{"id":"https://openalex.org/W2990309507","doi":"https://doi.org/10.1109/iscit.2019.8905209","title":"Effective Detection and Mitigation of SYN Flooding Attack in SDN","display_name":"Effective Detection and Mitigation of SYN Flooding Attack in SDN","publication_year":2019,"publication_date":"2019-09-01","ids":{"openalex":"https://openalex.org/W2990309507","doi":"https://doi.org/10.1109/iscit.2019.8905209","mag":"2990309507"},"language":"en","primary_location":{"id":"doi:10.1109/iscit.2019.8905209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscit.2019.8905209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 19th International Symposium on Communications and Information Technologies (ISCIT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040568605","display_name":"Nan Haymarn Oo","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130682","display_name":"Yangon University of Foreign Languages","ror":"https://ror.org/03pwq8a06","country_code":"MM","type":"education","lineage":["https://openalex.org/I4210130682"]},{"id":"https://openalex.org/I80293557","display_name":"University of Computer Studies Yangon","ror":"https://ror.org/019ad8130","country_code":"MM","type":"education","lineage":["https://openalex.org/I80293557"]}],"countries":["MM"],"is_corresponding":true,"raw_author_name":"Nan Haymarn Oo","raw_affiliation_strings":["University of Computer Studies,Faculty of Computer Systems and Technologies,Yangon,Myanmar","Faculty of Computer Systems and Technologies, University of Computer Studies, Yangon, Myanmar"],"affiliations":[{"raw_affiliation_string":"University of Computer Studies,Faculty of Computer Systems and Technologies,Yangon,Myanmar","institution_ids":["https://openalex.org/I4210130682"]},{"raw_affiliation_string":"Faculty of Computer Systems and Technologies, University of Computer Studies, Yangon, Myanmar","institution_ids":["https://openalex.org/I80293557"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5037557176","display_name":"Aung Htein Maw","orcid":null},"institutions":[{"id":"https://openalex.org/I4210130682","display_name":"Yangon University of Foreign Languages","ror":"https://ror.org/03pwq8a06","country_code":"MM","type":"education","lineage":["https://openalex.org/I4210130682"]},{"id":"https://openalex.org/I80293557","display_name":"University of Computer Studies Yangon","ror":"https://ror.org/019ad8130","country_code":"MM","type":"education","lineage":["https://openalex.org/I80293557"]}],"countries":["MM"],"is_corresponding":false,"raw_author_name":"Aung Htein Maw","raw_affiliation_strings":["University of Computer Studies,Faculty of Computer Systems and Technologies,Yangon,Myanmar","Faculty of Computer Systems and Technologies, University of Computer Studies, Yangon, Myanmar"],"affiliations":[{"raw_affiliation_string":"University of Computer Studies,Faculty of Computer Systems and Technologies,Yangon,Myanmar","institution_ids":["https://openalex.org/I4210130682"]},{"raw_affiliation_string":"Faculty of Computer Systems and Technologies, University of Computer Studies, Yangon, Myanmar","institution_ids":["https://openalex.org/I80293557"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5040568605"],"corresponding_institution_ids":["https://openalex.org/I4210130682","https://openalex.org/I80293557"],"apc_list":null,"apc_paid":null,"fwci":1.238,"has_fulltext":false,"cited_by_count":10,"citation_normalized_percentile":{"value":0.82110306,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"300","last_page":"305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7223256230354309},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6594040393829346},{"id":"https://openalex.org/keywords/ewma-chart","display_name":"EWMA chart","score":0.5517475605010986},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5143943428993225},{"id":"https://openalex.org/keywords/false-alarm","display_name":"False alarm","score":0.4441126883029938},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4384724199771881},{"id":"https://openalex.org/keywords/cusum","display_name":"CUSUM","score":0.43119704723358154},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4146437644958496},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.38416755199432373},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3737030625343323},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.37240689992904663},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2570599615573883},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16300934553146362},{"id":"https://openalex.org/keywords/control-chart","display_name":"Control chart","score":0.11349907517433167},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10761824250221252},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10246193408966064}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7223256230354309},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6594040393829346},{"id":"https://openalex.org/C74746147","wikidata":"https://www.wikidata.org/wiki/Q5324652","display_name":"EWMA chart","level":4,"score":0.5517475605010986},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5143943428993225},{"id":"https://openalex.org/C2776836416","wikidata":"https://www.wikidata.org/wiki/Q1364844","display_name":"False alarm","level":2,"score":0.4441126883029938},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4384724199771881},{"id":"https://openalex.org/C178518018","wikidata":"https://www.wikidata.org/wiki/Q1024555","display_name":"CUSUM","level":2,"score":0.43119704723358154},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4146437644958496},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.38416755199432373},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3737030625343323},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.37240689992904663},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2570599615573883},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16300934553146362},{"id":"https://openalex.org/C196985124","wikidata":"https://www.wikidata.org/wiki/Q1369242","display_name":"Control chart","level":3,"score":0.11349907517433167},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10761824250221252},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10246193408966064},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscit.2019.8905209","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscit.2019.8905209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 19th International Symposium on Communications and Information Technologies (ISCIT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1583113493","https://openalex.org/W2017524370","https://openalex.org/W2037693158","https://openalex.org/W2121904442","https://openalex.org/W2163375756","https://openalex.org/W2183397118","https://openalex.org/W2584217814","https://openalex.org/W2612104483","https://openalex.org/W2769353132","https://openalex.org/W2773285141","https://openalex.org/W2773786346","https://openalex.org/W2797922954"],"related_works":["https://openalex.org/W2068552896","https://openalex.org/W4232974465","https://openalex.org/W2029482162","https://openalex.org/W2131792041","https://openalex.org/W2062966601","https://openalex.org/W2574733092","https://openalex.org/W3194285131","https://openalex.org/W2165005603","https://openalex.org/W1990746329","https://openalex.org/W2134988752"],"abstract_inverted_index":{"SYN":[0,19,56,80],"flooding":[1,57,81],"attack":[2,23,58,200,207],"exploits":[3],"the":[4,28,33,40,43,46,84,92,96,115,141,183,189,194,206,211,219,223,229,233,237,251,254,267,270,280],"TCP's":[5],"three-way":[6],"handshake":[7],"procedure":[8],"of":[9,18,55,66,79,86,103,154,179,182,232,240,253],"connection":[10],"establishment":[11],"process":[12],"and":[13,45,52,71,77,107,246,260,278],"sends":[14],"a":[15,100,104,109,119,151,164,176,198],"large":[16],"number":[17,153,178],"packets":[20],"continuously.":[21],"This":[22,185],"might":[24,37,187],"breach":[25],"not":[26,204],"only":[27],"SDN":[29,34,62],"hosts":[30],"but":[31],"also":[32,38],"controller.":[35],"It":[36],"down":[39],"links":[41],"between":[42],"controller":[44],"switches.":[47],"Thus,":[48,163],"an":[49],"effective":[50],"detection":[51,76,255],"mitigation":[53,78],"technique":[54],"is":[59,99,118,138,167,196,213,226,248],"necessary":[60],"for":[61,75],"networks.":[63],"The":[64,123,262],"techniques":[65,88],"statistical":[67],"analysis":[68,239],"are":[69],"simple":[70,165],"easy":[72],"to":[73,121,172,217,276,284],"implement":[74],"attack.":[82],"But":[83],"effectiveness":[85],"these":[87],"strongly":[89],"depends":[90],"on":[91,140,250],"threshold":[93,98,117,125,132,212,243],"definition.":[94],"Defining":[95],"static":[97],"tedious":[101],"job":[102],"network":[105,195,234],"administrator":[106],"produces":[108],"high":[110,152],"false":[111,155,190,220,257,271],"positive":[112],"rate.":[113],"Using":[114],"dynamic":[116,124],"solution":[120],"them.":[122],"can":[126],"be":[127],"calculated":[128],"by":[129],"using":[130],"adaptive":[131,242],"algorithm":[133,137,171,244],"(ATA).":[134],"Since":[135],"this":[136,161,170],"based":[139],"Exponential":[142],"Weighted":[143],"Moving":[144],"Average":[145],"(EWMA)":[146],"formula,":[147],"it":[148,202],"will":[149],"produce":[150],"alarms":[156],"without":[157],"modifying":[158],"anything":[159],"in":[160,169,197],"algorithm.":[162],"modification":[166,186],"made":[168],"signal":[173],"alarm":[174],"after":[175],"minimum":[177],"consecutive":[180],"violations":[181],"threshold.":[184],"increase":[188],"negative":[191,221,258,272],"rate":[192,273],"when":[193],"real":[199],"because":[201],"does":[203],"mitigate":[205],"as":[208,210],"soon":[209],"violated.":[214],"In":[215],"order":[216],"reduce":[218],"rate,":[222,256,259],"existing":[224],"ATA":[225,247],"modified":[227,241],"with":[228],"baseline":[230],"traffic":[231],"infrastructure.":[235],"Finally,":[236],"comparative":[238],"(MATA)":[245],"performed":[249],"measurement":[252],"accuracy.":[261],"evaluation":[263],"results":[264],"show":[265],"that":[266],"MATA":[268],"reduces":[269],"from":[274,282],"6.15%":[275],"0.59%":[277],"raise":[279],"accuracy":[281],"94.3%":[283],"99.47%.":[285]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
