{"id":"https://openalex.org/W3049567436","doi":"https://doi.org/10.1109/netsoft48620.2020.9165424","title":"Orchestrating SDN Control Plane towards Enhanced IoT Security","display_name":"Orchestrating SDN Control Plane towards Enhanced IoT Security","publication_year":2020,"publication_date":"2020-06-01","ids":{"openalex":"https://openalex.org/W3049567436","doi":"https://doi.org/10.1109/netsoft48620.2020.9165424","mag":"3049567436"},"language":"en","primary_location":{"id":"doi:10.1109/netsoft48620.2020.9165424","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165424","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://orbit.dtu.dk/en/publications/766bede7-654c-4cf2-8377-db6d7de69dae","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5009851451","display_name":"Tooba Hasan","orcid":null},"institutions":[{"id":"https://openalex.org/I16076960","display_name":"COMSATS University Islamabad","ror":"https://ror.org/00nqqvk19","country_code":"PK","type":"education","lineage":["https://openalex.org/I16076960"]}],"countries":["PK"],"is_corresponding":true,"raw_author_name":"Tooba Hasan","raw_affiliation_strings":["COMSATS University,Department of Information Security,Pakistan","Department of Information Security, COMSATS University, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"COMSATS University,Department of Information Security,Pakistan","institution_ids":["https://openalex.org/I16076960"]},{"raw_affiliation_string":"Department of Information Security, COMSATS University, Pakistan","institution_ids":["https://openalex.org/I16076960"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035884247","display_name":"Adnan Akhunzada","orcid":"https://orcid.org/0000-0001-8370-9290"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Adnan Akhunzada","raw_affiliation_strings":["National Cyber Security Lab, NUST University,Pakistan","National Cyber Security Lab, NUST University, Pakistan"],"raw_orcid":"https://orcid.org/0000-0001-8370-9290","affiliations":[{"raw_affiliation_string":"National Cyber Security Lab, NUST University,Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"National Cyber Security Lab, NUST University, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070813911","display_name":"Thanassis Giannetsos","orcid":"https://orcid.org/0000-0003-0663-2263"},"institutions":[{"id":"https://openalex.org/I929597975","display_name":"National University of Sciences and Technology","ror":"https://ror.org/03w2j5y17","country_code":"PK","type":"education","lineage":["https://openalex.org/I929597975"]}],"countries":["PK"],"is_corresponding":false,"raw_author_name":"Thanassis Giannetsos","raw_affiliation_strings":["National Cyber Security Lab, NUST University,Pakistan","National Cyber Security Lab, NUST University, Pakistan"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Cyber Security Lab, NUST University,Pakistan","institution_ids":["https://openalex.org/I929597975"]},{"raw_affiliation_string":"National Cyber Security Lab, NUST University, Pakistan","institution_ids":["https://openalex.org/I929597975"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043125255","display_name":"Jahanzaib Malik","orcid":"https://orcid.org/0000-0001-6570-9529"},"institutions":[{"id":"https://openalex.org/I4210111817","display_name":"Denmark Technical College","ror":"https://ror.org/01scq3556","country_code":"US","type":"education","lineage":["https://openalex.org/I2802080466","https://openalex.org/I4210111817"]},{"id":"https://openalex.org/I96673099","display_name":"Technical University of Denmark","ror":"https://ror.org/04qtj9h94","country_code":"DK","type":"education","lineage":["https://openalex.org/I96673099"]}],"countries":["DK","US"],"is_corresponding":false,"raw_author_name":"Jahanzaib Malik","raw_affiliation_strings":["Technical University of Denmark,DTU Compute, Department of Applied Mathematics and Computer Science","DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Denmark,DTU Compute, Department of Applied Mathematics and Computer Science","institution_ids":["https://openalex.org/I96673099","https://openalex.org/I4210111817"]},{"raw_affiliation_string":"DTU Compute, Department of Applied Mathematics and Computer Science, Technical University of Denmark","institution_ids":["https://openalex.org/I96673099"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5009851451"],"corresponding_institution_ids":["https://openalex.org/I16076960"],"apc_list":null,"apc_paid":null,"fwci":2.9135,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.91371215,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":95,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"457","last_page":"464"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.7521007657051086},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7107373476028442},{"id":"https://openalex.org/keywords/routing-control-plane","display_name":"Routing control plane","score":0.5563534498214722},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.49692633748054504},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4857068955898285},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.44251394271850586},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.4353913366794586},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32466012239456177},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.11889734864234924}],"concepts":[{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.7521007657051086},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7107373476028442},{"id":"https://openalex.org/C145595949","wikidata":"https://www.wikidata.org/wiki/Q7371619","display_name":"Routing control plane","level":2,"score":0.5563534498214722},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.49692633748054504},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4857068955898285},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.44251394271850586},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.4353913366794586},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32466012239456177},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.11889734864234924},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/netsoft48620.2020.9165424","is_oa":false,"landing_page_url":"https://doi.org/10.1109/netsoft48620.2020.9165424","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 6th IEEE Conference on Network Softwarization (NetSoft)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:publications/766bede7-654c-4cf2-8377-db6d7de69dae","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/766bede7-654c-4cf2-8377-db6d7de69dae","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hasan , T , Akhunzada , A , Giannetsos , A &amp; Malik , J 2020 , Orchestrating SDN Control Plane towards Enhanced IoT Security . in Proceedings of 2020 IEEE Conference on Network Softwarization . IEEE , pp. 457-64 , 6th IEEE International Conference on Network Softwarization , 29/06/2020 . https://doi.org/10.1109/NetSoft48620.2020.9165424","raw_type":"contributionToPeriodical"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:publications/766bede7-654c-4cf2-8377-db6d7de69dae","is_oa":true,"landing_page_url":"https://orbit.dtu.dk/en/publications/766bede7-654c-4cf2-8377-db6d7de69dae","pdf_url":null,"source":{"id":"https://openalex.org/S4306400705","display_name":"Technical University of Denmark, DTU Orbit (Technical University of Denmark, DTU)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I96673099","host_organization_name":"Technical University of Denmark","host_organization_lineage":["https://openalex.org/I96673099"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Hasan , T , Akhunzada , A , Giannetsos , A &amp; Malik , J 2020 , Orchestrating SDN Control Plane towards Enhanced IoT Security . in Proceedings of 2020 IEEE Conference on Network Softwarization . IEEE , pp. 457-64 , 6th IEEE International Conference on Network Softwarization , 29/06/2020 . https://doi.org/10.1109/NetSoft48620.2020.9165424","raw_type":"contributionToPeriodical"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9","score":0.6299999952316284}],"awards":[],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":42,"referenced_works":["https://openalex.org/W1491842932","https://openalex.org/W1660289459","https://openalex.org/W1992713826","https://openalex.org/W2016380441","https://openalex.org/W2038705219","https://openalex.org/W2064675550","https://openalex.org/W2070352186","https://openalex.org/W2085361835","https://openalex.org/W2108177209","https://openalex.org/W2119146220","https://openalex.org/W2151940804","https://openalex.org/W2183926967","https://openalex.org/W2184188583","https://openalex.org/W2346107284","https://openalex.org/W2528827134","https://openalex.org/W2592796207","https://openalex.org/W2613685055","https://openalex.org/W2620661538","https://openalex.org/W2734423986","https://openalex.org/W2736090641","https://openalex.org/W2736110559","https://openalex.org/W2752560646","https://openalex.org/W2771817079","https://openalex.org/W2776627621","https://openalex.org/W2787296320","https://openalex.org/W2789786404","https://openalex.org/W2799758613","https://openalex.org/W2801118360","https://openalex.org/W2883690386","https://openalex.org/W2891388911","https://openalex.org/W2892583370","https://openalex.org/W2902436748","https://openalex.org/W2902711202","https://openalex.org/W2919115771","https://openalex.org/W2964027441","https://openalex.org/W2965714291","https://openalex.org/W2980686091","https://openalex.org/W2981446616","https://openalex.org/W3122864121","https://openalex.org/W4396952261","https://openalex.org/W6686207219","https://openalex.org/W6705215092"],"related_works":["https://openalex.org/W2073926975","https://openalex.org/W4214777079","https://openalex.org/W3093659890","https://openalex.org/W2606027679","https://openalex.org/W3036543234","https://openalex.org/W2953270859","https://openalex.org/W4211055425","https://openalex.org/W4243609393","https://openalex.org/W1972849324","https://openalex.org/W2901709787"],"abstract_inverted_index":{"The":[0,198],"Internet":[1],"of":[2,22,35,63,77,93,121,166,173,183,207,259],"Things":[3],"(IoT)":[4],"is":[5,28,52,158],"rapidly":[6],"evolving,":[7],"while":[8],"introducing":[9],"several":[10],"new":[11,164],"challenges":[12],"regarding":[13],"security,":[14],"resilience":[15],"and":[16,48,60,73,80,242,244],"operational":[17,181],"assurance.":[18],"In":[19,126],"the":[20,33,58,91,94,100,103,108,122,171,180,208,257],"face":[21],"an":[23,54,131,223],"increasing":[24],"attack":[25],"landscape,":[26],"it":[27],"necessary":[29],"to":[30,38,90,110,118,152,248],"cater":[31],"for":[32,191],"provision":[34,172],"efficient":[36,195],"mechanisms":[37,168],"collectively":[39],"detect":[40],"sophisticated":[41],"malware":[42],"resulting":[43],"in":[44],"undesirable":[45],"(run-time)":[46],"device":[47],"network":[49,97],"modifications.":[50],"This":[51],"not":[53,255],"easy":[55],"task":[56],"considering":[57],"dynamic":[59],"heterogeneous":[61],"nature":[62],"IoT":[64,83,96,123,155],"environments;":[65],"i.e.,":[66],"different":[67],"operating":[68],"systems,":[69],"varied":[70],"connected":[71],"networks":[72],"a":[74,146,159,163,192],"wide":[75],"gamut":[76],"underlying":[78],"protocols":[79],"devices.":[81],"Malicious":[82],"nodes":[84],"or":[85],"gateways":[86],"can":[87],"potentially":[88],"lead":[89],"compromise":[92],"whole":[95],"infrastructure.":[98],"On":[99],"other":[101],"hand,":[102],"SDN":[104],"control":[105,133],"plane":[106,134],"has":[107,201],"capability":[109],"be":[111],"orchestrated":[112],"towards":[113,162],"providing":[114],"enhanced":[115],"security":[116,167,196,253],"services":[117],"all":[119],"layers":[120],"networking":[124],"stack.":[125],"this":[127],"paper,":[128],"we":[129,238],"propose":[130],"SDN-enabled":[132],"based":[135,150],"orchestration":[136],"that":[137,169,252],"leverages":[138],"emerging":[139],"Long":[140],"Short-Term":[141],"Memory":[142],"(LSTM)":[143],"classification":[144],"models;":[145],"Deep":[147],"Learning":[148],"(DL)":[149],"architecture":[151],"combat":[153],"malicious":[154],"nodes.":[156],"It":[157],"first":[160],"step":[161],"line":[165],"enables":[170],"scalable":[174],"AI-based":[175],"intrusion":[176],"detection":[177,225],"focusing":[178],"on":[179,235],"assurance":[182],"only":[184],"those":[185],"specific,":[186],"critical":[187],"infrastructure":[188],"components,thus,":[189],"allowing":[190],"much":[193],"more":[194],"solution.":[197],"proposed":[199],"mechanism":[200],"been":[202],"evaluated":[203],"with":[204],"current":[205],"state":[206],"art":[209],"datasets":[210],"(i.e.,":[211,227],"N_BaIoT":[212],"2018)":[213],"using":[214],"standard":[215],"performance":[216],"evaluation":[217],"metrics.":[218],"Our":[219],"preliminary":[220],"results":[221],"show":[222],"outstanding":[224],"accuracy":[226],"99.9%)":[228],"which":[229],"significantly":[230],"outperforms":[231],"state-of-the-art":[232],"approaches.":[233],"Based":[234],"our":[236],"findings,":[237],"posit":[239],"open":[240],"issues":[241],"challenges,":[243],"discuss":[245],"possible":[246],"ways":[247],"address":[249],"them,":[250],"so":[251],"does":[254],"hinder":[256],"deployment":[258],"intelligent":[260],"IoT-based":[261],"computing":[262],"systems.":[263]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
