{"id":"https://openalex.org/W1930856805","doi":"https://doi.org/10.1109/iccw.2015.7247453","title":"SDSecurity: A Software Defined Security experimental framework","display_name":"SDSecurity: A Software Defined Security experimental framework","publication_year":2015,"publication_date":"2015-06-01","ids":{"openalex":"https://openalex.org/W1930856805","doi":"https://doi.org/10.1109/iccw.2015.7247453","mag":"1930856805"},"language":"en","primary_location":{"id":"doi:10.1109/iccw.2015.7247453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2015.7247453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communication Workshop (ICCW)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009435268","display_name":"Ala\u2019 Darabseh","orcid":"https://orcid.org/0000-0002-7904-9995"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Ala' Darabseh","raw_affiliation_strings":["Jordan University of Science and Technology, Irbid, Jordan","Jordan University of Science and Technology Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Jordan University of Science and Technology Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073474306","display_name":"Mahmoud Al\u2010Ayyoub","orcid":"https://orcid.org/0000-0001-9372-9076"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Mahmoud Al-Ayyoub","raw_affiliation_strings":["Jordan University of Science and Technology, Irbid, Jordan","Jordan University of Science and Technology Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Jordan University of Science and Technology Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032187551","display_name":"Yaser Jararweh","orcid":"https://orcid.org/0000-0002-4403-3846"},"institutions":[{"id":"https://openalex.org/I156983542","display_name":"Jordan University of Science and Technology","ror":"https://ror.org/03y8mtb59","country_code":"JO","type":"education","lineage":["https://openalex.org/I156983542"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Yaser Jararweh","raw_affiliation_strings":["Jordan University of Science and Technology, Irbid, Jordan","Jordan University of Science and Technology Irbid, Jordan"],"affiliations":[{"raw_affiliation_string":"Jordan University of Science and Technology, Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]},{"raw_affiliation_string":"Jordan University of Science and Technology Irbid, Jordan","institution_ids":["https://openalex.org/I156983542"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069108646","display_name":"Elhadj Benkhelifa","orcid":"https://orcid.org/0000-0001-6168-2664"},"institutions":[{"id":"https://openalex.org/I198012923","display_name":"University of Staffordshire","ror":"https://ror.org/00d6k8y35","country_code":"GB","type":"education","lineage":["https://openalex.org/I198012923"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Elhadj Benkhelifa","raw_affiliation_strings":["Mobile Fusion Applied Research Centre, Staffordshire University, Stafford, UK","Mobile Fusion Appl. Res. Centre, Staffordshire Univ., Stafford, UK"],"affiliations":[{"raw_affiliation_string":"Mobile Fusion Applied Research Centre, Staffordshire University, Stafford, UK","institution_ids":["https://openalex.org/I198012923"]},{"raw_affiliation_string":"Mobile Fusion Appl. Res. Centre, Staffordshire Univ., Stafford, UK","institution_ids":["https://openalex.org/I198012923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108545096","display_name":"Mladen A. Vouk","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mladen Vouk","raw_affiliation_strings":["North Carolina State University, Raleigh, North Carolina, USA","North Carolina State University Raleigh,USA"],"affiliations":[{"raw_affiliation_string":"North Carolina State University, Raleigh, North Carolina, USA","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University Raleigh,USA","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110646764","display_name":"Andy Rindos","orcid":null},"institutions":[{"id":"https://openalex.org/I1309191912","display_name":"Research Triangle Park Foundation","ror":"https://ror.org/03eqttr49","country_code":"US","type":"nonprofit","lineage":["https://openalex.org/I1309191912"]},{"id":"https://openalex.org/I1341412227","display_name":"IBM (United States)","ror":"https://ror.org/05hh8d621","country_code":"US","type":"company","lineage":["https://openalex.org/I1341412227"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Andy Rindos","raw_affiliation_strings":["IBM Corporation, North Carolina, USA","IBM Corporation Research Triangle Park , North Carolina, USA"],"affiliations":[{"raw_affiliation_string":"IBM Corporation, North Carolina, USA","institution_ids":["https://openalex.org/I1341412227"]},{"raw_affiliation_string":"IBM Corporation Research Triangle Park , North Carolina, USA","institution_ids":["https://openalex.org/I1309191912"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5009435268"],"corresponding_institution_ids":["https://openalex.org/I156983542"],"apc_list":null,"apc_paid":null,"fwci":14.669,"has_fulltext":false,"cited_by_count":71,"citation_normalized_percentile":{"value":0.9889715,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1871","last_page":"1876"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7757861614227295},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7715543508529663},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.589248776435852},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5736091136932373},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5238982439041138},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4913562834262848},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4740733206272125},{"id":"https://openalex.org/keywords/software-framework","display_name":"Software framework","score":0.4420081675052643},{"id":"https://openalex.org/keywords/host","display_name":"Host (biology)","score":0.4268609285354614},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.39809083938598633},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.390701025724411},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3406726121902466},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.2981831431388855},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.2849089503288269},{"id":"https://openalex.org/keywords/component-based-software-engineering","display_name":"Component-based software engineering","score":0.257737934589386},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.23777982592582703},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.15068131685256958},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.0941140353679657}],"concepts":[{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7757861614227295},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7715543508529663},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.589248776435852},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5736091136932373},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5238982439041138},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4913562834262848},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4740733206272125},{"id":"https://openalex.org/C76518257","wikidata":"https://www.wikidata.org/wiki/Q271680","display_name":"Software framework","level":5,"score":0.4420081675052643},{"id":"https://openalex.org/C126831891","wikidata":"https://www.wikidata.org/wiki/Q221673","display_name":"Host (biology)","level":2,"score":0.4268609285354614},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.39809083938598633},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.390701025724411},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3406726121902466},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.2981831431388855},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.2849089503288269},{"id":"https://openalex.org/C174683762","wikidata":"https://www.wikidata.org/wiki/Q609588","display_name":"Component-based software engineering","level":4,"score":0.257737934589386},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.23777982592582703},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.15068131685256958},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0941140353679657},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccw.2015.7247453","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccw.2015.7247453","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Communication Workshop (ICCW)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320336727","display_name":"Deanship of Research, Jordan University of Science and Technology","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W2063272066","https://openalex.org/W2091911908","https://openalex.org/W2111281854","https://openalex.org/W2139592393"],"related_works":["https://openalex.org/W4238897586","https://openalex.org/W435179959","https://openalex.org/W2619091065","https://openalex.org/W2059640416","https://openalex.org/W1490753184","https://openalex.org/W2284465472","https://openalex.org/W2291782699","https://openalex.org/W1993948687","https://openalex.org/W2011676020","https://openalex.org/W2000169967"],"abstract_inverted_index":{"The":[0,28,158,186],"emerging":[1],"Software":[2,69],"Defined":[3,70],"Systems":[4],"(SDSys)":[5],"is":[6,34,148],"a":[7,74,90,98,104],"recent":[8],"paradigm,":[9],"which":[10],"has":[11,62],"been":[12,63],"introduced":[13],"to":[14,65,89,102,131,197],"reduce":[15],"the":[16,19,37,41,82,86,116,123,127,133,141,144,149,165],"overhead":[17],"in":[18,51],"control":[20,42],"and":[21,57,76,126,153,167,182,200],"management":[22],"operations":[23],"of":[24,55,143,169],"complex":[25],"computing":[26],"systems.":[27,111],"main":[29],"concept":[30],"behind":[31],"this":[32,94,147],"technology":[33],"around":[35],"isolating":[36],"data":[38],"plane":[39],"from":[40,85],"plane.":[43],"Traditional":[44],"security":[45,61,78,83],"mechanisms":[46,84],"are":[47,129],"facing":[48],"more":[49],"challenges":[50],"providing":[52],"sufficient":[53],"levels":[54],"protection":[56],"efficiency.":[58],"SDSys":[59],"for":[60,109,138,155,180,183],"proposed":[64,134],"address":[66],"these":[67],"challenges.":[68],"Security":[71],"(SDSec)":[72],"provides":[73],"flexible":[75],"centralized":[77],"solution":[79],"by":[80],"abstracting":[81],"hardware":[87],"layer":[88],"software":[91],"layer.":[92],"In":[93],"paper":[95],"we":[96],"present":[97],"novel":[99,105],"experimental":[100,135,151],"framework":[101,137,152],"provide":[103],"virtualized":[106],"testbed":[107],"environment":[108],"SDSec":[110,156],"This":[112],"work":[113],"builds":[114],"on":[115],"Mininet":[117],"simulator,":[118,160],"where":[119],"its":[120],"core":[121],"components,":[122],"host,":[124],"switch":[125],"controller,":[128],"customized":[130],"build":[132],"simulation":[136],"SDSec.":[139],"To":[140],"best":[142],"authors'":[145],"knowledge,":[146],"first":[150],"simulator":[154,188],"solutions.":[157],"developed":[159,187],"will":[161,173],"not":[162],"only":[163],"support":[164],"development":[166],"testing":[168],"SDSecurity":[170],"solutions,":[171],"it":[172],"also":[174,190],"serve":[175],"as":[176,193],"an":[177,194],"experimentation":[178],"tool":[179,196],"researchers":[181],"benchmarking":[184],"purposes.":[185],"could":[189],"be":[191],"used":[192],"educational":[195],"train":[198],"students":[199],"novice":[201],"researchers.":[202]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":12},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":10},{"year":2016,"cited_by_count":9},{"year":2015,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
