{"id":"https://openalex.org/W4412536381","doi":"https://doi.org/10.1007/s10207-025-01035-x","title":"A formal technique for automatic resolution of OpenFlow anomalies","display_name":"A formal technique for automatic resolution of OpenFlow anomalies","publication_year":2025,"publication_date":"2025-07-21","ids":{"openalex":"https://openalex.org/W4412536381","doi":"https://doi.org/10.1007/s10207-025-01035-x"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-025-01035-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01035-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01035-x.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01035-x.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011027066","display_name":"Ramtin Aryan","orcid":"https://orcid.org/0000-0002-9392-6704"},"institutions":[{"id":"https://openalex.org/I184531372","display_name":"OsloMet \u2013 Oslo Metropolitan University","ror":"https://ror.org/04q12yn84","country_code":"NO","type":"education","lineage":["https://openalex.org/I184531372"]},{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Ramtin Aryan","raw_affiliation_strings":["Department of Computer Science, OsloMet - Oslo Metropolitan University, Oslo, Norway","Department of Technology Systems, University of Oslo, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, OsloMet - Oslo Metropolitan University, Oslo, Norway","institution_ids":["https://openalex.org/I184531372"]},{"raw_affiliation_string":"Department of Technology Systems, University of Oslo, Oslo, Norway","institution_ids":["https://openalex.org/I184942183"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032770006","display_name":"Anis Yazidi","orcid":"https://orcid.org/0000-0001-7591-1659"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Anis Yazidi","raw_affiliation_strings":["Department of Computer Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Norwegian University of Science and Technology (NTNU), Trondheim, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Information Technology Department, Arabian Gulf University, Manama, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Information Technology Department, Arabian Gulf University, Manama, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5090446312","display_name":"Paal Engelstad","orcid":"https://orcid.org/0009-0000-8371-927X"},"institutions":[{"id":"https://openalex.org/I184942183","display_name":"University of Oslo","ror":"https://ror.org/01xtthb56","country_code":"NO","type":"education","lineage":["https://openalex.org/I184942183"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Paal E. Engelstad","raw_affiliation_strings":["Department of Technology Systems, University of Oslo, Oslo, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Technology Systems, University of Oslo, Oslo, Norway","institution_ids":["https://openalex.org/I184942183"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5011027066"],"corresponding_institution_ids":["https://openalex.org/I184531372","https://openalex.org/I184942183"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.2051007,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"24","issue":"4","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9944000244140625,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9914000034332275,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.829197108745575},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7679202556610107},{"id":"https://openalex.org/keywords/resolution","display_name":"Resolution (logic)","score":0.5360880494117737},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4592267572879791},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.34069639444351196},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2795614004135132},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.2361905872821808},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.22442758083343506},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.13690483570098877}],"concepts":[{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.829197108745575},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7679202556610107},{"id":"https://openalex.org/C138268822","wikidata":"https://www.wikidata.org/wiki/Q1051925","display_name":"Resolution (logic)","level":2,"score":0.5360880494117737},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4592267572879791},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.34069639444351196},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2795614004135132},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.2361905872821808},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22442758083343506},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.13690483570098877}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10207-025-01035-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01035-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01035-x.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1007/s10207-025-01035-x","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-025-01035-x","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-025-01035-x.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320323260","display_name":"Universitetet i Oslo","ror":"https://ror.org/01xtthb56"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412536381.pdf","grobid_xml":"https://content.openalex.org/works/W4412536381.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1894272157","https://openalex.org/W1903979221","https://openalex.org/W1998822780","https://openalex.org/W2564631230","https://openalex.org/W2755239810","https://openalex.org/W2766633651","https://openalex.org/W2767665895","https://openalex.org/W2771021476","https://openalex.org/W2912257171","https://openalex.org/W2968168257","https://openalex.org/W3005038143","https://openalex.org/W3013300152","https://openalex.org/W3101248335","https://openalex.org/W3109296341","https://openalex.org/W3123704385","https://openalex.org/W4220951579","https://openalex.org/W4224089584","https://openalex.org/W4226197247","https://openalex.org/W4248605401","https://openalex.org/W4386459429","https://openalex.org/W4389077620","https://openalex.org/W4403677750","https://openalex.org/W6600062641"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W1917481011","https://openalex.org/W2324336707","https://openalex.org/W4245784313","https://openalex.org/W2421190342","https://openalex.org/W2315410840","https://openalex.org/W2767377969","https://openalex.org/W1667807958"],"abstract_inverted_index":{"Abstract":[0],"Conflicts":[1],"between":[2],"network":[3,17,24,70,120],"policies":[4,50],"are":[5],"frequent":[6],"in":[7,83,90,137],"today\u2019s":[8],"computer":[9],"networks":[10],"due":[11],"to":[12,51,86],"the":[13,40,69,104,138],"increasing":[14],"complexity":[15],"of":[16,43,77,108,140],"configuration.":[18],"Resolving":[19],"policy":[20,56],"anomalies":[21,82,89],"usually":[22],"requires":[23],"administrator":[25],"intervention,":[26],"which":[27],"is":[28,60,74,94,144],"a":[29,75],"time-intensive":[30],"and":[31,63,106,129],"error-prone":[32],"process.":[33],"This":[34],"paper":[35],"presents":[36],"inference":[37,110],"systems":[38],"for":[39],"automatic":[41,92],"resolution":[42],"OpenFlow":[44],"anomalies.":[45],"The":[46,127],"approach":[47,59],"uses":[48],"high-level":[49],"detect":[52],"conflict":[53],"correction":[54,130],"without":[55],"violations.":[57],"Our":[58],"fully":[61],"automated":[62],"does":[64],"not":[65,98],"require":[66],"interaction":[67],"with":[68],"administrator.":[71],"Although":[72],"there":[73],"multitude":[76],"research":[78,85],"papers":[79],"on":[80,118],"detecting":[81],"SDN,":[84],"correct":[87],"those":[88],"an":[91],"manner":[93],"very":[95,133],"scarce,":[96],"if":[97],"non-existent.":[99],"We":[100],"have":[101],"formally":[102],"proven":[103],"soundness":[105],"completeness":[107],"our":[109],"systems.":[111],"Furthermore,":[112],"we":[113],"provide":[114],"experimental":[115],"results":[116],"based":[117],"real-life":[119],"configurations":[121],"involving":[122],"more":[123],"than":[124],"1200":[125],"rules.":[126],"detection":[128],"processes":[131],"exhibit":[132],"low":[134],"computation":[135],"overhead,":[136],"order":[139],"milliseconds,":[141],"when":[142],"parallelization":[143],"used.":[145]},"counts_by_year":[],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
