{"id":"https://openalex.org/W4386243279","doi":"https://doi.org/10.1109/infocom53939.2023.10229058","title":"SDN Application Backdoor: Disrupting the Service via Poisoning the Topology","display_name":"SDN Application Backdoor: Disrupting the Service via Poisoning the Topology","publication_year":2023,"publication_date":"2023-05-17","ids":{"openalex":"https://openalex.org/W4386243279","doi":"https://doi.org/10.1109/infocom53939.2023.10229058"},"language":"en","primary_location":{"id":"doi:10.1109/infocom53939.2023.10229058","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom53939.2023.10229058","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5005521537","display_name":"Shuhua Deng","orcid":"https://orcid.org/0000-0002-8985-1295"},"institutions":[{"id":"https://openalex.org/I4610292","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4610292"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Shuhua Deng","raw_affiliation_strings":["Xiangtan University,Xiangtan,China","Xiangtan University, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Xiangtan University,Xiangtan,China","institution_ids":["https://openalex.org/I4610292"]},{"raw_affiliation_string":"Xiangtan University, Xiangtan, China","institution_ids":["https://openalex.org/I4610292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065047431","display_name":"Xian Qing","orcid":"https://orcid.org/0009-0009-3423-4458"},"institutions":[{"id":"https://openalex.org/I4610292","display_name":"Xiangtan University","ror":"https://ror.org/00xsfaz62","country_code":"CN","type":"education","lineage":["https://openalex.org/I4610292"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xian Qing","raw_affiliation_strings":["Xiangtan University,Xiangtan,China","Xiangtan University, Xiangtan, China"],"affiliations":[{"raw_affiliation_string":"Xiangtan University,Xiangtan,China","institution_ids":["https://openalex.org/I4610292"]},{"raw_affiliation_string":"Xiangtan University, Xiangtan, China","institution_ids":["https://openalex.org/I4610292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100637082","display_name":"Xiaofan Li","orcid":"https://orcid.org/0000-0002-6687-5569"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaofan Li","raw_affiliation_strings":["University of Delaware,USA","University of Delaware, USA"],"affiliations":[{"raw_affiliation_string":"University of Delaware,USA","institution_ids":["https://openalex.org/I86501945"]},{"raw_affiliation_string":"University of Delaware, USA","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100622647","display_name":"Xing Gao","orcid":"https://orcid.org/0009-0008-0635-2935"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]},{"id":"https://openalex.org/I173759888","display_name":"Hunan Normal University","ror":"https://ror.org/053w1zy07","country_code":"CN","type":"education","lineage":["https://openalex.org/I173759888"]},{"id":"https://openalex.org/I3130607311","display_name":"Changsha Normal University","ror":"https://ror.org/02sqk3z62","country_code":"CN","type":"education","lineage":["https://openalex.org/I3130607311"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Xing Gao","raw_affiliation_strings":["Hunan Normal University,Changsha,China","University of Delaware,USA","University of Delaware, USA"],"affiliations":[{"raw_affiliation_string":"Hunan Normal University,Changsha,China","institution_ids":["https://openalex.org/I3130607311","https://openalex.org/I173759888"]},{"raw_affiliation_string":"University of Delaware,USA","institution_ids":["https://openalex.org/I86501945"]},{"raw_affiliation_string":"University of Delaware, USA","institution_ids":["https://openalex.org/I86501945"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010870600","display_name":"Xieping Gao","orcid":"https://orcid.org/0000-0002-7764-3616"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]},{"id":"https://openalex.org/I173759888","display_name":"Hunan Normal University","ror":"https://ror.org/053w1zy07","country_code":"CN","type":"education","lineage":["https://openalex.org/I173759888"]},{"id":"https://openalex.org/I3130607311","display_name":"Changsha Normal University","ror":"https://ror.org/02sqk3z62","country_code":"CN","type":"education","lineage":["https://openalex.org/I3130607311"]}],"countries":["CN","US"],"is_corresponding":false,"raw_author_name":"Xieping Gao","raw_affiliation_strings":["Hunan Normal University,Changsha,China","University of Delaware,USA","Hunan Normal University, Changsha, China"],"affiliations":[{"raw_affiliation_string":"Hunan Normal University,Changsha,China","institution_ids":["https://openalex.org/I3130607311","https://openalex.org/I173759888"]},{"raw_affiliation_string":"University of Delaware,USA","institution_ids":["https://openalex.org/I86501945"]},{"raw_affiliation_string":"Hunan Normal University, Changsha, China","institution_ids":["https://openalex.org/I3130607311","https://openalex.org/I173759888"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5005521537"],"corresponding_institution_ids":["https://openalex.org/I4610292"],"apc_list":null,"apc_paid":null,"fwci":1.0156,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77596706,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"10"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9929999709129333,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/backdoor","display_name":"Backdoor","score":0.8248906135559082},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7871336340904236},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6131777167320251},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6124321222305298},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5742774605751038},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.567297637462616},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5491490960121155},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5200878381729126},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.49814534187316895},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.4789726734161377},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.42520684003829956},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32417649030685425},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.20480823516845703},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.11614638566970825}],"concepts":[{"id":"https://openalex.org/C2781045450","wikidata":"https://www.wikidata.org/wiki/Q254569","display_name":"Backdoor","level":2,"score":0.8248906135559082},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7871336340904236},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6131777167320251},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6124321222305298},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5742774605751038},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.567297637462616},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5491490960121155},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5200878381729126},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.49814534187316895},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.4789726734161377},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.42520684003829956},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32417649030685425},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.20480823516845703},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.11614638566970825},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom53939.2023.10229058","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom53939.2023.10229058","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2023 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6899999976158142}],"awards":[],"funders":[{"id":"https://openalex.org/F4320311213","display_name":"Education Department of Hunan Province","ror":"https://ror.org/05ckg3w11"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320322843","display_name":"Natural Science Foundation of\u00a0Hunan Province","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W1984451560","https://openalex.org/W2019419295","https://openalex.org/W2084915558","https://openalex.org/W2122109510","https://openalex.org/W2122695394","https://openalex.org/W2137845741","https://openalex.org/W2147118406","https://openalex.org/W2312580114","https://openalex.org/W2321886673","https://openalex.org/W2419665292","https://openalex.org/W2528154188","https://openalex.org/W2605109919","https://openalex.org/W2606268356","https://openalex.org/W2612205004","https://openalex.org/W2614589546","https://openalex.org/W2740981508","https://openalex.org/W2751981537","https://openalex.org/W2758509082","https://openalex.org/W2767197769","https://openalex.org/W2883042941","https://openalex.org/W2887712777","https://openalex.org/W2891859757","https://openalex.org/W2900168848","https://openalex.org/W2906443298","https://openalex.org/W2923173494","https://openalex.org/W2954101292","https://openalex.org/W2958302667","https://openalex.org/W2986931599","https://openalex.org/W3008407139","https://openalex.org/W3008852997","https://openalex.org/W3120073944","https://openalex.org/W3132660264","https://openalex.org/W3209663586","https://openalex.org/W4233270263","https://openalex.org/W6743419719","https://openalex.org/W6765285382","https://openalex.org/W6787959460","https://openalex.org/W6802645839"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W3195575042","https://openalex.org/W1543555101","https://openalex.org/W2898113880","https://openalex.org/W2793567886","https://openalex.org/W4308272253","https://openalex.org/W4285316604"],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN)":[2],"enables":[3],"the":[4,47,121,149,170],"deployment":[5],"of":[6,50,100,107,172],"diversified":[7],"networking":[8],"applications":[9,42,63,92],"by":[10,128],"providing":[11],"global":[12],"visibility":[13],"and":[14,38,88,123,143,152,181],"open":[15,29],"programmability":[16],"on":[17],"a":[18,74,86,98],"centralized":[19],"controller.":[20],"As":[21],"SDN":[22,41,79,112,136,163,179],"enters":[23],"its":[24],"second":[25],"decade,":[26],"several":[27],"well-developed":[28],"source":[30],"controllers":[31,80,137],"have":[32],"been":[33],"widely":[34],"adopted":[35],"in":[36,77,177],"industry,":[37],"various":[39],"commercial":[40],"are":[43,145],"built":[44],"to":[45,84,93,148,161],"meet":[46],"surging":[48],"demand":[49],"network":[51,67,95],"innovation.":[52],"This":[53],"complex":[54],"ecosystem":[55],"inevitably":[56],"introduces":[57],"new":[58,75,156],"security":[59],"threats,":[60],"as":[61],"malicious":[62,91],"can":[64,125],"significantly":[65],"disrupt":[66,94,162],"operations.":[68],"In":[69],"this":[70,108,159],"paper,":[71],"we":[72],"introduce":[73],"vulnerability":[76,109,160],"existing":[78],"that":[81,111,133],"enable":[82],"adversaries":[83],"create":[85],"backdoor":[87],"further":[89,153],"deploy":[90],"service":[96],"via":[97],"series":[99],"topology":[101],"poisoning":[102],"attacks.":[103],"The":[104],"root":[105],"cause":[106],"is":[110],"systems":[113],"simply":[114],"process":[115],"received":[116],"Packet-In":[117],"messages":[118],"without":[119],"checking":[120],"integrity,":[122],"thus":[124],"be":[126],"misguided":[127],"manipulated":[129],"messages.":[130],"We":[131,168],"discover":[132],"five":[134],"popular":[135],"(i.e.,":[138],"Floodlight,":[139],"ONOS,":[140],"OpenDaylight,":[141],"POX":[142],"Ryu)":[144],"potentially":[146],"vulnerable":[147],"disclosed":[150],"attack,":[151],"propose":[154],"six":[155],"attacks":[157,174],"exploiting":[158],"services":[164],"from":[165],"different":[166],"layers.":[167],"evaluate":[169],"effectiveness":[171],"these":[173],"with":[175],"experiments":[176],"real":[178],"testbeds,":[180],"discuss":[182],"feasible":[183],"countermeasures.":[184]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2}],"updated_date":"2026-03-13T16:22:10.518609","created_date":"2025-10-10T00:00:00"}
