{"id":"https://openalex.org/W3188155687","doi":"https://doi.org/10.1109/icc42927.2021.9500763","title":"A Security-Constrained Reinforcement Learning Framework for Software Defined Networks","display_name":"A Security-Constrained Reinforcement Learning Framework for Software Defined Networks","publication_year":2021,"publication_date":"2021-06-01","ids":{"openalex":"https://openalex.org/W3188155687","doi":"https://doi.org/10.1109/icc42927.2021.9500763","mag":"3188155687"},"language":"en","primary_location":{"id":"doi:10.1109/icc42927.2021.9500763","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://repositori.upf.edu/bitstreams/905380f1-81c6-4806-82ec-4510fc168bad/download","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5055895734","display_name":"Anand Mudgerikar","orcid":"https://orcid.org/0000-0002-7148-0000"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Anand Mudgerikar","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061694501","display_name":"Elisa Bertino","orcid":"https://orcid.org/0000-0002-4029-7051"},"institutions":[{"id":"https://openalex.org/I219193219","display_name":"Purdue University West Lafayette","ror":"https://ror.org/02dqehb95","country_code":"US","type":"education","lineage":["https://openalex.org/I219193219"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Elisa Bertino","raw_affiliation_strings":["Purdue University, West Lafayette, IN, USA"],"affiliations":[{"raw_affiliation_string":"Purdue University, West Lafayette, IN, USA","institution_ids":["https://openalex.org/I219193219"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105652031","display_name":"Jorge Lobo","orcid":"https://orcid.org/0000-0002-9438-0926"},"institutions":[{"id":"https://openalex.org/I11932220","display_name":"Instituci\u00f3 Catalana de Recerca i Estudis Avan\u00e7ats","ror":"https://ror.org/0371hy230","country_code":"ES","type":"nonprofit","lineage":["https://openalex.org/I11932220"]},{"id":"https://openalex.org/I170486558","display_name":"Pompeu Fabra University","ror":"https://ror.org/04n0g0b29","country_code":"ES","type":"education","lineage":["https://openalex.org/I170486558"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Jorge Lobo","raw_affiliation_strings":["ICREA - Universitat, Pompeo Fabra, Spain"],"affiliations":[{"raw_affiliation_string":"ICREA - Universitat, Pompeo Fabra, Spain","institution_ids":["https://openalex.org/I170486558","https://openalex.org/I11932220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077318302","display_name":"Dinesh Verma","orcid":"https://orcid.org/0000-0003-1933-7343"},"institutions":[{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dinesh Verma","raw_affiliation_strings":["IBM TJ Watson Research Center, NY, USA"],"affiliations":[{"raw_affiliation_string":"IBM TJ Watson Research Center, NY, USA","institution_ids":["https://openalex.org/I1341412227"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5055895734"],"corresponding_institution_ids":["https://openalex.org/I219193219"],"apc_list":null,"apc_paid":null,"fwci":1.1131,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.79180845,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.996399998664856,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/reinforcement-learning","display_name":"Reinforcement learning","score":0.8134603500366211},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7747650146484375},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5357797145843506},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5034899115562439},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.44569164514541626},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.34018373489379883},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.33268675208091736},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3235635757446289},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2638666033744812},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.25892871618270874},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.15720292925834656},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.08193439245223999}],"concepts":[{"id":"https://openalex.org/C97541855","wikidata":"https://www.wikidata.org/wiki/Q830687","display_name":"Reinforcement learning","level":2,"score":0.8134603500366211},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7747650146484375},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5357797145843506},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5034899115562439},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.44569164514541626},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.34018373489379883},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.33268675208091736},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3235635757446289},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2638666033744812},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.25892871618270874},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.15720292925834656},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.08193439245223999}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icc42927.2021.9500763","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc42927.2021.9500763","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2021 - IEEE International Conference on Communications","raw_type":"proceedings-article"},{"id":"pmh:oai:repositori.upf.edu:10230/56419","is_oa":true,"landing_page_url":"http://hdl.handle.net/10230/56419","pdf_url":"https://repositori.upf.edu/bitstreams/905380f1-81c6-4806-82ec-4510fc168bad/download","source":{"id":"https://openalex.org/S4306402615","display_name":"Repositori digital de la UPF (Universitat Pompeu Fabra)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I170486558","host_organization_name":"Universitat Pompeu Fabra","host_organization_lineage":["https://openalex.org/I170486558"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":{"id":"pmh:oai:repositori.upf.edu:10230/56419","is_oa":true,"landing_page_url":"http://hdl.handle.net/10230/56419","pdf_url":"https://repositori.upf.edu/bitstreams/905380f1-81c6-4806-82ec-4510fc168bad/download","source":{"id":"https://openalex.org/S4306402615","display_name":"Repositori digital de la UPF (Universitat Pompeu Fabra)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I170486558","host_organization_name":"Universitat Pompeu Fabra","host_organization_lineage":["https://openalex.org/I170486558"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320316514","display_name":"Arm","ror":"https://ror.org/04mmhzs81"}],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3188155687.pdf"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W41554520","https://openalex.org/W1845972764","https://openalex.org/W1994926493","https://openalex.org/W2084175160","https://openalex.org/W2099940443","https://openalex.org/W2121863487","https://openalex.org/W2136451165","https://openalex.org/W2147118406","https://openalex.org/W2560178266","https://openalex.org/W2564147261","https://openalex.org/W2753055686","https://openalex.org/W2758296822","https://openalex.org/W2789828921","https://openalex.org/W2902608779","https://openalex.org/W2903158431","https://openalex.org/W3021959079","https://openalex.org/W3035644784","https://openalex.org/W3132256577","https://openalex.org/W6744749404","https://openalex.org/W6756615331","https://openalex.org/W6771598146","https://openalex.org/W6780559895","https://openalex.org/W6790985779"],"related_works":["https://openalex.org/W4306904969","https://openalex.org/W2138720691","https://openalex.org/W4362501864","https://openalex.org/W4380318855","https://openalex.org/W3084456289","https://openalex.org/W2024136090","https://openalex.org/W4391331176","https://openalex.org/W2031695474","https://openalex.org/W2586732548","https://openalex.org/W2964765435"],"abstract_inverted_index":{"Reinforcement":[0],"Learning":[1],"(RL)":[2],"is":[3],"an":[4],"effective":[5],"technique":[6],"for":[7,129,200,208],"building":[8],"\u2018smart\u2019":[9],"SDN":[10,210],"controllers":[11],"because":[12,100],"of":[13,80,109,143,150,161,215,224],"its":[14],"model-free":[15],"nature":[16],"and":[17,37,113,118,195],"ability":[18],"to":[19,34,105,219],"learn":[20],"policies":[21,99,128],"online":[22],"without":[23,41],"requiring":[24],"extensive":[25],"training":[26],"data.":[27],"However,":[28],"as":[29,98],"RL":[30,54,67,111,163],"agents":[31],"are":[32,134,154,169],"geared":[33],"maximize":[35,73],"functionality":[36,74],"explore":[38],"the":[39,66,78,106,110,126,141,158,162,213,222,225],"environment":[40],"constraints,":[42],"security":[43,61,127],"can":[44],"be":[45,96],"breached.":[46],"In":[47,64],"this":[48],"paper,":[49],"we":[50],"propose":[51],"Jarvis-SDN,":[52,65],"a":[53,137,209],"framework":[55,112,207],"that":[56,153,178],"constrains":[57],"explorations":[58,131],"by":[59],"taking":[60],"into":[62],"account.":[63],"agent":[68],"learns":[69],"\u2018intelligent":[70],"policies\u2019":[71],"which":[72],"but":[75],"not":[76,103],"at":[77],"cost":[79],"security.":[81],"Standard":[82],"network":[83,202],"flow":[84],"based":[85,164,180],"attack":[86,145,181,226],"sig-natures":[87],"obtained":[88],"from":[89,147],"intrusion":[90],"detection":[91],"system":[92],"(IDS)":[93],"datasets":[94,152],"cannot":[95],"used":[97],"they":[101],"do":[102],"conform":[104],"state":[107],"model":[108],"thus":[114],"have":[115],"poor":[116],"accuracy":[117],"high":[119],"false":[120],"positives.":[121],"To":[122],"address":[123],"such":[124],"issue,":[125],"constraining":[130],"in":[132,136,140,157],"Jarvis-SDN":[133],"learnt":[135,170],"semi-supervised":[138],"manner":[139],"form":[142],"\u2018partial":[144],"signatures\u2019":[146],"packet":[148],"captures":[149],"IDS":[151],"then":[155],"encoded":[156],"objective":[159],"function":[160],"optimization":[165],"framework.":[166],"These":[167],"signatures":[168,182],"using":[171],"Deep":[172],"Q-Networks":[173],"(DQN).":[174],"Our":[175],"analysis":[176],"shows":[177],"DQN":[179],"perform":[183],"better":[184],"than":[185],"classical":[186],"machine":[187],"learning":[188],"techniques,":[189],"like":[190],"decision":[191],"trees,":[192],"random":[193],"forests":[194],"deep":[196],"neural":[197],"networks":[198],"(DNN),":[199],"common":[201],"attacks.":[203],"We":[204],"instantiate":[205],"our":[206],"controller":[211],"with":[212],"goal":[214],"intelligent":[216],"rate":[217],"control":[218],"further":[220],"analyze":[221],"effectiveness":[223],"signatures.":[227]},"counts_by_year":[{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2021,"cited_by_count":1}],"updated_date":"2026-03-17T17:19:04.345684","created_date":"2025-10-10T00:00:00"}
