{"id":"https://openalex.org/W3048389087","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162965","title":"Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment","display_name":"Detecting and Mitigating ARP Attacks in SDN-Based Cloud Environment","publication_year":2020,"publication_date":"2020-07-01","ids":{"openalex":"https://openalex.org/W3048389087","doi":"https://doi.org/10.1109/infocomwkshps50562.2020.9162965","mag":"3048389087"},"language":"en","primary_location":{"id":"doi:10.1109/infocomwkshps50562.2020.9162965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003606268","display_name":"Sixian Sun","orcid":"https://orcid.org/0000-0003-3798-1693"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sixian Sun","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing,China","State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103805225","display_name":"Xiao Fu","orcid":"https://orcid.org/0009-0006-6601-5290"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Fu","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing,China","State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073104000","display_name":"Bin Luo","orcid":"https://orcid.org/0000-0002-9036-0063"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bin Luo","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing,China","State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University,Nanjing,China","institution_ids":["https://openalex.org/I881766915"]},{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060514022","display_name":"Xiaojiang Du","orcid":"https://orcid.org/0000-0003-4235-9671"},"institutions":[{"id":"https://openalex.org/I84392919","display_name":"Temple University","ror":"https://ror.org/00kx1jb78","country_code":"US","type":"education","lineage":["https://openalex.org/I84392919"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiaojiang Du","raw_affiliation_strings":["Temple University,Dept. of Computer and Information Sciences,Philadelphia,USA","Temple University, Philadelphia, USA"],"affiliations":[{"raw_affiliation_string":"Temple University,Dept. of Computer and Information Sciences,Philadelphia,USA","institution_ids":["https://openalex.org/I84392919"]},{"raw_affiliation_string":"Temple University, Philadelphia, USA","institution_ids":["https://openalex.org/I84392919"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5003606268"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":1.8501,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.86508443,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"659","last_page":"664"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8313218355178833},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7810337543487549},{"id":"https://openalex.org/keywords/arp-spoofing","display_name":"ARP spoofing","score":0.7258661389350891},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6920126080513},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6796707510948181},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6743196249008179},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6079038977622986},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5639748573303223},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.5537164211273193},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5262854695320129},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.49124354124069214},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.470964252948761},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4247899055480957},{"id":"https://openalex.org/keywords/deep-packet-inspection","display_name":"Deep packet inspection","score":0.4150155484676361},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.22826248407363892},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.16855105757713318},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07938611507415771}],"concepts":[{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8313218355178833},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7810337543487549},{"id":"https://openalex.org/C86255107","wikidata":"https://www.wikidata.org/wiki/Q296847","display_name":"ARP spoofing","level":5,"score":0.7258661389350891},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6920126080513},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6796707510948181},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6743196249008179},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6079038977622986},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5639748573303223},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.5537164211273193},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5262854695320129},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.49124354124069214},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.470964252948761},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4247899055480957},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.4150155484676361},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.22826248407363892},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.16855105757713318},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07938611507415771},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocomwkshps50562.2020.9162965","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocomwkshps50562.2020.9162965","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1613025943","https://openalex.org/W2005422979","https://openalex.org/W2050243336","https://openalex.org/W2053059469","https://openalex.org/W2078623873","https://openalex.org/W2081855975","https://openalex.org/W2111281854","https://openalex.org/W2113047229","https://openalex.org/W2121318675","https://openalex.org/W2124297996","https://openalex.org/W2156077047","https://openalex.org/W2206730006","https://openalex.org/W2218519206","https://openalex.org/W2293139726","https://openalex.org/W2478177690","https://openalex.org/W2592109611","https://openalex.org/W2594696422","https://openalex.org/W2598939142","https://openalex.org/W2611930157","https://openalex.org/W2793462199","https://openalex.org/W2804145072"],"related_works":["https://openalex.org/W2051935741","https://openalex.org/W1989064996","https://openalex.org/W2926903444","https://openalex.org/W4243609393","https://openalex.org/W2738801488","https://openalex.org/W4211055425","https://openalex.org/W85890223","https://openalex.org/W366572230","https://openalex.org/W2560450376","https://openalex.org/W2901563743"],"abstract_inverted_index":{"Cloud":[0],"computing":[1,22,103],"is":[2,24,159,184],"making":[3],"a":[4,39,115,149,172],"greater":[5],"impact":[6],"on":[7,165],"internet":[8],"industry,":[9,11,13],"medical":[10],"insurance":[12],"and":[14,30,58,87,133,188],"so":[15],"on.":[16],"Due":[17],"to":[18,71,100,127,134,151,168,179,186],"its":[19],"influence,":[20],"cloud":[21,32,102,194],"networking":[23,104],"in":[25,94,125,148,192],"great":[26],"need":[27],"of":[28,67,79,84,91,117,144],"security,":[29],"protecting":[31],"environment":[33],"from":[34,54,105],"diverse":[35],"attacks":[36,191],"has":[37],"been":[38],"hot":[40],"issue.":[41],"On":[42],"the":[43,51,55,64,76,82,89,112,130],"other":[44],"hand,":[45],"Software":[46],"Defined":[47],"Network":[48],"(SDN)":[49],"separates":[50],"control":[52],"plane":[53,57],"data":[56,143],"makes":[59],"networks":[60],"programmable,":[61],"which":[62],"promotes":[63],"centralized":[65],"management":[66],"network":[68,85],"devices.":[69],"Compared":[70],"traditional":[72],"networks,":[73],"SDN":[74,99],"increases":[75,81],"utilization":[77],"efficiency":[78],"resources,":[80],"flexibility":[83],"services,":[86],"reduces":[88],"cost":[90],"maintenance.":[92],"Therefore,":[93],"this":[95],"paper,":[96],"we":[97,176],"apply":[98],"protect":[101],"Address":[106],"Resolution":[107],"Protocol":[108],"(ARP)":[109],"attacks.":[110,138,155],"In":[111],"proposed":[113],"approach,":[114],"cluster":[116],"controllers":[118,140,161],"detects":[119],"ARP":[120,136,145,153,190],"packets":[121,146],"that":[122,181],"hosts":[123],"send,":[124],"order":[126],"find":[128],"out":[129],"forged":[131],"ones":[132],"prevent":[135],"spoofing":[137],"Also,":[139],"monitor":[141],"statistical":[142],"once":[147],"while":[150],"detect":[152,187],"flooding":[154],"Once":[156],"an":[157],"attack":[158],"detected,":[160],"install":[162],"flow":[163,170],"entries":[164],"corresponding":[166],"switches,":[167],"block":[169],"for":[171],"specific":[173],"time.":[174],"Finally,":[175],"conduct":[177],"experiments":[178],"show":[180],"our":[182],"approach":[183],"useful":[185],"mitigate":[189],"SDN-based":[193],"environment.":[195]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
