{"id":"https://openalex.org/W4382204076","doi":"https://doi.org/10.1109/saci58269.2023.10158584","title":"Detection of Attacks in Software-Defined Networks (SDN)* : *How to conduct attacks in SDN environments","display_name":"Detection of Attacks in Software-Defined Networks (SDN)* : *How to conduct attacks in SDN environments","publication_year":2023,"publication_date":"2023-05-23","ids":{"openalex":"https://openalex.org/W4382204076","doi":"https://doi.org/10.1109/saci58269.2023.10158584"},"language":"en","primary_location":{"id":"doi:10.1109/saci58269.2023.10158584","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/saci58269.2023.10158584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071767378","display_name":"Jean Rosemond Dora","orcid":null},"institutions":[{"id":"https://openalex.org/I4210152232","display_name":"Institute of Informatics of the Slovak Academy of Sciences","ror":"https://ror.org/04jgqpc26","country_code":"SK","type":"facility","lineage":["https://openalex.org/I207624831","https://openalex.org/I4210152232"]},{"id":"https://openalex.org/I4210129017","display_name":"Institute of Political Science of the Slovak Academy of Sciences","ror":"https://ror.org/0388g9052","country_code":"SK","type":"facility","lineage":["https://openalex.org/I207624831","https://openalex.org/I4210129017"]},{"id":"https://openalex.org/I207624831","display_name":"Slovak Academy of Sciences","ror":"https://ror.org/03h7qq074","country_code":"SK","type":"funder","lineage":["https://openalex.org/I207624831"]}],"countries":["SK"],"is_corresponding":true,"raw_author_name":"Jean Rosemond Dora","raw_affiliation_strings":["Slovak Academy of Sciences (SAV),Dept. Institute of Informatics (UISAV),Bratislava,Slovakia","Dept. Institute of Informatics (UISAV), Slovak Academy of Sciences (SAV), Bratislava, Slovakia"],"affiliations":[{"raw_affiliation_string":"Slovak Academy of Sciences (SAV),Dept. Institute of Informatics (UISAV),Bratislava,Slovakia","institution_ids":["https://openalex.org/I4210129017","https://openalex.org/I207624831"]},{"raw_affiliation_string":"Dept. Institute of Informatics (UISAV), Slovak Academy of Sciences (SAV), Bratislava, Slovakia","institution_ids":["https://openalex.org/I4210152232","https://openalex.org/I207624831"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044889318","display_name":"Ladislav Hluch\u00fd","orcid":"https://orcid.org/0000-0001-5450-3808"},"institutions":[{"id":"https://openalex.org/I4210129017","display_name":"Institute of Political Science of the Slovak Academy of Sciences","ror":"https://ror.org/0388g9052","country_code":"SK","type":"facility","lineage":["https://openalex.org/I207624831","https://openalex.org/I4210129017"]},{"id":"https://openalex.org/I4210152232","display_name":"Institute of Informatics of the Slovak Academy of Sciences","ror":"https://ror.org/04jgqpc26","country_code":"SK","type":"facility","lineage":["https://openalex.org/I207624831","https://openalex.org/I4210152232"]},{"id":"https://openalex.org/I207624831","display_name":"Slovak Academy of Sciences","ror":"https://ror.org/03h7qq074","country_code":"SK","type":"funder","lineage":["https://openalex.org/I207624831"]}],"countries":["SK"],"is_corresponding":false,"raw_author_name":"Ladislav Hluchy","raw_affiliation_strings":["Slovak Academy of Sciences (SAV),Dept. Institute of Informatics (UISAV),Bratislava,Slovakia","Dept. Institute of Informatics (UISAV), Slovak Academy of Sciences (SAV), Bratislava, Slovakia"],"affiliations":[{"raw_affiliation_string":"Slovak Academy of Sciences (SAV),Dept. Institute of Informatics (UISAV),Bratislava,Slovakia","institution_ids":["https://openalex.org/I4210129017","https://openalex.org/I207624831"]},{"raw_affiliation_string":"Dept. Institute of Informatics (UISAV), Slovak Academy of Sciences (SAV), Bratislava, Slovakia","institution_ids":["https://openalex.org/I4210152232","https://openalex.org/I207624831"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5071767378"],"corresponding_institution_ids":["https://openalex.org/I207624831","https://openalex.org/I4210129017","https://openalex.org/I4210152232"],"apc_list":null,"apc_paid":null,"fwci":0.2009,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.47614938,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"000623","last_page":"000630"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.8121468424797058},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7289482951164246},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5704474449157715},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5394834280014038},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.49732187390327454},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13569167256355286}],"concepts":[{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.8121468424797058},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7289482951164246},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5704474449157715},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5394834280014038},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.49732187390327454},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13569167256355286}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/saci58269.2023.10158584","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/saci58269.2023.10158584","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE 17th International Symposium on Applied Computational Intelligence and Informatics (SACI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W2512667584","https://openalex.org/W2560750145","https://openalex.org/W2758509082","https://openalex.org/W2907394300","https://openalex.org/W3084346886","https://openalex.org/W3141086561","https://openalex.org/W3164227701","https://openalex.org/W3179651445","https://openalex.org/W3204723134","https://openalex.org/W4207079371","https://openalex.org/W4286433356","https://openalex.org/W6801677527"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"Over":[0],"decades,":[1],"the":[2,26,49,53,71,78,90,94,107],"software-defined":[3],"network":[4,28,32],"commonly":[5],"named":[6],"SDN":[7,20,54],"has":[8,37],"been":[9,38],"prioritized":[10],"by":[11,65],"many":[12],"industries":[13],"and":[14,29,56,98],"academia":[15],"over":[16],"traditional":[17],"networks.":[18],"The":[19],"properties":[21],"offer":[22,30],"better":[23,31],"security":[24,50],"of":[25,52],"managed":[27],"monitoring.":[33],"However,":[34],"its":[35,84],"popularity":[36],"drawn":[39],"drastically":[40],"to":[41,62,88],"attackers\u2019":[42],"attention.":[43],"In":[44],"this":[45],"paper,":[46],"we":[47,92,103,111],"evaluate":[48],"posture":[51],"networks":[55],"prove":[57],"that":[58],"they":[59],"are":[60],"subject":[61],"several":[63],"vulnerabilities":[64],"simulating":[66],"attacks":[67,95],"against":[68],"devices":[69],"in":[70,116],"network.":[72],"Abusing":[73],"those":[74],"weaknesses":[75],"can":[76],"jeopardize":[77],"company\u2019s":[79],"reputation":[80],"as":[81,83,110],"well":[82],"financial":[85],"situation.":[86],"Therefore,":[87],"achieve":[89],"exploitation,":[91],"simulate":[93],"using":[96],"Mininet":[97],"RYU":[99],"controller":[100],"tools.":[101],"Additionally,":[102],"briefly":[104],"talk":[105],"about":[106],"mitigation":[108],"techniques":[109],"will":[112],"deal":[113],"with":[114],"them":[115],"our":[117],"future":[118],"work.":[119]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-12-21T23:12:01.093139","created_date":"2025-10-10T00:00:00"}
