{"id":"https://openalex.org/W2804817434","doi":"https://doi.org/10.1109/comst.2018.2839348","title":"Comparative Analysis of Control Plane Security of SDN and Conventional Networks","display_name":"Comparative Analysis of Control Plane Security of SDN and Conventional Networks","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2804817434","doi":"https://doi.org/10.1109/comst.2018.2839348","mag":"2804817434"},"language":"en","primary_location":{"id":"doi:10.1109/comst.2018.2839348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comst.2018.2839348","pdf_url":null,"source":{"id":"https://openalex.org/S23688054","display_name":"IEEE Communications Surveys & Tutorials","issn_l":"1553-877X","issn":["1553-877X","2373-745X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Surveys &amp; Tutorials","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5012118535","display_name":"AbdelRahman Abdou","orcid":"https://orcid.org/0000-0002-2783-107X"},"institutions":[{"id":"https://openalex.org/I35440088","display_name":"ETH Zurich","ror":"https://ror.org/05a28rw58","country_code":"CH","type":"education","lineage":["https://openalex.org/I2799323385","https://openalex.org/I35440088"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"AbdelRahman Abdou","raw_affiliation_strings":["Institute of Information Security, ETH Zurich, Z\u00fcrich, Switzerland"],"affiliations":[{"raw_affiliation_string":"Institute of Information Security, ETH Zurich, Z\u00fcrich, Switzerland","institution_ids":["https://openalex.org/I35440088"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Paul C. van Oorschot","raw_affiliation_strings":["School of Computer Science, Carleton University, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Carleton University, Ottawa, ON, Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041005536","display_name":"Tao Wan","orcid":"https://orcid.org/0000-0002-2962-4066"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tao Wan","raw_affiliation_strings":["Cyber Security and Privacy Protection Laboratory, Huawei Canada, Ottawa, ON, Canada"],"affiliations":[{"raw_affiliation_string":"Cyber Security and Privacy Protection Laboratory, Huawei Canada, Ottawa, ON, Canada","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5012118535"],"corresponding_institution_ids":["https://openalex.org/I35440088"],"apc_list":null,"apc_paid":null,"fwci":6.6334,"has_fulltext":false,"cited_by_count":104,"citation_normalized_percentile":{"value":0.97015519,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"20","issue":"4","first_page":"3542","last_page":"3559"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9763000011444092,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/routing-control-plane","display_name":"Routing control plane","score":0.7508085370063782},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7188593149185181},{"id":"https://openalex.org/keywords/redundancy","display_name":"Redundancy (engineering)","score":0.6611263751983643},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5706327557563782},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.556269645690918},{"id":"https://openalex.org/keywords/security-analysis","display_name":"Security analysis","score":0.5519296526908875},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5184937715530396},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.5073997378349304},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5053775906562805},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44235724210739136},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.4146220088005066},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3829931914806366},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.2633593678474426},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.10334619879722595},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08554714918136597}],"concepts":[{"id":"https://openalex.org/C145595949","wikidata":"https://www.wikidata.org/wiki/Q7371619","display_name":"Routing control plane","level":2,"score":0.7508085370063782},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7188593149185181},{"id":"https://openalex.org/C152124472","wikidata":"https://www.wikidata.org/wiki/Q1204361","display_name":"Redundancy (engineering)","level":2,"score":0.6611263751983643},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5706327557563782},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.556269645690918},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.5519296526908875},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5184937715530396},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.5073997378349304},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5053775906562805},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44235724210739136},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.4146220088005066},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3829931914806366},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.2633593678474426},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.10334619879722595},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08554714918136597},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/comst.2018.2839348","is_oa":false,"landing_page_url":"https://doi.org/10.1109/comst.2018.2839348","pdf_url":null,"source":{"id":"https://openalex.org/S23688054","display_name":"IEEE Communications Surveys & Tutorials","issn_l":"1553-877X","issn":["1553-877X","2373-745X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Communications Surveys &amp; Tutorials","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":104,"referenced_works":["https://openalex.org/W49496018","https://openalex.org/W80075259","https://openalex.org/W106863888","https://openalex.org/W158224344","https://openalex.org/W192446467","https://openalex.org/W331141525","https://openalex.org/W627952783","https://openalex.org/W806409524","https://openalex.org/W1525194688","https://openalex.org/W1531996150","https://openalex.org/W1540047495","https://openalex.org/W1558403803","https://openalex.org/W1562069137","https://openalex.org/W1562877645","https://openalex.org/W1573161722","https://openalex.org/W1574861039","https://openalex.org/W1583113493","https://openalex.org/W1728701145","https://openalex.org/W1807098818","https://openalex.org/W1829787244","https://openalex.org/W1972121713","https://openalex.org/W1974486805","https://openalex.org/W1979041837","https://openalex.org/W1984451560","https://openalex.org/W1988774297","https://openalex.org/W1995995106","https://openalex.org/W2016334899","https://openalex.org/W2019419295","https://openalex.org/W2020729428","https://openalex.org/W2022758041","https://openalex.org/W2023662470","https://openalex.org/W2023665096","https://openalex.org/W2024046562","https://openalex.org/W2026356331","https://openalex.org/W2029826771","https://openalex.org/W2041008854","https://openalex.org/W2041849649","https://openalex.org/W2050316053","https://openalex.org/W2062596448","https://openalex.org/W2063955498","https://openalex.org/W2064266822","https://openalex.org/W2067551786","https://openalex.org/W2074616737","https://openalex.org/W2084915558","https://openalex.org/W2085521482","https://openalex.org/W2087946700","https://openalex.org/W2087968523","https://openalex.org/W2091144151","https://openalex.org/W2106178546","https://openalex.org/W2110722699","https://openalex.org/W2112700013","https://openalex.org/W2122109510","https://openalex.org/W2122695394","https://openalex.org/W2127659081","https://openalex.org/W2135920560","https://openalex.org/W2136835942","https://openalex.org/W2137845741","https://openalex.org/W2139659182","https://openalex.org/W2151222380","https://openalex.org/W2155624544","https://openalex.org/W2156580773","https://openalex.org/W2157921329","https://openalex.org/W2163375756","https://openalex.org/W2163593754","https://openalex.org/W2169246522","https://openalex.org/W2169267327","https://openalex.org/W2205839285","https://openalex.org/W2238509171","https://openalex.org/W2248064281","https://openalex.org/W2269236626","https://openalex.org/W2275015310","https://openalex.org/W2287823815","https://openalex.org/W2288225587","https://openalex.org/W2298376471","https://openalex.org/W2341655714","https://openalex.org/W2463012949","https://openalex.org/W2507633571","https://openalex.org/W2514059207","https://openalex.org/W2519428799","https://openalex.org/W2536380892","https://openalex.org/W2579118500","https://openalex.org/W2599515429","https://openalex.org/W2798915702","https://openalex.org/W2963026732","https://openalex.org/W2963099222","https://openalex.org/W2976487595","https://openalex.org/W3103243695","https://openalex.org/W3163285887","https://openalex.org/W4233458882","https://openalex.org/W4242408223","https://openalex.org/W4247255165","https://openalex.org/W4256238195","https://openalex.org/W6601982808","https://openalex.org/W6603262759","https://openalex.org/W6606536520","https://openalex.org/W6607881844","https://openalex.org/W6633188731","https://openalex.org/W6638564739","https://openalex.org/W6638835209","https://openalex.org/W6646334227","https://openalex.org/W6682894363","https://openalex.org/W6682904396","https://openalex.org/W6684118736","https://openalex.org/W6750886310"],"related_works":["https://openalex.org/W4214777079","https://openalex.org/W3093659890","https://openalex.org/W4211055425","https://openalex.org/W4379114325","https://openalex.org/W4243609393","https://openalex.org/W2756952589","https://openalex.org/W3042077637","https://openalex.org/W2515119600","https://openalex.org/W1799150848","https://openalex.org/W3033868034"],"abstract_inverted_index":{"Software":[0],"defined":[1],"networking":[2],"implements":[3],"the":[4,49,53,85,101,120,128,151],"network":[5,35,68,117,122],"control":[6,30,55,86,112,145,178],"plane":[7,56,113,179],"in":[8,14,19,52,111,154],"an":[9],"external":[10],"entity,":[11],"rather":[12],"than":[13],"each":[15],"individual":[16],"device":[17],"as":[18],"conventional":[20,91,155,196],"networks.":[21,74,156,197],"This":[22,75],"architectural":[23,102],"difference":[24],"implies":[25],"a":[26,59,163],"different":[27],"design":[28],"for":[29,33,61,176,189],"functions":[31],"necessary":[32],"essential":[34,67],"properties,":[36],"e.g.,":[37],"loop":[38],"prevention":[39],"and":[40,57,90,93,98,124,171,195],"link":[41],"redundancy.":[42],"We":[43],"explore":[44],"how":[45,79],"such":[46],"differences":[47],"redefine":[48],"security":[50,96,114,159,191],"weaknesses":[51],"SDN":[54,89,135,165,177,194],"provide":[58,119],"framework":[60],"comparative":[62],"analysis":[63,77,160,182,192],"which":[64],"focuses":[65],"on":[66,138],"properties":[69,81,123],"required":[70],"by":[71,84],"typical":[72],"production":[73],"enables":[76],"of":[78,88,186,193],"these":[80],"are":[82,125],"delivered":[83],"planes":[87],"networks,":[92],"to":[94,142],"compare":[95],"threats":[97],"mitigations.":[99],"Despite":[100],"difference,":[103],"we":[104],"find":[105],"similar,":[106],"but":[107],"not":[108],"identical,":[109],"exposures":[110],"if":[115],"both":[116],"paradigms":[118],"same":[121,129],"analyzed":[126],"under":[127],"threat":[130],"model.":[131],"However,":[132],"defenses":[133],"vary;":[134],"cannot":[136],"depend":[137],"edge":[139],"based":[140],"filtering":[141],"protect":[143],"its":[144],"plane,":[146],"while":[147],"this":[148],"is":[149,174],"arguably":[150],"primary":[152],"defense":[153],"Our":[157,181],"concrete":[158],"suggests":[161],"that":[162,167],"distributed":[164],"architecture":[166],"supports":[168],"fault":[169],"tolerance":[170],"consistency":[172],"checks":[173],"important":[175],"security.":[180],"methodology":[183],"may":[184],"be":[185],"independent":[187],"interest":[188],"future":[190]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":15},{"year":2023,"cited_by_count":23},{"year":2022,"cited_by_count":17},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":15},{"year":2019,"cited_by_count":8}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
