{"id":"https://openalex.org/W4399372394","doi":"https://doi.org/10.1109/icmcis61231.2024.10540952","title":"Towards a Cyber Defense System in Software-Defined Tactical Networks","display_name":"Towards a Cyber Defense System in Software-Defined Tactical Networks","publication_year":2024,"publication_date":"2024-04-23","ids":{"openalex":"https://openalex.org/W4399372394","doi":"https://doi.org/10.1109/icmcis61231.2024.10540952"},"language":"en","primary_location":{"id":"doi:10.1109/icmcis61231.2024.10540952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcis61231.2024.10540952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Military Communication and Information Systems (ICMCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099028185","display_name":"Sean Kloth","orcid":null},"institutions":[{"id":"https://openalex.org/I135140700","display_name":"University of Bonn","ror":"https://ror.org/041nas322","country_code":"DE","type":"education","lineage":["https://openalex.org/I135140700"]},{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Sean Kloth","raw_affiliation_strings":["Institute of Computer Science 4, University of Bonn,Bonn,Germany","Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany","Institute of Computer Science 4, University of Bonn, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Institute of Computer Science 4, University of Bonn,Bonn,Germany","institution_ids":["https://openalex.org/I135140700"]},{"raw_affiliation_string":"Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Institute of Computer Science 4, University of Bonn, Bonn, Germany","institution_ids":["https://openalex.org/I135140700"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5037683366","display_name":"Paulo H. L. Rettore","orcid":"https://orcid.org/0000-0002-5491-7274"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Paulo H.L. Rettore","raw_affiliation_strings":["Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany","Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092146442","display_name":"Philipp Zi\u00dfner","orcid":"https://orcid.org/0009-0000-8867-1842"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Philipp Zi\u00dfner","raw_affiliation_strings":["Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany","Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073394372","display_name":"Bruno P. Santos","orcid":"https://orcid.org/0000-0003-4501-2323"},"institutions":[{"id":"https://openalex.org/I126158947","display_name":"Universidade Federal da Bahia","ror":"https://ror.org/03k3p7647","country_code":"BR","type":"education","lineage":["https://openalex.org/I126158947"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Bruno P. Santos","raw_affiliation_strings":["Federal University of Bahia,Department of Computer Science,Salvador,Brazil","Department of Computer Science, Federal University of Bahia, Salvador, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Bahia,Department of Computer Science,Salvador,Brazil","institution_ids":["https://openalex.org/I126158947"]},{"raw_affiliation_string":"Department of Computer Science, Federal University of Bahia, Salvador, Brazil","institution_ids":["https://openalex.org/I126158947"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5018138017","display_name":"Peter Sevenich","orcid":"https://orcid.org/0000-0002-4639-2156"},"institutions":[{"id":"https://openalex.org/I4210166245","display_name":"Fraunhofer Institute for Communication, Information Processing and Ergonomics","ror":"https://ror.org/05nn0gw40","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210166245","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Peter Sevenich","raw_affiliation_strings":["Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany","Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer FKIE,Department of Communication Systems,Bonn,Germany","institution_ids":["https://openalex.org/I4210166245"]},{"raw_affiliation_string":"Department of Communication Systems, Fraunhofer FKIE, Bonn, Germany","institution_ids":["https://openalex.org/I4210166245"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5099028185"],"corresponding_institution_ids":["https://openalex.org/I135140700","https://openalex.org/I4210166245"],"apc_list":null,"apc_paid":null,"fwci":0.751,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.70514816,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.954200029373169,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8587355613708496},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7680892944335938},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6289788484573364},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6268505454063416},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5314195156097412},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.5199612379074097},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5143254995346069},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5015254020690918},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.47884368896484375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.47516414523124695},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.44243746995925903},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.43283700942993164},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3877928853034973},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24693605303764343},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.16517525911331177}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8587355613708496},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7680892944335938},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6289788484573364},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6268505454063416},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5314195156097412},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.5199612379074097},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5143254995346069},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5015254020690918},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47884368896484375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.47516414523124695},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.44243746995925903},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.43283700942993164},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3877928853034973},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24693605303764343},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.16517525911331177},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icmcis61231.2024.10540952","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icmcis61231.2024.10540952","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 International Conference on Military Communication and Information Systems (ICMCIS)","raw_type":"proceedings-article"},{"id":"pmh:oai:publica.fraunhofer.de:publica/487977","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/487977","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1577498723","https://openalex.org/W2067453331","https://openalex.org/W2067551786","https://openalex.org/W2163375756","https://openalex.org/W2560146204","https://openalex.org/W2773701827","https://openalex.org/W2775132284","https://openalex.org/W2798664881","https://openalex.org/W2911343969","https://openalex.org/W2973021057","https://openalex.org/W3003694725","https://openalex.org/W3033801848","https://openalex.org/W3184240363","https://openalex.org/W3190896305","https://openalex.org/W4206294250","https://openalex.org/W4296707631","https://openalex.org/W4317928161","https://openalex.org/W4388820296","https://openalex.org/W4390189729","https://openalex.org/W4390189854"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W3195575042","https://openalex.org/W1543555101","https://openalex.org/W2898113880","https://openalex.org/W2793567886","https://openalex.org/W4308272253","https://openalex.org/W4285316604"],"abstract_inverted_index":{"This":[0],"study":[1],"investigates":[2],"the":[3,43,55,69,75,81,87,91,101,107,113,134,145],"robustness":[4],"of":[5,36,52,61,80,104,115,147],"a":[6,14,20,34,40],"Software-defined":[7],"Networking":[8],"(SDN)":[9],"controller":[10,93],"when":[11],"confronted":[12],"with":[13],"Distributed":[15],"Denial-of-Service":[16],"(DDOS)":[17],"attack":[18],"in":[19],"tactical":[21],"environment.":[22],"A":[23],"proactive":[24],"defense":[25],"mechanism":[26],"is":[27],"introduced":[28],"to":[29,33,110,129,143],"detect":[30],"and":[31,66,68,78,94,118,122,124,138],"respond":[32],"flooding":[35],"\u201cpacket-in\u201d":[37,105,125],"requests,":[38,106,112],"triggering":[39],"response":[41,108],"once":[42],"network":[44],"features":[45,98],"indicate":[46],"an":[47],"anomaly.":[48],"The":[49,83],"methodology":[50],"consists":[51],"two":[53],"components:":[54],"Cyber":[56,70],"Defense":[57],"Agent":[58,72],"(CDA),":[59],"consisting":[60],"monitoring,":[62],"feature":[63],"engineering,":[64],"detection,":[65],"responses,":[67],"Attack":[71],"(CAA),":[73],"including":[74],"preparation,":[76],"execution,":[77],"evaluation":[79],"attack.":[82],"CDA":[84],"monitors":[85],"all":[86],"IP":[88,116],"flows":[89],"from":[90],"SDN":[92],"processes":[95],"four":[96],"main":[97],"such":[99],"as":[100],"average":[102],"number":[103],"time":[109],"these":[111],"entropy":[114],"addresses":[117],"ports":[119],"for":[120],"source":[121],"destination,":[123],"requests":[126],"per":[127],"switch":[128],"identify":[130],"compromised":[131],"switches.":[132],"All":[133],"components":[135],"were":[136],"emulated":[137],"tested,":[139],"collecting":[140],"quantitative":[141],"evidence":[142],"demonstrate":[144],"effectiveness":[146],"both":[148],"agents.":[149]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
