{"id":"https://openalex.org/W4388617526","doi":"https://doi.org/10.1002/cpe.7953","title":"DMoiSDN: A defensive mechanism of object integrity for SDN","display_name":"DMoiSDN: A defensive mechanism of object integrity for SDN","publication_year":2023,"publication_date":"2023-11-12","ids":{"openalex":"https://openalex.org/W4388617526","doi":"https://doi.org/10.1002/cpe.7953"},"language":"en","primary_location":{"id":"doi:10.1002/cpe.7953","is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.7953","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Concurrency and Computation: Practice and Experience","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5093250031","display_name":"Nora A. Alsalamh","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Nora A. Alsalamh","raw_affiliation_strings":["Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063843479","display_name":"Abdulrahman Almutairi","orcid":null},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]},{"id":"https://openalex.org/I91450128","display_name":"Jazan University","ror":"https://ror.org/02bjnq803","country_code":"SA","type":"education","lineage":["https://openalex.org/I91450128"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"AbdulRahman Al\u2010Mutairi","raw_affiliation_strings":["Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","Department of Computer and Network Engineering Jazan University  Jazan KSA","Department of Computer and Network Engineering, Jazan University, Jazan, KSA","Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Computer and Network Engineering Jazan University  Jazan KSA","institution_ids":["https://openalex.org/I91450128"]},{"raw_affiliation_string":"Department of Computer and Network Engineering, Jazan University, Jazan, KSA","institution_ids":["https://openalex.org/I91450128"]},{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069002716","display_name":"Abdulmalik Humayed","orcid":"https://orcid.org/0000-0002-4193-039X"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Abdulmalik A. Humayed","raw_affiliation_strings":["Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA","institution_ids":["https://openalex.org/I28022161"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075968009","display_name":"Mohammed J. F. Alenazi","orcid":"https://orcid.org/0000-0001-6593-112X"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":true,"raw_author_name":"Mohammed J. F. Alenazi","raw_affiliation_strings":["Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences King Saud University  Riyadh KSA","institution_ids":["https://openalex.org/I28022161"]},{"raw_affiliation_string":"Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh, KSA","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075968009"],"corresponding_institution_ids":["https://openalex.org/I28022161"],"apc_list":{"value":4740,"currency":"USD","value_usd":4740},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.18513803,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"36","issue":"15","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7594785690307617},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7038317918777466},{"id":"https://openalex.org/keywords/latency","display_name":"Latency (audio)","score":0.649498701095581},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6066124439239502},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.45271265506744385},{"id":"https://openalex.org/keywords/mechanism","display_name":"Mechanism (biology)","score":0.441254198551178},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39482948184013367},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.17574241757392883},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1067645251750946}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7594785690307617},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7038317918777466},{"id":"https://openalex.org/C82876162","wikidata":"https://www.wikidata.org/wiki/Q17096504","display_name":"Latency (audio)","level":2,"score":0.649498701095581},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6066124439239502},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.45271265506744385},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.441254198551178},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39482948184013367},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.17574241757392883},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1067645251750946},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/cpe.7953","is_oa":false,"landing_page_url":"https://doi.org/10.1002/cpe.7953","pdf_url":null,"source":{"id":"https://openalex.org/S11065456","display_name":"Concurrency and Computation Practice and Experience","issn_l":"1532-0626","issn":["1532-0626","1532-0634"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Concurrency and Computation: Practice and Experience","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1966312720","https://openalex.org/W1978539378","https://openalex.org/W2005422979","https://openalex.org/W2005525408","https://openalex.org/W2019419295","https://openalex.org/W2032869090","https://openalex.org/W2054473533","https://openalex.org/W2062959015","https://openalex.org/W2074616737","https://openalex.org/W2078623873","https://openalex.org/W2088216519","https://openalex.org/W2112700013","https://openalex.org/W2125560635","https://openalex.org/W2130026698","https://openalex.org/W2257393941","https://openalex.org/W2425086167","https://openalex.org/W2528154188","https://openalex.org/W2547541382","https://openalex.org/W2550906241","https://openalex.org/W2554814176","https://openalex.org/W2607257341","https://openalex.org/W2773651084","https://openalex.org/W2774100094","https://openalex.org/W2801299695","https://openalex.org/W2809305843","https://openalex.org/W2968533953","https://openalex.org/W2980814700","https://openalex.org/W3088190924","https://openalex.org/W3104736991","https://openalex.org/W4237990977","https://openalex.org/W4243048897","https://openalex.org/W4282927255","https://openalex.org/W4315746341"],"related_works":["https://openalex.org/W2382997850","https://openalex.org/W2390968135","https://openalex.org/W2382213751","https://openalex.org/W2351750670","https://openalex.org/W1597848696","https://openalex.org/W2354715126","https://openalex.org/W2388563748","https://openalex.org/W2375179084","https://openalex.org/W2366646518","https://openalex.org/W2370906336"],"abstract_inverted_index":{"Summary":[0],"Software\u2010defined":[1],"network":[2],"(SDN)":[3],"technology":[4],"is":[5,177],"widely":[6],"used":[7],"for":[8,57,97,173],"computer":[9],"networks,":[10],"especially":[11],"in":[12,42,93,135,152],"enterprise":[13],"data":[14],"centers":[15],"and":[16,38],"virtualized":[17],"networking.":[18],"However,":[19],"SDN":[20,58],"networks":[21],"encounter":[22],"severe":[23],"challenges":[24],"to":[25,60,72,141,158,179,187,192],"security.":[26],"One":[27],"such":[28],"challenge":[29],"comes":[30],"from":[31,139,156],"third\u2010party":[32],"applications":[33],"that":[34,112,132],"contain":[35],"malicious":[36],"logic":[37],"security":[39],"vulnerabilities,":[40],"resulting":[41],"controller":[43],"integrity":[44,56,75],"attacks.":[45,99],"In":[46],"this":[47],"paper,":[48],"we":[49,130],"propose":[50],"a":[51,83,89,167,181,194],"defensive":[52],"mechanism":[53],"of":[54,77,91,105,146,163,170],"object":[55],"(DMoiSDN)":[59],"mitigate":[61],"the":[62,74,78,94,103,123],"issue":[63],"known":[64],"as":[65,128],"Cross\u2010App":[66],"Poisoning":[67],"(CAP).":[68],"Our":[69],"results":[70,104,121],"contribute":[71],"increasing":[73],"level":[76],"controller's":[79],"resources":[80],"by":[81],"conducting":[82],"potential":[84,98],"risk":[85,95],"analysis,":[86],"which":[87],"showed":[88],"decrease":[90],"57%":[92],"factor":[96],"We":[100],"further":[101],"examined":[102],"comparing":[106],"DMoiSDN's":[107],"performance":[108],"with":[109,143,160],"related":[110],"work":[111],"uses":[113],"information":[114],"flow":[115],"control":[116],"(IFC)":[117],"policies.":[118],"The":[119],"best":[120],"among":[122],"three":[124],"conducted":[125],"scenarios":[126],"were":[127],"follows:":[129],"found":[131],"decreased":[133],"latency":[134,185],"our":[136],"system":[137],"ranged":[138,155],"12%":[140],"90%,":[142],"an":[144,150,161],"average":[145,162],"59%,":[147],"when":[148,165],"encountering":[149],"increase":[151],"requests.":[153],"It":[154],"78%":[157],"49%,":[159],"63%,":[164],"receiving":[166],"variable":[168],"number":[169],"total":[171],"permissions":[172],"each":[174],"application.":[175],"DMoiSDN":[176],"expected":[178],"show":[180],"perceptible":[182],"but":[183],"reasonable":[184],"and,":[186],"some":[188],"extent,":[189],"be":[190],"able":[191],"avoid":[193],"critical":[195],"impact":[196],"on":[197],"performance.":[198]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
