technical Engineering, Medical Technical College, Al-Farahidi University, Baghdad, Iraq</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Jamal Fadhil</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ravi</given_name>
    <surname>Sekhar</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Pritesh</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">Symbiosis Institute of Technology (SIT) Pune Campus, Symbiosis International (Deemed University) (SIU), Pune, 412115, Maharashtra, India</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Sushma</given_name>
    <surname>Parihar</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>Protecting Software-Defined Networking (SDN) environments from intrusions and unauthorized access requires a high level of security. Security issues have arisen because of the widespread use of Software-Defined Networking (SDN), especially regarding intrusions that may cause disruptions to network operations by gaining unauthorized access. Intrusion is a danger to an SDN architecture's security, efficacy, and dependability because it involves manipulation or disruption. To improve SDN security through Intrusion Detection Systems (IDS), this study suggests a novel approach that makes use of Graph Convolutional Networks (GCN) and Deep Reinforcement Learning (DRL). The approach, which makes use of the NSL-KDD dataset, shows enhanced performance measures for intrusion detection, such as accuracy (93.8%), recall (93%), F1-score (92%), and precision (94.2%). This work establishes the groundwork for resilient infrastructure against threats and advances the security posture of SDN environments.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>78</first_page>
   <last_page>87</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/FPA.150107</doi>
   <resource>https://www.americaspg.com/articleinfo/3/show/2528</resource>
  </doi_data>
 </journal_article>
</journal>
