{"id":"https://openalex.org/W2621937015","doi":"https://doi.org/10.1109/sds.2017.7939137","title":"An experimental Software Defined Security controller for Software Defined Network","display_name":"An experimental Software Defined Security controller for Software Defined Network","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2621937015","doi":"https://doi.org/10.1109/sds.2017.7939137","mag":"2621937015"},"language":"en","primary_location":{"id":"doi:10.1109/sds.2017.7939137","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sds.2017.7939137","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Fourth International Conference on Software Defined Systems (SDS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037681499","display_name":"Malek Al\u2010Zewairi","orcid":"https://orcid.org/0000-0002-6694-9193"},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":true,"raw_author_name":"Malek Al-Zewairi","raw_affiliation_strings":["Princess Sumaya University for Technology, Amman, JO"],"affiliations":[{"raw_affiliation_string":"Princess Sumaya University for Technology, Amman, JO","institution_ids":["https://openalex.org/I158749337"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036272614","display_name":"Dima Suleiman","orcid":"https://orcid.org/0000-0001-5601-4928"},"institutions":[{"id":"https://openalex.org/I114972647","display_name":"University of Jordan","ror":"https://ror.org/05k89ew48","country_code":"JO","type":"education","lineage":["https://openalex.org/I114972647"]},{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Dima Suleiman","raw_affiliation_strings":["Computer Science Department, Princess Sumaya University for Technology, Amman, Jordan","Teacher at the University of Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]},{"raw_affiliation_string":"Teacher at the University of Jordan","institution_ids":["https://openalex.org/I114972647"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088989835","display_name":"Sufyan Almajali","orcid":"https://orcid.org/0000-0001-9076-3519"},"institutions":[{"id":"https://openalex.org/I158749337","display_name":"Princess Sumaya University for Technology","ror":"https://ror.org/01jy46q10","country_code":"JO","type":"education","lineage":["https://openalex.org/I158749337"]}],"countries":["JO"],"is_corresponding":false,"raw_author_name":"Sufyan Almajali","raw_affiliation_strings":["Computer Science Department, Princess Sumaya University for Technology, Amman, Jordan"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Princess Sumaya University for Technology, Amman, Jordan","institution_ids":["https://openalex.org/I158749337"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5037681499"],"corresponding_institution_ids":["https://openalex.org/I158749337"],"apc_list":null,"apc_paid":null,"fwci":1.2432,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.82081512,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"32","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9916999936103821,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7960281372070312},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7517294883728027},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.6943042874336243},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.6930669546127319},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.6127978563308716},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.5707970261573792},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5300317406654358},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.47132447361946106},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.4381510019302368},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41431763768196106},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3855922222137451},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.24841132760047913},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.242825448513031}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7960281372070312},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7517294883728027},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.6943042874336243},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.6930669546127319},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.6127978563308716},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5707970261573792},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5300317406654358},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.47132447361946106},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.4381510019302368},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41431763768196106},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3855922222137451},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.24841132760047913},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.242825448513031},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sds.2017.7939137","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sds.2017.7939137","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 Fourth International Conference on Software Defined Systems (SDS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6200000047683716,"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W627952783","https://openalex.org/W1490597296","https://openalex.org/W1513776698","https://openalex.org/W1905251226","https://openalex.org/W1914477132","https://openalex.org/W1930856805","https://openalex.org/W1952346365","https://openalex.org/W1984564417","https://openalex.org/W2037693158","https://openalex.org/W2040340473","https://openalex.org/W2071302186","https://openalex.org/W2085521482","https://openalex.org/W2112700013","https://openalex.org/W2245908696","https://openalex.org/W2247524030","https://openalex.org/W2275015310","https://openalex.org/W2296141686","https://openalex.org/W2343336663","https://openalex.org/W2553652196"],"related_works":["https://openalex.org/W2130026698","https://openalex.org/W4313036970","https://openalex.org/W3200520605","https://openalex.org/W2978840876","https://openalex.org/W4308650767","https://openalex.org/W2487187053","https://openalex.org/W2292300552","https://openalex.org/W2310234012","https://openalex.org/W4377234862","https://openalex.org/W2520562984"],"abstract_inverted_index":{"Software":[0,64],"Defined":[1,65],"Networking":[2],"is":[3,120,132],"an":[4,93],"emerging":[5],"technology":[6],"that":[7,128],"permits":[8],"computer":[9],"network":[10,25,52],"infrastructure":[11],"to":[12,32,54,77,105,134],"be":[13,55,78],"scaled":[14],"dynamically":[15,79],"as":[16,30,71],"needed":[17],"while":[18],"enhancing":[19],"the":[20,23,39,42,46,51,61,90,101,115,129,138],"manageability":[21],"of":[22,41,63],"various":[24],"devices":[26,53],"in":[27],"heterogeneous":[28],"environment":[29],"opposed":[31],"classical":[33],"networking.":[34],"These":[35],"capabilities":[36],"emerge":[37],"from":[38,45],"separation":[40],"data":[43],"plane":[44],"control":[47],"plane;":[48],"thus,":[49],"allowing":[50],"programmatically":[56],"managed":[57,83],"and":[58,73,82,107,110,136],"controlled.":[59],"Similarly,":[60],"concept":[62],"Security":[66],"allows":[67],"security":[68,97],"solutions":[69],"such":[70],"Firewalls":[72],"Intrusion":[74],"Detection":[75],"Systems":[76],"implemented,":[80],"controlled":[81],"using":[84,122],"programmable":[85],"interfaces.":[86],"In":[87],"this":[88],"research,":[89],"authors":[91],"propose":[92],"experimental":[94],"software":[95],"defined":[96],"controller":[98,119,131],"based":[99],"on":[100,114],"Open":[102],"vSwitch":[103],"Controller":[104],"detect":[106,135],"prevent":[108,137],"IP":[109],"MAC":[111],"spoofing":[112],"attacks":[113,140],"network.":[116],"The":[117,124],"proposed":[118,130],"simulated":[121],"Mininet.":[123],"simulation":[125],"results":[126],"confirm":[127],"capable":[133],"aforementioned":[139],"with":[141],"high":[142],"precision.":[143]},"counts_by_year":[{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
