{"id":"https://openalex.org/W3116662347","doi":"https://doi.org/10.1109/ictc49870.2020.9289504","title":"A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data","display_name":"A Machine Learning Framework for Prevention of Software-Defined Networking controller from DDoS Attacks and dimensionality reduction of big data","publication_year":2020,"publication_date":"2020-10-21","ids":{"openalex":"https://openalex.org/W3116662347","doi":"https://doi.org/10.1109/ictc49870.2020.9289504","mag":"3116662347"},"language":"en","primary_location":{"id":"doi:10.1109/ictc49870.2020.9289504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc49870.2020.9289504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056586306","display_name":"Jehad Ali","orcid":"https://orcid.org/0000-0002-0589-7924"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Jehad Ali","raw_affiliation_strings":["Ajou University, Suwon-si, South Korea"],"affiliations":[{"raw_affiliation_string":"Ajou University, Suwon-si, South Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065984213","display_name":"Byeong\u2010hee Roh","orcid":"https://orcid.org/0000-0003-2509-4210"},"institutions":[{"id":"https://openalex.org/I57664883","display_name":"Ajou University","ror":"https://ror.org/03tzb2h73","country_code":"KR","type":"education","lineage":["https://openalex.org/I57664883"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byeong-hee Roh","raw_affiliation_strings":["Ajou University, Suwon-si, South Korea"],"affiliations":[{"raw_affiliation_string":"Ajou University, Suwon-si, South Korea","institution_ids":["https://openalex.org/I57664883"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5066089123","display_name":"Byungkyu Lee","orcid":"https://orcid.org/0000-0003-0248-3088"},"institutions":[{"id":"https://openalex.org/I4210089444","display_name":"GS Caltex (South Korea)","ror":"https://ror.org/00bvkj141","country_code":"KR","type":"company","lineage":["https://openalex.org/I4210089444"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Byungkyu Lee","raw_affiliation_strings":["LIG Nex1 Co. Ltd., Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"LIG Nex1 Co. Ltd., Seongnam, South Korea","institution_ids":["https://openalex.org/I4210089444"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5021549348","display_name":"Ji-Myung Oh","orcid":null},"institutions":[{"id":"https://openalex.org/I4210089444","display_name":"GS Caltex (South Korea)","ror":"https://ror.org/00bvkj141","country_code":"KR","type":"company","lineage":["https://openalex.org/I4210089444"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jimyung Oh","raw_affiliation_strings":["LIG Nex1 Co. Ltd., Seongnam, South Korea"],"affiliations":[{"raw_affiliation_string":"LIG Nex1 Co. Ltd., Seongnam, South Korea","institution_ids":["https://openalex.org/I4210089444"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5065179238","display_name":"Muhammad Adil","orcid":"https://orcid.org/0000-0003-4494-8576"},"institutions":[{"id":"https://openalex.org/I79571142","display_name":"Virtual University of Pakistan","ror":"https://ror.org/00ya1zd25","country_code":"PK","type":"education","lineage":["https://openalex.org/I79571142"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Muhammad Adil","raw_affiliation_strings":["Virtual University, Lahore, Pakistan"],"affiliations":[{"raw_affiliation_string":"Virtual University, Lahore, Pakistan","institution_ids":["https://openalex.org/I79571142"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5056586306"],"corresponding_institution_ids":["https://openalex.org/I57664883"],"apc_list":null,"apc_paid":null,"fwci":3.3919,"has_fulltext":false,"cited_by_count":41,"citation_normalized_percentile":{"value":0.9298063,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"515","last_page":"519"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.8488907814025879},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8025909066200256},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7643818259239197},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.5502080321311951},{"id":"https://openalex.org/keywords/dimensionality-reduction","display_name":"Dimensionality reduction","score":0.5416143536567688},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5327470302581787},{"id":"https://openalex.org/keywords/support-vector-machine","display_name":"Support vector machine","score":0.5233975052833557},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.49474069476127625},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4227350354194641},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.39957550168037415},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.39583346247673035},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3824484348297119},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.36693328619003296},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.35840874910354614},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.314567506313324},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.1398640275001526},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11241665482521057}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8488907814025879},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8025909066200256},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7643818259239197},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.5502080321311951},{"id":"https://openalex.org/C70518039","wikidata":"https://www.wikidata.org/wiki/Q16000077","display_name":"Dimensionality reduction","level":2,"score":0.5416143536567688},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5327470302581787},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.5233975052833557},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.49474069476127625},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4227350354194641},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39957550168037415},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.39583346247673035},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3824484348297119},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.36693328619003296},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.35840874910354614},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.314567506313324},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.1398640275001526},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11241665482521057},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/ictc49870.2020.9289504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ictc49870.2020.9289504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Conference on Information and Communication Technology Convergence (ICTC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W38301456","https://openalex.org/W1986244340","https://openalex.org/W2125560635","https://openalex.org/W2166463955","https://openalex.org/W2167139585","https://openalex.org/W2169623711","https://openalex.org/W2462597051","https://openalex.org/W2548015322","https://openalex.org/W2563385197","https://openalex.org/W2773920080","https://openalex.org/W2779533463","https://openalex.org/W2947109500","https://openalex.org/W2989178978","https://openalex.org/W2995048138","https://openalex.org/W2998008813","https://openalex.org/W3009746682","https://openalex.org/W3011630924","https://openalex.org/W3024762568","https://openalex.org/W6601578796","https://openalex.org/W6730011493","https://openalex.org/W6746611530","https://openalex.org/W6771909575","https://openalex.org/W6776867858"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W2735897973","https://openalex.org/W4229489764","https://openalex.org/W4315705477","https://openalex.org/W4213341501","https://openalex.org/W1543555101","https://openalex.org/W3036366741","https://openalex.org/W3122360749","https://openalex.org/W4214777079","https://openalex.org/W3195575042"],"abstract_inverted_index":{"The":[0],"controller":[1,23,52,70],"is":[2,82,147,176,183],"an":[3],"indispensable":[4],"entity":[5],"in":[6],"software-defined":[7],"networking":[8],"(SDN),":[9],"as":[10],"it":[11],"maintains":[12],"a":[13,32,50,101,112,123,151],"global":[14],"view":[15],"of":[16,35,44,65,89,95,98,135,172],"the":[17,22,28,40,45,57,69,73,79,93,133,136,141,164,170,179],"underlying":[18],"network.":[19],"However,":[20],"if":[21],"fails":[24],"to":[25,27,31,86,131,149],"respond":[26],"network":[29,47],"due":[30,85],"distributed":[33],"denial":[34],"service":[36],"(DDoS)":[37],"attacks.":[38],"Then,":[39],"attacker":[41],"takes":[42],"charge":[43],"whole":[46],"via":[48],"launching":[49],"spoof":[51],"and":[53,62,76,140,158,174],"can":[54],"also":[55],"modify":[56],"flow":[58],"tables.":[59],"Hence,":[60],"faster,":[61],"accurate":[63],"detection":[64],"DDoS":[66,152],"attacks":[67],"against":[68],"will":[71],"make":[72],"SDN":[74,105,116],"reliable":[75],"secure.":[77],"Moreover,":[78],"Internet":[80],"traffic":[81,139],"drastically":[83],"increasing":[84],"unprecedented":[87],"growth":[88],"connected":[90],"devices.":[91],"Consequently,":[92,169],"processing":[94],"large":[96],"number":[97],"requests":[99],"cause":[100],"performance":[102,171],"bottleneck":[103],"regarding":[104],"controller.":[106],"In":[107],"this":[108],"paper,":[109],"we":[110],"propose":[111],"hierarchical":[113],"control":[114],"plane":[115],"architecture":[117],"for":[118],"multi-domain":[119],"communication":[120],"that":[121],"uses":[122],"statistical":[124],"method":[125],"called":[126],"principal":[127],"component":[128],"analysis":[129],"(PCA)":[130],"reduce":[132],"dimensionality":[134],"big":[137],"data":[138],"support":[142],"vector":[143],"machine":[144],"(SVM)":[145],"classifier":[146],"employed":[148],"detect":[150],"attack.":[153],"SVM":[154],"has":[155],"high":[156],"accuracy":[157,175],"less":[159],"false":[160,180],"positive":[161,181],"rate":[162,182],"while":[163,178],"PCA":[165],"filters":[166],"attribute":[167],"drastically.":[168],"classification":[173],"improved":[177],"reduced.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
