{"id":"https://openalex.org/W2896646319","doi":"https://doi.org/10.1109/icccn.2018.8487339","title":"Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network","display_name":"Enhanced Attack Aware Security Provisioning Scheme in SDN/NFV Enabled over 5G Network","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2896646319","doi":"https://doi.org/10.1109/icccn.2018.8487339","mag":"2896646319"},"language":"en","primary_location":{"id":"doi:10.1109/icccn.2018.8487339","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2018.8487339","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081594946","display_name":"Ihsan H. Abdulqadder","orcid":"https://orcid.org/0000-0003-0727-0487"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ihsan H. Abdulqadder","raw_affiliation_strings":["Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075776596","display_name":"Israa T. Aziz","orcid":"https://orcid.org/0000-0003-3629-0444"},"institutions":[{"id":"https://openalex.org/I12150220","display_name":"University of Mosul","ror":"https://ror.org/039cf4q47","country_code":"IQ","type":"education","lineage":["https://openalex.org/I12150220"]}],"countries":["IQ"],"is_corresponding":false,"raw_author_name":"Israa T. Aziz","raw_affiliation_strings":["University of Mosul, Mosul, Iraq"],"affiliations":[{"raw_affiliation_string":"University of Mosul, Mosul, Iraq","institution_ids":["https://openalex.org/I12150220"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076311357","display_name":"Bin Yuan","orcid":"https://orcid.org/0000-0002-5365-904X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Yuan","raw_affiliation_strings":["Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Services Computing Technology and System Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5081594946"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":0.7381,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.75091478,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.984499990940094,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8655924201011658},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7285201549530029},{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.6598633527755737},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6531050801277161},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5519447326660156},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.49407699704170227},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.464840829372406}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8655924201011658},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7285201549530029},{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.6598633527755737},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6531050801277161},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5519447326660156},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.49407699704170227},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.464840829372406}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn.2018.8487339","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icccn.2018.8487339","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities","score":0.7699999809265137}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1851843436","https://openalex.org/W2007111180","https://openalex.org/W2017524370","https://openalex.org/W2029090942","https://openalex.org/W2029826771","https://openalex.org/W2128145324","https://openalex.org/W2415078344","https://openalex.org/W2479865017","https://openalex.org/W2505030271","https://openalex.org/W2514791705","https://openalex.org/W2535765820","https://openalex.org/W2578477250","https://openalex.org/W2586120503","https://openalex.org/W2601677968","https://openalex.org/W2604420083","https://openalex.org/W2612460546","https://openalex.org/W2617095022","https://openalex.org/W2626741430","https://openalex.org/W2745452095","https://openalex.org/W2750636390","https://openalex.org/W2755635976","https://openalex.org/W2762598533","https://openalex.org/W2763243425","https://openalex.org/W2766647690","https://openalex.org/W4235166163","https://openalex.org/W6726328498","https://openalex.org/W6816279445"],"related_works":["https://openalex.org/W2017432143","https://openalex.org/W1973694374","https://openalex.org/W2983574358","https://openalex.org/W2370475531","https://openalex.org/W4385924768","https://openalex.org/W4256551238","https://openalex.org/W2610550183","https://openalex.org/W2914112812","https://openalex.org/W2125830297","https://openalex.org/W2125150972"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Network":[2,5,108],"(SDN)":[3],"and":[4,40,74,104,151,204],"Function":[6,109,136],"Virtualization":[7],"(NFV)":[8],"are":[9,100,118,147,154],"essential":[10],"technologies":[11],"that":[12,182],"support":[13],"next":[14],"generation":[15],"5G":[16,21,43],"networks.":[17],"Security":[18],"provisioning":[19,53,186],"in":[20,38,45,102,177,191],"network":[22],"is":[23,55,61,81],"major":[24,36],"issue":[25],"due":[26],"to":[27,156],"involvement":[28],"of":[29,72,193,196],"numerous":[30],"users.":[31],"To":[32,161],"provide":[33],"security":[34,52,60,185],"against":[35],"attacks":[37],"SDN":[39],"NFV":[41],"enabled":[42],"network,":[44],"this":[46,58],"paper":[47],"an":[48,170],"enhanced":[49],"attack":[50],"aware":[51],"scheme":[54,187],"proposed.":[56],"In":[57],"work,":[59],"provided":[62],"by":[63,90],"following":[64],"process:":[65],"(i)":[66],"Initial":[67,79],"Authentication":[68,94],"process,":[69],"(ii)":[70],"Classification":[71],"packets,":[73,198],"(iii)":[75],"Switch":[76],"migration":[77],"process.":[78],"authentication":[80],"performed":[82],"at":[83,106,149],"Access":[84],"Point":[85],"(AP)":[86],"for":[87],"each":[88],"user":[89],"Secure":[91],"ID":[92],"based":[93,126],"(SIA)":[95],"scheme.":[96],"The":[97],"suspected":[98],"packets":[99,146,153],"detected":[101],"controller":[103],"classified":[105],"Virtual":[107],"(VNF).":[110],"For":[111],"packet":[112,116,201,205],"classification,":[113],"the":[114,144],"optimal":[115],"features":[117],"selected":[119],"using":[120],"Genetic":[121],"Algorithm":[122],"with":[123,137],"Correlation":[124],"(GAC)":[125],"feature":[127],"selection":[128],"algorithm.":[129],"We":[130],"have":[131,168],"proposed":[132,184],"a":[133],"Radial":[134],"Basis":[135],"Extreme":[138],"Learning":[139],"Machine":[140],"(RBF-ELM)":[141],"classifier.":[142],"Then,":[143],"malicious":[145],"dropped":[148],"VNF":[150],"normal":[152],"redirected":[155,197],"destination":[157],"address":[158],"through":[159],"controller.":[160,178],"mitigate":[162],"flow":[163],"table":[164],"overloading":[165],"attack,":[166],"we":[167],"presented":[169],"Enhanced":[171],"Artificial":[172],"Bee":[173],"Colony":[174],"(EABC)":[175],"algorithm":[176],"Experimental":[179],"result":[180],"shows":[181,188],"our":[183],"better":[189],"performance":[190],"terms":[192],"delay,":[194],"amount":[195],"detection":[199],"accuracy,":[200],"transmission":[202],"rate":[203],"loss":[206],"ratio.":[207]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
