{"id":"https://openalex.org/W2277776897","doi":"https://doi.org/10.1109/ccst.2015.7389675","title":"An event-based SDN architecture for network security analysis","display_name":"An event-based SDN architecture for network security analysis","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2277776897","doi":"https://doi.org/10.1109/ccst.2015.7389675","mag":"2277776897"},"language":"en","primary_location":{"id":"doi:10.1109/ccst.2015.7389675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccst.2015.7389675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Carnahan Conference on Security Technology (ICCST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5084330488","display_name":"Po\u2010Ching Lin","orcid":"https://orcid.org/0000-0001-8294-5857"},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Po-Ching Lin","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Nation Chung Cheng University, Chiayi, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Nation Chung Cheng University, Chiayi, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024566944","display_name":"Jyun-Chen Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Jyun-Chen Liu","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Nation Chung Cheng University, Chiayi, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Nation Chung Cheng University, Chiayi, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076467713","display_name":"Pin-Ren Chiou","orcid":null},"institutions":[{"id":"https://openalex.org/I148099254","display_name":"National Chung Cheng University","ror":"https://ror.org/0028v3876","country_code":"TW","type":"education","lineage":["https://openalex.org/I148099254"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Pin-Ren Chiou","raw_affiliation_strings":["Department of Computer Science and Information Engineering, Nation Chung Cheng University, Chiayi, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Information Engineering, Nation Chung Cheng University, Chiayi, Taiwan","institution_ids":["https://openalex.org/I148099254"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5084330488"],"corresponding_institution_ids":["https://openalex.org/I148099254"],"apc_list":null,"apc_paid":null,"fwci":0.3328,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67605102,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"159","last_page":"164"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7658951282501221},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6012643575668335},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6007699370384216},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5518697500228882},{"id":"https://openalex.org/keywords/event","display_name":"Event (particle physics)","score":0.524360179901123},{"id":"https://openalex.org/keywords/packet-processing","display_name":"Packet processing","score":0.5056138038635254},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5010888576507568},{"id":"https://openalex.org/keywords/complex-event-processing","display_name":"Complex event processing","score":0.46988964080810547},{"id":"https://openalex.org/keywords/network-processor","display_name":"Network processor","score":0.4406862258911133},{"id":"https://openalex.org/keywords/network-architecture","display_name":"Network architecture","score":0.4176671504974365},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.35580769181251526},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3314518928527832},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13976207375526428}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7658951282501221},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6012643575668335},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6007699370384216},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5518697500228882},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.524360179901123},{"id":"https://openalex.org/C2779581428","wikidata":"https://www.wikidata.org/wiki/Q7122997","display_name":"Packet processing","level":3,"score":0.5056138038635254},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5010888576507568},{"id":"https://openalex.org/C123606473","wikidata":"https://www.wikidata.org/wiki/Q907918","display_name":"Complex event processing","level":3,"score":0.46988964080810547},{"id":"https://openalex.org/C74366991","wikidata":"https://www.wikidata.org/wiki/Q2755335","display_name":"Network processor","level":3,"score":0.4406862258911133},{"id":"https://openalex.org/C193415008","wikidata":"https://www.wikidata.org/wiki/Q639681","display_name":"Network architecture","level":2,"score":0.4176671504974365},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.35580769181251526},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3314518928527832},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13976207375526428},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ccst.2015.7389675","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ccst.2015.7389675","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 International Carnahan Conference on Security Technology (ICCST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals","score":0.4000000059604645}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1516506771","https://openalex.org/W1583113493","https://openalex.org/W1851843436","https://openalex.org/W2036860943","https://openalex.org/W2146100293","https://openalex.org/W2155624544","https://openalex.org/W2163375756","https://openalex.org/W2395731689","https://openalex.org/W6682894363","https://openalex.org/W6711893318"],"related_works":["https://openalex.org/W1606574587","https://openalex.org/W1556003661","https://openalex.org/W1233822343","https://openalex.org/W2097595905","https://openalex.org/W4235315652","https://openalex.org/W1993620881","https://openalex.org/W2097731574","https://openalex.org/W2026724920","https://openalex.org/W2145023239","https://openalex.org/W2520402256"],"abstract_inverted_index":{"Software-defined":[0],"networking":[1],"(SDN),":[2],"which":[3],"decouples":[4],"the":[5,23,27,33,52,59,88,122,129,132,140,143,148,171,186,190,194],"control":[6],"plane":[7],"from":[8,100,159,179],"traditionally":[9],"proprietary":[10],"network":[11,30,77,89,101,104,191],"devices,":[12],"is":[13,157],"highly":[14],"flexible":[15],"and":[16,44,54,138,193],"suitable":[17],"for":[18,76,121,176],"flow":[19],"management.":[20],"However,":[21],"if":[22],"policy":[24,97,119,133,141],"depends":[25],"on":[26,87],"results":[28,184],"of":[29],"security":[31,78],"analysis,":[32],"controller":[34,60,130,149,195],"will":[35,49,61,127],"perform":[36],"complicated":[37],"packet":[38,42,161],"processing":[39,48],"such":[40],"as":[41],"reassembly":[43],"protocol":[45,93],"analysis.":[46,79],"Such":[47],"easily":[50],"overburden":[51],"controller,":[53],"passing":[55],"raw":[56],"packets":[57],"to":[58,95,115,135],"result":[62],"in":[63,111,142],"large":[64],"communications":[65],"overheads.":[66],"In":[67],"this":[68,136,165],"work,":[69],"we":[70],"propose":[71],"an":[72,84,108,112],"event-based":[73],"SDN":[74],"architecture":[75,81,166],"This":[80],"comes":[82],"with":[83,151,170],"event":[85,110,113,137,144,154,177],"extractor":[86],"device":[90,105],"that":[91],"performs":[92],"analysis":[94],"extract":[96],"neutral":[98],"events":[99],"traffic.":[102,181],"The":[103,182],"looks":[106],"up":[107],"extracted":[109],"table":[114,145],"see":[116],"whether":[117],"a":[118],"exists":[120],"event.":[123],"If":[124],"not,":[125],"it":[126,156,169],"ask":[128],"about":[131],"corresponding":[134],"configure":[139],"accordingly.":[146],"Since":[147],"deals":[150],"only":[152],"high-level":[153],"descriptions,":[155],"free":[158],"low-level":[160],"processing.":[162],"We":[163],"evaluate":[164],"by":[167],"emulating":[168],"Bro":[172],"intrusion":[173],"detection":[174],"system":[175],"extraction":[178],"real":[180],"experimental":[183],"show":[185],"communication":[187],"overheads":[188],"between":[189],"devices":[192],"can":[196],"be":[197],"effectively":[198],"reduced.":[199]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
