{"id":"https://openalex.org/W4226334452","doi":"https://doi.org/10.1109/sds54264.2021.9732104","title":"Network Security Challenges and Countermeasures in SDN Environments","display_name":"Network Security Challenges and Countermeasures in SDN Environments","publication_year":2021,"publication_date":"2021-12-06","ids":{"openalex":"https://openalex.org/W4226334452","doi":"https://doi.org/10.1109/sds54264.2021.9732104"},"language":"en","primary_location":{"id":"doi:10.1109/sds54264.2021.9732104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sds54264.2021.9732104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 Eighth International Conference on Software Defined Systems (SDS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5049391738","display_name":"Abdelrahman Hegazy","orcid":null},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":true,"raw_author_name":"Abdelrahman Hegazy","raw_affiliation_strings":["Information and Engineering Technology, German University in Cairo,Cairo,Egypt","Information and Engineering Technology, German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Information and Engineering Technology, German University in Cairo,Cairo,Egypt","institution_ids":["https://openalex.org/I96823368"]},{"raw_affiliation_string":"Information and Engineering Technology, German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038789740","display_name":"Minar El-Aasser","orcid":"https://orcid.org/0000-0002-2499-018X"},"institutions":[{"id":"https://openalex.org/I96823368","display_name":"German University in Cairo","ror":"https://ror.org/03rjt0z37","country_code":"EG","type":"education","lineage":["https://openalex.org/I96823368"]}],"countries":["EG"],"is_corresponding":false,"raw_author_name":"Minar El-Aasser","raw_affiliation_strings":["Information and Engineering Technology, German University in Cairo,Cairo,Egypt","Information and Engineering Technology, German University in Cairo, Cairo, Egypt"],"affiliations":[{"raw_affiliation_string":"Information and Engineering Technology, German University in Cairo,Cairo,Egypt","institution_ids":["https://openalex.org/I96823368"]},{"raw_affiliation_string":"Information and Engineering Technology, German University in Cairo, Cairo, Egypt","institution_ids":["https://openalex.org/I96823368"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5049391738"],"corresponding_institution_ids":["https://openalex.org/I96823368"],"apc_list":null,"apc_paid":null,"fwci":0.764,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.74638827,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.772912859916687},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.6829530000686646},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6521040201187134},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6457754969596863},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5696686506271362},{"id":"https://openalex.org/keywords/network-access-control","display_name":"Network Access Control","score":0.4771401584148407},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4593982398509979},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.43924108147621155},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41026103496551514},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.3648959994316101},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.3560033440589905},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.24840882420539856},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.12955668568611145},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10878226161003113}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.772912859916687},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.6829530000686646},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6521040201187134},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6457754969596863},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5696686506271362},{"id":"https://openalex.org/C14982408","wikidata":"https://www.wikidata.org/wiki/Q11006334","display_name":"Network Access Control","level":4,"score":0.4771401584148407},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4593982398509979},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.43924108147621155},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41026103496551514},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3648959994316101},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.3560033440589905},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.24840882420539856},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.12955668568611145},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10878226161003113},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sds54264.2021.9732104","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sds54264.2021.9732104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 Eighth International Conference on Software Defined Systems (SDS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5699999928474426,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W1488270580","https://openalex.org/W1511123022","https://openalex.org/W2016334899","https://openalex.org/W2022904807","https://openalex.org/W2032520280","https://openalex.org/W2040340473","https://openalex.org/W2067551786","https://openalex.org/W2084915558","https://openalex.org/W2112700013","https://openalex.org/W2147118406","https://openalex.org/W2155624544","https://openalex.org/W2419665292","https://openalex.org/W2507180882","https://openalex.org/W2528154188","https://openalex.org/W2559035142","https://openalex.org/W2607283282","https://openalex.org/W2773651084","https://openalex.org/W2940292741","https://openalex.org/W2945210754","https://openalex.org/W2972272611","https://openalex.org/W3006775817","https://openalex.org/W4243609393","https://openalex.org/W4294309078","https://openalex.org/W6682894363","https://openalex.org/W6725058547"],"related_works":["https://openalex.org/W2368931217","https://openalex.org/W2379389012","https://openalex.org/W3015787821","https://openalex.org/W2744631404","https://openalex.org/W2093477862","https://openalex.org/W1519114293","https://openalex.org/W2389213063","https://openalex.org/W2378885848","https://openalex.org/W2081253120","https://openalex.org/W2382223981"],"abstract_inverted_index":{"The":[0,60,114],"internet":[1],"has":[2],"made":[3],"everything":[4],"connected":[5],"and":[6,16,34,47,57,62,70,84,94,104,110,143,155,159,177,184],"accessible":[7],"from":[8,54,77],"anywhere.":[9],"However,":[10,80],"conventional":[11],"TCP/IP":[12],"networks":[13],"are":[14,67,118,125],"complex":[15],"very":[17],"hard":[18],"to":[19,39,101,146,153],"manage.":[20],"Software-Defined":[21],"Networking":[22],"(SDN)":[23],"is":[24,75,162],"one":[25],"of":[26,64],"the":[27,55,65,71,78,81,89,171],"most":[28],"promising":[29],"networking":[30],"paradigms":[31],"in":[32,135],"current":[33],"next-generation":[35],"networks.":[36],"It":[37],"promises":[38],"change":[40],"this":[41,97,167],"situation":[42],"by":[43,128],"breaking":[44],"vertical":[45],"integration":[46],"introduce":[48],"network":[49,56,66,73,157],"programmability.":[50],"SDN":[51,150,174],"separates":[52],"control":[53],"data":[58],"plane.":[59],"intelligence":[61],"brain":[63],"logically":[68],"centralized,":[69],"underlying":[72],"infrastructure":[74],"abstracted":[76],"application.":[79],"Control":[82],"Plane":[83,86],"Data":[85],"separation":[87],"opens":[88],"door":[90],"for":[91,122,132,188],"security":[92,108,115,130,134,141,175],"challenges":[93,142,176],"threats.":[95],"In":[96,165],"paper,":[98],"we":[99],"aim":[100],"collect,":[102],"analyze":[103],"classify":[105],"all":[106,170],"major":[107,173],"threats":[109,144],"their":[111],"possible":[112,178],"solutions.":[113,179],"platforms":[116],"that":[117],"used":[119],"as":[120,139],"countermeasures":[121,161],"each":[123],"attack":[124],"described,":[126],"followed":[127],"various":[129],"approaches":[131],"network-wide":[133],"SDN.":[136,190],"As":[137],"well":[138],"classifying":[140],"according":[145],"different":[147],"fields,":[148],"an":[149],"simulation":[151],"platform":[152],"study":[154],"test":[156],"performance":[158],"attacks":[160],"also":[163],"introduced.":[164],"short,":[166],"paper":[168],"gathers":[169],"present":[172],"Furthermore,":[180],"it":[181],"studies,":[182],"classifies":[183],"highlights":[185],"future":[186],"directions":[187],"secure":[189]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
