{"id":"https://openalex.org/W2612956469","doi":"https://doi.org/10.1109/nfv-sdn.2016.7919477","title":"Network-wide virtual firewall using SDN/OpenFlow","display_name":"Network-wide virtual firewall using SDN/OpenFlow","publication_year":2016,"publication_date":"2016-11-01","ids":{"openalex":"https://openalex.org/W2612956469","doi":"https://doi.org/10.1109/nfv-sdn.2016.7919477","mag":"2612956469"},"language":"en","primary_location":{"id":"doi:10.1109/nfv-sdn.2016.7919477","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn.2016.7919477","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089259830","display_name":"Jarrod Bakker","orcid":null},"institutions":[{"id":"https://openalex.org/I41156924","display_name":"Victoria University of Wellington","ror":"https://ror.org/0040r6f76","country_code":"NZ","type":"education","lineage":["https://openalex.org/I41156924"]}],"countries":["NZ"],"is_corresponding":true,"raw_author_name":"Jarrod N. Bakker","raw_affiliation_strings":["School of Engineering and Computer Science, Victoria University of Wellington, New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Computer Science, Victoria University of Wellington, New Zealand","institution_ids":["https://openalex.org/I41156924"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058515120","display_name":"Ian Welch","orcid":"https://orcid.org/0000-0002-5968-182X"},"institutions":[{"id":"https://openalex.org/I41156924","display_name":"Victoria University of Wellington","ror":"https://ror.org/0040r6f76","country_code":"NZ","type":"education","lineage":["https://openalex.org/I41156924"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Ian Welch","raw_affiliation_strings":["School of Engineering and Computer Science, Victoria University of Wellington, New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Computer Science, Victoria University of Wellington, New Zealand","institution_ids":["https://openalex.org/I41156924"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036767777","display_name":"Winston K.G. Seah","orcid":"https://orcid.org/0000-0001-7147-5167"},"institutions":[{"id":"https://openalex.org/I41156924","display_name":"Victoria University of Wellington","ror":"https://ror.org/0040r6f76","country_code":"NZ","type":"education","lineage":["https://openalex.org/I41156924"]}],"countries":["NZ"],"is_corresponding":false,"raw_author_name":"Winston K.G. Seah","raw_affiliation_strings":["School of Engineering and Computer Science, Victoria University of Wellington, New Zealand"],"affiliations":[{"raw_affiliation_string":"School of Engineering and Computer Science, Victoria University of Wellington, New Zealand","institution_ids":["https://openalex.org/I41156924"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5089259830"],"corresponding_institution_ids":["https://openalex.org/I41156924"],"apc_list":null,"apc_paid":null,"fwci":3.1849,"has_fulltext":false,"cited_by_count":21,"citation_normalized_percentile":{"value":0.9281649,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"15","issue":null,"first_page":"62","last_page":"68"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.8553663492202759},{"id":"https://openalex.org/keywords/firewall","display_name":"Firewall (physics)","score":0.8312963247299194},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7460182905197144},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6378000378608704},{"id":"https://openalex.org/keywords/application-firewall","display_name":"Application firewall","score":0.4421330690383911},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.35605955123901367},{"id":"https://openalex.org/keywords/stateful-firewall","display_name":"Stateful firewall","score":0.2394709289073944},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.07250925898551941}],"concepts":[{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.8553663492202759},{"id":"https://openalex.org/C77714075","wikidata":"https://www.wikidata.org/wiki/Q5452017","display_name":"Firewall (physics)","level":5,"score":0.8312963247299194},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7460182905197144},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6378000378608704},{"id":"https://openalex.org/C86444895","wikidata":"https://www.wikidata.org/wiki/Q451816","display_name":"Application firewall","level":4,"score":0.4421330690383911},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.35605955123901367},{"id":"https://openalex.org/C22927095","wikidata":"https://www.wikidata.org/wiki/Q1784206","display_name":"Stateful firewall","level":3,"score":0.2394709289073944},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.07250925898551941},{"id":"https://openalex.org/C74650414","wikidata":"https://www.wikidata.org/wiki/Q11397","display_name":"Classical mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C183915046","wikidata":"https://www.wikidata.org/wiki/Q1316152","display_name":"Charged black hole","level":4,"score":0.0},{"id":"https://openalex.org/C124017977","wikidata":"https://www.wikidata.org/wiki/Q11412","display_name":"Gravitation","level":2,"score":0.0},{"id":"https://openalex.org/C115304011","wikidata":"https://www.wikidata.org/wiki/Q72755","display_name":"Schwarzschild radius","level":3,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/nfv-sdn.2016.7919477","is_oa":false,"landing_page_url":"https://doi.org/10.1109/nfv-sdn.2016.7919477","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.550000011920929,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1549477237","https://openalex.org/W1807098818","https://openalex.org/W2000613596","https://openalex.org/W2040340473","https://openalex.org/W2082371893","https://openalex.org/W2120900812","https://openalex.org/W2144911386","https://openalex.org/W2147118406","https://openalex.org/W2199597691","https://openalex.org/W2243256781","https://openalex.org/W3110338837","https://openalex.org/W6638564739"],"related_works":["https://openalex.org/W4220837700","https://openalex.org/W2042688990","https://openalex.org/W2389863504","https://openalex.org/W2785784743","https://openalex.org/W2916429898","https://openalex.org/W2366805216","https://openalex.org/W2327318552","https://openalex.org/W2359956462","https://openalex.org/W2373690040","https://openalex.org/W3009477082"],"abstract_inverted_index":{"Traditional":[0],"firewalls":[1],"are":[2,29],"used":[3],"to":[4,20,40,68,88,91,101,114,118,126,132],"enforce":[5,133],"network":[6,27,43,73,106],"security":[7,51,135],"policies":[8],"at":[9],"boundaries":[10],"within":[11,25],"a":[12,46,59,72,105,111],"network.":[13,55,96],"However,":[14],"this":[15],"can":[16],"leave":[17],"hosts":[18],"vulnerable":[19],"attacks":[21],"that":[22,63,83],"originate":[23],"from":[24],"the":[26,34,42,65,95,108,116,130],"they":[28],"part":[30],"of.":[31],"We":[32,56,78],"leverage":[33],"flexibility":[35],"of":[36,75,94,129],"Software":[37],"Defined":[38],"Networking":[39],"turn":[41],"infrastructure":[44],"into":[45],"virtual":[47,61],"firewall":[48,62],"thus":[49],"improving":[50],"across":[52,71,104],"an":[53],"entire":[54],"present":[57],"ACLSwitch,":[58],"network-wide":[60],"utilises":[64],"OpenFlow":[66,76],"protocol":[67],"filter":[69],"traffic":[70],"comprised":[74],"switches.":[77],"also":[79],"define":[80],"\u201cpolicy":[81],"domains\u201d":[82],"allow":[84,127],"different":[85,92,134],"filtering":[86],"configurations":[87],"be":[89,102],"applied":[90],"switches":[93,119,131],"The":[97],"solution":[98],"allows":[99],"rules":[100,117],"distributed":[103],"without":[107],"need":[109],"for":[110],"human":[112],"operator":[113],"send":[115],"separately,":[120],"yet":[121],"it":[122],"is":[123],"flexible":[124],"enough":[125],"subsets":[128],"policies.":[136]},"counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
