{"id":"https://openalex.org/W2509100137","doi":"https://doi.org/10.1109/iscc.2016.7543774","title":"SAVSH: IP source address validation for SDN hybrid networks","display_name":"SAVSH: IP source address validation for SDN hybrid networks","publication_year":2016,"publication_date":"2016-06-01","ids":{"openalex":"https://openalex.org/W2509100137","doi":"https://doi.org/10.1109/iscc.2016.7543774","mag":"2509100137"},"language":"en","primary_location":{"id":"doi:10.1109/iscc.2016.7543774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2016.7543774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Symposium on Computers and Communication (ISCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100778689","display_name":"Guolong Chen","orcid":"https://orcid.org/0000-0001-9111-0552"},"institutions":[{"id":"https://openalex.org/I3131625388","display_name":"University Town of Shenzhen","ror":"https://ror.org/05f5j6225","country_code":"CN","type":"education","lineage":["https://openalex.org/I3131625388"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Guolong Chen","raw_affiliation_strings":["Graduate School at Shenzhen, Tsinghua University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Graduate School at Shenzhen, Tsinghua University, Shenzhen, China","institution_ids":["https://openalex.org/I3131625388","https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085450781","display_name":"Guangwu Hu","orcid":"https://orcid.org/0000-0003-3947-9998"},"institutions":[{"id":"https://openalex.org/I3131625388","display_name":"University Town of Shenzhen","ror":"https://ror.org/05f5j6225","country_code":"CN","type":"education","lineage":["https://openalex.org/I3131625388"]},{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangwu Hu","raw_affiliation_strings":["Graduate School at Shenzhen, Tsinghua University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Graduate School at Shenzhen, Tsinghua University, Shenzhen, China","institution_ids":["https://openalex.org/I3131625388","https://openalex.org/I99065089"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101626204","display_name":"Yong Jiang","orcid":"https://orcid.org/0000-0002-4260-1395"},"institutions":[{"id":"https://openalex.org/I99065089","display_name":"Tsinghua University","ror":"https://ror.org/03cve4549","country_code":"CN","type":"education","lineage":["https://openalex.org/I99065089"]},{"id":"https://openalex.org/I3131625388","display_name":"University Town of Shenzhen","ror":"https://ror.org/05f5j6225","country_code":"CN","type":"education","lineage":["https://openalex.org/I3131625388"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yong Jiang","raw_affiliation_strings":["Graduate School at Shenzhen, Tsinghua University, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Graduate School at Shenzhen, Tsinghua University, Shenzhen, China","institution_ids":["https://openalex.org/I3131625388","https://openalex.org/I99065089"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5053947824","display_name":"Chaoqin Zhang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chaoqin Zhang","raw_affiliation_strings":["National Digital Switches System Engineering & Technological Researcher Center, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switches System Engineering & Technological Researcher Center, Zhengzhou, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100778689"],"corresponding_institution_ids":["https://openalex.org/I3131625388","https://openalex.org/I99065089"],"apc_list":null,"apc_paid":null,"fwci":0.8686,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.77293705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"409","last_page":"414"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8310494422912598},{"id":"https://openalex.org/keywords/ip-address-spoofing","display_name":"IP address spoofing","score":0.7885477542877197},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7679088115692139},{"id":"https://openalex.org/keywords/loose-source-routing","display_name":"Loose Source Routing","score":0.6993103623390198},{"id":"https://openalex.org/keywords/ip-forwarding","display_name":"IP forwarding","score":0.677202045917511},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5410969853401184},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5393860340118408},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5181837677955627},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.502655029296875},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.49559271335601807},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.4949273467063904},{"id":"https://openalex.org/keywords/ip-tunnel","display_name":"IP tunnel","score":0.4825400710105896},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.46710148453712463},{"id":"https://openalex.org/keywords/virtual-routing-and-forwarding","display_name":"Virtual routing and forwarding","score":0.4624045491218567},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.45657777786254883},{"id":"https://openalex.org/keywords/internet-topology","display_name":"Internet topology","score":0.45042359828948975},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.44233208894729614},{"id":"https://openalex.org/keywords/optical-ip-switching","display_name":"Optical IP Switching","score":0.4381857216358185},{"id":"https://openalex.org/keywords/packet-forwarding","display_name":"Packet forwarding","score":0.4363780915737152},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.412089467048645},{"id":"https://openalex.org/keywords/internet-protocol","display_name":"Internet Protocol","score":0.4118087887763977},{"id":"https://openalex.org/keywords/network-address-translation","display_name":"Network address translation","score":0.35731586813926697},{"id":"https://openalex.org/keywords/routing-protocol","display_name":"Routing protocol","score":0.25541892647743225},{"id":"https://openalex.org/keywords/routing-table","display_name":"Routing table","score":0.19715341925621033},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08084416389465332}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8310494422912598},{"id":"https://openalex.org/C111814575","wikidata":"https://www.wikidata.org/wiki/Q550893","display_name":"IP address spoofing","level":5,"score":0.7885477542877197},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7679088115692139},{"id":"https://openalex.org/C39997849","wikidata":"https://www.wikidata.org/wiki/Q6675974","display_name":"Loose Source Routing","level":5,"score":0.6993103623390198},{"id":"https://openalex.org/C174809319","wikidata":"https://www.wikidata.org/wiki/Q5973191","display_name":"IP forwarding","level":5,"score":0.677202045917511},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5410969853401184},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5393860340118408},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5181837677955627},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.502655029296875},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.49559271335601807},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.4949273467063904},{"id":"https://openalex.org/C10790986","wikidata":"https://www.wikidata.org/wiki/Q442343","display_name":"IP tunnel","level":4,"score":0.4825400710105896},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.46710148453712463},{"id":"https://openalex.org/C157626507","wikidata":"https://www.wikidata.org/wiki/Q7935037","display_name":"Virtual routing and forwarding","level":5,"score":0.4624045491218567},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.45657777786254883},{"id":"https://openalex.org/C99237066","wikidata":"https://www.wikidata.org/wiki/Q17092610","display_name":"Internet topology","level":3,"score":0.45042359828948975},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44233208894729614},{"id":"https://openalex.org/C92341879","wikidata":"https://www.wikidata.org/wiki/Q7098813","display_name":"Optical IP Switching","level":4,"score":0.4381857216358185},{"id":"https://openalex.org/C120317029","wikidata":"https://www.wikidata.org/wiki/Q874048","display_name":"Packet forwarding","level":3,"score":0.4363780915737152},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.412089467048645},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.4118087887763977},{"id":"https://openalex.org/C147873670","wikidata":"https://www.wikidata.org/wiki/Q11182","display_name":"Network address translation","level":4,"score":0.35731586813926697},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.25541892647743225},{"id":"https://openalex.org/C184896649","wikidata":"https://www.wikidata.org/wiki/Q290066","display_name":"Routing table","level":4,"score":0.19715341925621033},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08084416389465332}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscc.2016.7543774","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscc.2016.7543774","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Symposium on Computers and Communication (ISCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.41999998688697815,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W1526572178","https://openalex.org/W1671218426","https://openalex.org/W1807098818","https://openalex.org/W1867219652","https://openalex.org/W1954210423","https://openalex.org/W2001968297","https://openalex.org/W2025551220","https://openalex.org/W2139509088","https://openalex.org/W2146100293","https://openalex.org/W2157035599","https://openalex.org/W2162547852","https://openalex.org/W2177058407","https://openalex.org/W2275015310","https://openalex.org/W2297894457","https://openalex.org/W2775693717","https://openalex.org/W3022353522","https://openalex.org/W3159998597","https://openalex.org/W4205358955","https://openalex.org/W4251630043","https://openalex.org/W6631433613","https://openalex.org/W6637170952","https://openalex.org/W6638564739","https://openalex.org/W6680602429","https://openalex.org/W6681844683"],"related_works":["https://openalex.org/W2149420003","https://openalex.org/W3169314715","https://openalex.org/W3120529977","https://openalex.org/W4283364863","https://openalex.org/W2262461811","https://openalex.org/W1952682129","https://openalex.org/W3184693703","https://openalex.org/W1035135350","https://openalex.org/W3161036849","https://openalex.org/W2980696239"],"abstract_inverted_index":{"Current":[0],"Internet":[1,21],"packet":[2,35],"forwarding":[3],"only":[4,141],"relies":[5],"on":[6,177],"destination":[7],"IP":[8,17,65,112],"address":[9,19,67],"and":[10,41,47,89,104,134],"thus":[11],"neglects":[12],"the":[13,81,100,117,130,148,152,157],"validation":[14,68,154],"of":[15,80],"packet's":[16],"source":[18,66],"for":[20,70,99],"accountability,":[22],"which":[23,84,163],"incurs":[24],"many":[25],"cyber-security":[26],"threats.":[27],"State-of-the-art":[28],"solutions":[29],"either":[30],"have":[31],"issues":[32],"in":[33],"spoofing":[34],"filtering":[36,106,114],"accuracy,":[37],"e.g.,":[38],"false":[39,42],"positive":[40],"negative,":[43],"or":[44,54],"encounter":[45],"scalability":[46],"deployment":[48,161,175],"problems,":[49],"i.e.,":[50],"end-host":[51],"TCP/IP":[52],"stack":[53],"router":[55],"modification.":[56],"In":[57,116],"this":[58],"article,":[59],"we":[60],"propose":[61],"SAVSH,":[62],"a":[63],"practical":[64],"scheme":[69],"Software":[71],"Defined":[72],"Networking":[73],"(SDN)":[74],"hybrid":[75],"networks.":[76],"SAVSH":[77,119,139],"takes":[78,121],"advantage":[79],"SDN":[82,101,159],"architecture":[83],"possesses":[85,142],"global":[86],"topological":[87],"view":[88],"central":[90],"control":[91],"pattern,":[92],"so":[93],"that":[94,150],"it":[95],"can":[96],"locate":[97],"nodes":[98],"switch":[102,160],"replacement":[103],"deploy":[105],"rules":[107],"onto":[108],"them":[109],"with":[110,156],"desirable":[111,143],"prefix-level":[113],"accuracy.":[115],"meantime,":[118],"also":[120,146],"network":[122],"dynamics":[123],"(e.g.,":[124],"topology":[125,136],"changes)":[126],"into":[127],"account.":[128],"Finally,":[129],"established":[131],"prototype":[132],"experiment":[133],"typical":[135],"simulations":[137],"demonstrate":[138],"not":[140],"performance,":[144],"but":[145],"owns":[147],"capability":[149],"trades":[151],"maximal":[153],"effect":[155],"minimal":[158],"cost,":[162],"is":[164],"up":[165],"to":[166,173],"more":[167],"than":[168],"90%":[169],"prefix":[170],"coverage":[171],"benefit":[172],"15%":[174],"cost":[176],"average.":[178]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
