{"id":"https://openalex.org/W2906704188","doi":"https://doi.org/10.1109/isi.2018.8587363","title":"Detecting Saturation Attacks in Software-Defined Networks","display_name":"Detecting Saturation Attacks in Software-Defined Networks","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2906704188","doi":"https://doi.org/10.1109/isi.2018.8587363","mag":"2906704188"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2018.8587363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100337930","display_name":"Zhiyuan Li","orcid":"https://orcid.org/0000-0002-1991-2603"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyuan Li","raw_affiliation_strings":["Department of Cybersecurity, Jiangsu University, Zhenjiang, Jiangsu, China"],"affiliations":[{"raw_affiliation_string":"Department of Cybersecurity, Jiangsu University, Zhenjiang, Jiangsu, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014231074","display_name":"Weijia Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weijia Xing","raw_affiliation_strings":["Department of Computer Science, University of California Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080541939","display_name":"Dianxiang Xu","orcid":"https://orcid.org/0000-0003-4529-3540"},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dianxiang Xu","raw_affiliation_strings":["Department of Computer Science, University of California Davis, Davis, CA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California Davis, Davis, CA, USA","institution_ids":["https://openalex.org/I84218800"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100337930"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":1.1072,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.81174355,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"173","issue":null,"first_page":"163","last_page":"168"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.8862115144729614},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7441763877868652},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.7413660287857056},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6628633737564087},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5796750783920288},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.5541170239448547},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5482218861579895},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.4820578992366791},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4399891495704651},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4330947697162628},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4132119119167328},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4111074209213257},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.40712761878967285},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1506393551826477},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10357555747032166},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08288490772247314}],"concepts":[{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.8862115144729614},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7441763877868652},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.7413660287857056},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6628633737564087},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5796750783920288},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.5541170239448547},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5482218861579895},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.4820578992366791},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4399891495704651},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4330947697162628},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4132119119167328},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4111074209213257},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.40712761878967285},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1506393551826477},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10357555747032166},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08288490772247314},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2018.8587363","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2018.8587363","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.41999998688697815,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W627952783","https://openalex.org/W1531996150","https://openalex.org/W2078206416","https://openalex.org/W2084611853","https://openalex.org/W2105818147","https://openalex.org/W2116183119","https://openalex.org/W2137756376","https://openalex.org/W2151235465","https://openalex.org/W2160824842","https://openalex.org/W2559035142","https://openalex.org/W2612104483","https://openalex.org/W2758509082","https://openalex.org/W2762715230","https://openalex.org/W2800860906","https://openalex.org/W6680650911"],"related_works":["https://openalex.org/W2051935741","https://openalex.org/W4211055425","https://openalex.org/W2292300552","https://openalex.org/W4243609393","https://openalex.org/W3042077637","https://openalex.org/W2738801488","https://openalex.org/W2560450376","https://openalex.org/W2901563743","https://openalex.org/W2772741848","https://openalex.org/W4293182269"],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN)":[2],"is":[3,139,145,151],"a":[4,37,78],"new":[5],"net-working":[6],"paradigm":[7],"that":[8,96,135,149],"has":[9,94],"revolutionized":[10],"network":[11,124],"architectures.":[12],"The":[13,131],"separation":[14],"of":[15,23,45,54,80,88,90,118],"data":[16,59],"and":[17,47,99,106,128,141],"control":[18,62],"planes":[19],"improves":[20],"the":[21,42,50,58,61,86,97,104,107,116,136,142],"efficiency":[22],"packet":[24],"delivery.":[25],"However,":[26],"there":[27],"exist":[28],"various":[29],"security":[30],"attacks":[31],"against":[32],"SDN":[33,51],"systems.":[34],"For":[35],"example,":[36],"saturation":[38,81,155],"attack":[39,129],"may":[40],"disturb":[41],"normal":[43,98],"delivery":[44],"packets":[46],"even":[48],"make":[49],"system":[52],"out":[53],"service":[55],"by":[56],"flooding":[57],"plane,":[60,63],"or":[64],"both.":[65],"This":[66,147],"paper":[67],"presents":[68],"an":[69],"anomaly":[70],"detection":[71],"method,":[72],"called":[73],"SA-Detector,":[74],"for":[75,153],"dealing":[76],"with":[77,120],"family":[79],"attacks.":[82,156],"SA-Detector":[83,119,150],"builds":[84],"upon":[85],"study":[87],"self-similarity":[89],"OpenFlow":[91,108],"traffic,":[92],"which":[93],"shown":[95],"abnormal":[100],"traffic":[101],"patterns":[102],"between":[103],"controller":[105],"switches":[109],"have":[110,114],"different":[111,121],"characteristics.":[112],"We":[113],"evaluated":[115],"performance":[117],"time":[122],"scales,":[123,125],"Internet":[126],"applications,":[127],"implementations.":[130],"experimental":[132],"results":[133],"show":[134],"average":[137,143],"accuracy":[138],"96.54%":[140],"precision":[144],"92.06%.":[146],"indicates":[148],"effective":[152],"detecting":[154]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
