{"id":"https://openalex.org/W2744894346","doi":"https://doi.org/10.1109/netsoft.2017.8004231","title":"Measuring the effectiveness of SDN mitigations against cyber attacks","display_name":"Measuring the effectiveness of SDN mitigations against cyber attacks","publication_year":2017,"publication_date":"2017-07-01","ids":{"openalex":"https://openalex.org/W2744894346","doi":"https://doi.org/10.1109/netsoft.2017.8004231","mag":"2744894346"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft.2017.8004231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2017.8004231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.uva.nl/ws/files/22819843/Measuring_the_effectiveness_of_SDN_mitigations_against_cyber_attacks.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010931830","display_name":"Ralph Koning","orcid":"https://orcid.org/0000-0002-3870-4455"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Ralph Koning","raw_affiliation_strings":["System and Network Engineering group (SNE), University of Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"System and Network Engineering group (SNE), University of Amsterdam, Netherlands","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067343116","display_name":"B. de Graaff","orcid":null},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ben De Graaff","raw_affiliation_strings":["System and Network Engineering group (SNE), Universiteit van Amsterdam, Amsterdam, Noord-Holland, NL"],"affiliations":[{"raw_affiliation_string":"System and Network Engineering group (SNE), Universiteit van Amsterdam, Amsterdam, Noord-Holland, NL","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027523571","display_name":"Robert Meijer","orcid":null},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Robert Meijer","raw_affiliation_strings":["System and Network Engineering group (SNE), University of Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"System and Network Engineering group (SNE), University of Amsterdam, Netherlands","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039787606","display_name":"Cees de Laat","orcid":"https://orcid.org/0009-0009-3025-2974"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cees De Laat","raw_affiliation_strings":["System and Network Engineering group (SNE), Universiteit van Amsterdam, Amsterdam, Noord-Holland, NL"],"affiliations":[{"raw_affiliation_string":"System and Network Engineering group (SNE), Universiteit van Amsterdam, Amsterdam, Noord-Holland, NL","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007029875","display_name":"Paola Grosso","orcid":"https://orcid.org/0000-0003-4600-9812"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Paola Grosso","raw_affiliation_strings":["System and Network Engineering group (SNE), University of Amsterdam, Netherlands"],"affiliations":[{"raw_affiliation_string":"System and Network Engineering group (SNE), University of Amsterdam, Netherlands","institution_ids":["https://openalex.org/I887064364"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010931830"],"corresponding_institution_ids":["https://openalex.org/I887064364"],"apc_list":null,"apc_paid":null,"fwci":0.877,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.77943059,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7294890880584717},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.7103095054626465},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6391010284423828},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.55573970079422},{"id":"https://openalex.org/keywords/network-functions-virtualization","display_name":"Network Functions Virtualization","score":0.503555953502655},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.49802184104919434},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4644394516944885},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.44177767634391785},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.420375794172287},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.38781464099884033},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1404585838317871},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.13737305998802185},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12499505281448364}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7294890880584717},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.7103095054626465},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6391010284423828},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.55573970079422},{"id":"https://openalex.org/C200789330","wikidata":"https://www.wikidata.org/wiki/Q7000834","display_name":"Network Functions Virtualization","level":3,"score":0.503555953502655},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.49802184104919434},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4644394516944885},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.44177767634391785},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.420375794172287},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.38781464099884033},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1404585838317871},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.13737305998802185},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12499505281448364}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/netsoft.2017.8004231","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft.2017.8004231","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:dare.uva.nl:publications/23e36ef8-41f7-4305-938e-2b58e20c94e8","is_oa":true,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/measuring-the-effectiveness-of-sdn-mitigations-against-cyber-attacks(23e36ef8-41f7-4305-938e-2b58e20c94e8).html","pdf_url":"https://pure.uva.nl/ws/files/22819843/Measuring_the_effectiveness_of_SDN_mitigations_against_cyber_attacks.pdf","source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Koning, R, de Graaff, B, Meijer, R, de Laat, C & Grosso, P 2017, Measuring the effectiveness of SDN mitigations against cyber attacks. in 2017 IEEE Conference on Network Softwarization : NetSoft : Softwarization sustaining a hyper-connected world: en route to 5G: July 3-7, 2017, Bologna, Italy. Piscataway, NJ, 2017 IEEE Conference on Network Softwarization, Bologna, Italy, 3/07/17. https://doi.org/10.1109/NETSOFT.2017.8004231","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:dare.uva.nl:openaire/23e36ef8-41f7-4305-938e-2b58e20c94e8","is_oa":true,"landing_page_url":"https://hdl.handle.net/11245.1/23e36ef8-41f7-4305-938e-2b58e20c94e8","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Koning, R, de Graaff, B, Meijer, R, de Laat, C & Grosso, P 2017, Measuring the effectiveness of SDN mitigations against cyber attacks. in 2017 IEEE Conference on Network Softwarization : NetSoft : Softwarization sustaining a hyper-connected world: en route to 5G: July 3-7, 2017, Bologna, Italy. Piscataway, NJ, 2017 IEEE Conference on Network Softwarization, Bologna, Italy, 3/07/17. https://doi.org/10.1109/NETSOFT.2017.8004231","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:uvapub:oai:dare.uva.nl:publications/23e36ef8-41f7-4305-938e-2b58e20c94e8","is_oa":true,"landing_page_url":"https://dare.uva.nl/personal/pure/en/publications/measuring-the-effectiveness-of-sdn-mitigations-against-cyber-attacks(23e36ef8-41f7-4305-938e-2b58e20c94e8).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2017 IEEE Conference on Network Softwarization : NetSoft: Softwarization sustaining a hyper-connected world: en route to 5G: July 3-7, 2017, Bologna, Italy","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:oai:dare.uva.nl:publications/23e36ef8-41f7-4305-938e-2b58e20c94e8","is_oa":true,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/measuring-the-effectiveness-of-sdn-mitigations-against-cyber-attacks(23e36ef8-41f7-4305-938e-2b58e20c94e8).html","pdf_url":"https://pure.uva.nl/ws/files/22819843/Measuring_the_effectiveness_of_SDN_mitigations_against_cyber_attacks.pdf","source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Koning, R, de Graaff, B, Meijer, R, de Laat, C & Grosso, P 2017, Measuring the effectiveness of SDN mitigations against cyber attacks. in 2017 IEEE Conference on Network Softwarization : NetSoft : Softwarization sustaining a hyper-connected world: en route to 5G: July 3-7, 2017, Bologna, Italy. Piscataway, NJ, 2017 IEEE Conference on Network Softwarization, Bologna, Italy, 3/07/17. https://doi.org/10.1109/NETSOFT.2017.8004231","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8948191093","display_name":null,"funder_award_id":"COMMIT","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2744894346.pdf","grobid_xml":"https://content.openalex.org/works/W2744894346.grobid-xml"},"referenced_works_count":19,"referenced_works":["https://openalex.org/W790410098","https://openalex.org/W1499966149","https://openalex.org/W1985987493","https://openalex.org/W2003688171","https://openalex.org/W2018992824","https://openalex.org/W2027650842","https://openalex.org/W2055350293","https://openalex.org/W2162969618","https://openalex.org/W2225196063","https://openalex.org/W2276629685","https://openalex.org/W2289495142","https://openalex.org/W2461121432","https://openalex.org/W2591656346","https://openalex.org/W2605977321","https://openalex.org/W2947162011","https://openalex.org/W6622754552","https://openalex.org/W6629566846","https://openalex.org/W6736520920","https://openalex.org/W7024603386"],"related_works":["https://openalex.org/W2909024109","https://openalex.org/W2596544663","https://openalex.org/W4401217719","https://openalex.org/W2615184401","https://openalex.org/W4316506456","https://openalex.org/W3148545455","https://openalex.org/W2286140015","https://openalex.org/W2461440407","https://openalex.org/W2466998217","https://openalex.org/W2309305620"],"abstract_inverted_index":{"To":[0],"address":[1],"increasing":[2],"problems":[3],"caused":[4],"by":[5,18,47],"cyber":[6],"attacks,":[7],"we":[8,54],"leverage":[9],"Software":[10],"Defined":[11],"networks":[12],"and":[13,25,59,61,70],"Network":[14,32],"Function":[15],"Virtualisation":[16],"governed":[17],"a":[19,35,52],"SARNET-agent":[20],"to":[21,38,68],"enable":[22],"autonomous":[23,85],"response":[24],"attack":[26],"mitigation.":[27],"A":[28],"Secure":[29],"Autonomous":[30],"Response":[31],"(SARNET)":[33],"uses":[34],"control":[36],"loop":[37],"constantly":[39],"assess":[40],"the":[41,45,56],"security":[42],"state":[43],"of":[44,49],"network":[46],"means":[48],"observables.":[50],"Using":[51],"prototype":[53],"introduce":[55],"metrics":[57,74],"impact":[58],"effectiveness":[60],"show":[62],"how":[63],"they":[64],"can":[65],"be":[66],"used":[67],"compare":[69],"evaluate":[71],"countermeasures.":[72],"These":[73],"become":[75],"building":[76],"blocks":[77],"for":[78],"self":[79],"learning":[80],"SARNET":[81],"which":[82],"exhibit":[83],"true":[84],"response.":[86]},"counts_by_year":[{"year":2020,"cited_by_count":2},{"year":2018,"cited_by_count":2}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
