{"id":"https://openalex.org/W4400233896","doi":"https://doi.org/10.1109/noms59830.2024.10575461","title":"Securing P4-SDN Data Plane against Flow Table Modification Attack","display_name":"Securing P4-SDN Data Plane against Flow Table Modification Attack","publication_year":2024,"publication_date":"2024-05-06","ids":{"openalex":"https://openalex.org/W4400233896","doi":"https://doi.org/10.1109/noms59830.2024.10575461"},"language":"en","primary_location":{"id":"doi:10.1109/noms59830.2024.10575461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms59830.2024.10575461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.1109/NOMS59830.2024.10575461","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5099842853","display_name":"Buchammagari Avinash Reddy","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Buchammagari Avinash Reddy","raw_affiliation_strings":["HIT Naya,Department of Data Science &#x0026; Artificial Intelligence,Raipur,India"],"affiliations":[{"raw_affiliation_string":"HIT Naya,Department of Data Science &#x0026; Artificial Intelligence,Raipur,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049724493","display_name":"Kshira Sagar Sahoo","orcid":"https://orcid.org/0000-0002-6435-5738"},"institutions":[{"id":"https://openalex.org/I90267481","display_name":"Ume\u00e5 University","ror":"https://ror.org/05kb8h459","country_code":"SE","type":"education","lineage":["https://openalex.org/I90267481"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Kshira Sagar Sahoo","raw_affiliation_strings":["Ume&#x00E5; University,Department of Computing Science,Ume&#x00E5;,Sweden,SE-901 87"],"affiliations":[{"raw_affiliation_string":"Ume&#x00E5; University,Department of Computing Science,Ume&#x00E5;,Sweden,SE-901 87","institution_ids":["https://openalex.org/I90267481"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044933320","display_name":"Monowar Bhuyan","orcid":"https://orcid.org/0000-0002-9842-7840"},"institutions":[{"id":"https://openalex.org/I90267481","display_name":"Ume\u00e5 University","ror":"https://ror.org/05kb8h459","country_code":"SE","type":"education","lineage":["https://openalex.org/I90267481"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Monowar Bhuyan","raw_affiliation_strings":["Ume&#x00E5; University,Department of Computing Science,Ume&#x00E5;,Sweden,SE-901 87"],"affiliations":[{"raw_affiliation_string":"Ume&#x00E5; University,Department of Computing Science,Ume&#x00E5;,Sweden,SE-901 87","institution_ids":["https://openalex.org/I90267481"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5099842853"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":2.1979,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88222977,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.978600025177002,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6772094964981079},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.6312904357910156},{"id":"https://openalex.org/keywords/flow","display_name":"Flow (mathematics)","score":0.4925127923488617},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3528450131416321},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.14540916681289673},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.0950411856174469},{"id":"https://openalex.org/keywords/mechanics","display_name":"Mechanics","score":0.061346739530563354}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6772094964981079},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.6312904357910156},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.4925127923488617},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3528450131416321},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.14540916681289673},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0950411856174469},{"id":"https://openalex.org/C57879066","wikidata":"https://www.wikidata.org/wiki/Q41217","display_name":"Mechanics","level":1,"score":0.061346739530563354}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/noms59830.2024.10575461","is_oa":false,"landing_page_url":"https://doi.org/10.1109/noms59830.2024.10575461","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"NOMS 2024-2024 IEEE Network Operations and Management Symposium","raw_type":"proceedings-article"},{"id":"pmh:oai:zenodo.org:17972195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/NOMS59830.2024.10575461","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"}],"best_oa_location":{"id":"pmh:oai:zenodo.org:17972195","is_oa":true,"landing_page_url":"https://doi.org/10.1109/NOMS59830.2024.10575461","pdf_url":null,"source":{"id":"https://openalex.org/S4306400562","display_name":"Zenodo (CERN European Organization for Nuclear Research)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I67311998","host_organization_name":"European Organization for Nuclear Research","host_organization_lineage":["https://openalex.org/I67311998"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W2137793678","https://openalex.org/W2471733240","https://openalex.org/W2514791705","https://openalex.org/W2758509082","https://openalex.org/W2792385196","https://openalex.org/W2890090275","https://openalex.org/W2908633404","https://openalex.org/W2986593859","https://openalex.org/W3010541662","https://openalex.org/W3103015763","https://openalex.org/W3125704518","https://openalex.org/W3127120656","https://openalex.org/W4205963482","https://openalex.org/W4281680095","https://openalex.org/W4292721742","https://openalex.org/W4293182269","https://openalex.org/W4315630320","https://openalex.org/W4381734413"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4394360958","https://openalex.org/W4396696052","https://openalex.org/W2382290278"],"abstract_inverted_index":{"Security":[0],"in":[1,25,95],"Software":[2],"Defined":[3],"Network":[4],"(SDN)":[5],"architecture":[6],"is":[7,46],"becoming":[8],"the":[9,26,50,54,58,71,80],"most":[10],"substantial":[11],"challenge.":[12],"This":[13],"paper":[14],"introduces":[15],"a":[16,40,62,85,96],"novel":[17],"threat":[18],"model":[19],"focused":[20],"on":[21],"flow":[22,37],"table":[23],"modification":[24],"P4-programmable":[27],"SDN":[28],"data":[29],"plane,":[30],"outlining":[31],"an":[32],"attacker\u2019s":[33],"stochastic":[34],"manipulation":[35],"of":[36,73,79],"rules":[38],"from":[39],"compromised":[41],"switch.":[42,101],"A":[43],"detection":[44],"framework":[45],"proposed":[47,68],"to":[48,69],"identify":[49,70],"malicious":[51],"switch":[52],"within":[53],"network":[55],"by":[56,89],"utilizing":[57],"thrift":[59],"port.":[60],"Moreover,":[61],"fuzzy-rule-based":[63],"mitigation":[64],"strategy":[65],"has":[66],"been":[67],"severity":[72],"attacks.":[74],"The":[75],"feasibility":[76],"and":[77,99],"effectiveness":[78],"methodology":[81],"are":[82],"evaluated":[83],"using":[84],"developed":[86],"testbed":[87],"setup":[88],"employing":[90],"Facebook":[91],"datacenter":[92],"fabric":[93],"topology":[94],"Mininet":[97],"emulator":[98],"BMv2":[100]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
