{"id":"https://openalex.org/W4311926745","doi":"https://doi.org/10.1109/sin56466.2022.9970501","title":"Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal","display_name":"Artificial Intelligence for SDN Security: Analysis, Challenges and Approach Proposal","publication_year":2022,"publication_date":"2022-11-11","ids":{"openalex":"https://openalex.org/W4311926745","doi":"https://doi.org/10.1109/sin56466.2022.9970501"},"language":"en","primary_location":{"id":"doi:10.1109/sin56466.2022.9970501","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin56466.2022.9970501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002806568","display_name":"Amina Sahbi","orcid":null},"institutions":[{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]},{"id":"https://openalex.org/I4210110695","display_name":"Universit\u00e9 Tunis Carthage","ror":"https://ror.org/01xf5pq20","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210110695"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Amina SAHBI","raw_affiliation_strings":["University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab,Tunis,Tunisia","University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149","https://openalex.org/I4210110695"]},{"raw_affiliation_string":"University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5002514441","display_name":"Faouzi Ja\u00efdi","orcid":"https://orcid.org/0000-0001-5893-5296"},"institutions":[{"id":"https://openalex.org/I4210110695","display_name":"Universit\u00e9 Tunis Carthage","ror":"https://ror.org/01xf5pq20","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210110695"]},{"id":"https://openalex.org/I179097149","display_name":"University of Carthage","ror":"https://ror.org/057x6za15","country_code":"TN","type":"education","lineage":["https://openalex.org/I179097149"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Faouzi JAIDI","raw_affiliation_strings":["University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab,Tunis,Tunisia","University of Carthage, National School of Engineers of Carthage, Tunis, Tunisia","University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab, Tunis, Tunisia"],"affiliations":[{"raw_affiliation_string":"University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab,Tunis,Tunisia","institution_ids":["https://openalex.org/I179097149","https://openalex.org/I4210110695"]},{"raw_affiliation_string":"University of Carthage, National School of Engineers of Carthage, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]},{"raw_affiliation_string":"University of Carthage, Higher School of Communications of Tunis, LR18TICO1 Digital Security Research Lab, Tunis, Tunisia","institution_ids":["https://openalex.org/I179097149"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5107395150","display_name":"Adel Bouhoula","orcid":null},"institutions":[{"id":"https://openalex.org/I53218197","display_name":"Arabian Gulf University","ror":"https://ror.org/04gd4wn47","country_code":"BH","type":"education","lineage":["https://openalex.org/I53218197"]}],"countries":["BH"],"is_corresponding":false,"raw_author_name":"Adel BOUHOULA","raw_affiliation_strings":["Arabian Gulf University,College of Graduate Studies,Department of Next-Generation Computing,Kingdom of Bahrain","Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain"],"affiliations":[{"raw_affiliation_string":"Arabian Gulf University,College of Graduate Studies,Department of Next-Generation Computing,Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]},{"raw_affiliation_string":"Department of Next-Generation Computing, College of Graduate Studies, Arabian Gulf University, Kingdom of Bahrain","institution_ids":["https://openalex.org/I53218197"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002806568"],"corresponding_institution_ids":["https://openalex.org/I179097149","https://openalex.org/I4210110695"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.63537418,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"01","last_page":"07"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8383508920669556},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.7424122095108032},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6486070156097412},{"id":"https://openalex.org/keywords/ambiguity","display_name":"Ambiguity","score":0.5254077911376953},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5244389176368713},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.49473926424980164},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.47587528824806213},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4593506157398224},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4121786653995514},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.21688640117645264}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8383508920669556},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.7424122095108032},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6486070156097412},{"id":"https://openalex.org/C2780522230","wikidata":"https://www.wikidata.org/wiki/Q1140419","display_name":"Ambiguity","level":2,"score":0.5254077911376953},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5244389176368713},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.49473926424980164},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.47587528824806213},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4593506157398224},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4121786653995514},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.21688640117645264},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/sin56466.2022.9970501","is_oa":false,"landing_page_url":"https://doi.org/10.1109/sin56466.2022.9970501","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 15th International Conference on Security of Information and Networks (SIN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.5899999737739563}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W2052570332","https://openalex.org/W2112700013","https://openalex.org/W2158051955","https://openalex.org/W2607489534","https://openalex.org/W2774583971","https://openalex.org/W2782978729","https://openalex.org/W2804647886","https://openalex.org/W2924689635","https://openalex.org/W2950540448","https://openalex.org/W2950950097","https://openalex.org/W3010220852","https://openalex.org/W3084346886","https://openalex.org/W3090510669","https://openalex.org/W3161205829","https://openalex.org/W4232533539","https://openalex.org/W4251212826"],"related_works":["https://openalex.org/W2353179089","https://openalex.org/W2770234245","https://openalex.org/W96612179","https://openalex.org/W4229499248","https://openalex.org/W2566006169","https://openalex.org/W1567818861","https://openalex.org/W2923538289","https://openalex.org/W2353125546","https://openalex.org/W2987774938","https://openalex.org/W2470643824"],"abstract_inverted_index":{"The":[0,90],"dynamic":[1,98],"state":[2],"of":[3,11,27,78,81,135],"networks":[4],"presents":[5,74],"a":[6,25,65,75,97],"challenge":[7],"for":[8,50,57,86],"the":[9,19,33,79,87,133],"deployment":[10],"distributed":[12,58],"applications":[13],"and":[14,29,35,38,48,67,84,106,138],"protocols.":[15],"Ad-hoc":[16],"schedules":[17],"in":[18,70],"updating":[20],"phase":[21],"might":[22],"lead":[23],"to":[24,95,100],"lot":[26],"ambiguity":[28],"issues.":[30,52],"By":[31],"separating":[32],"control":[34],"data":[36],"planes":[37],"centralizing":[39],"control,":[40],"Software":[41],"Defined":[42],"Networking":[43],"(SDN)":[44],"offers":[45],"novel":[46],"opportunities":[47],"remedies":[49],"these":[51],"However,":[53],"software-based":[54],"centralized":[55],"architecture":[56],"environments":[59],"introduces":[60],"significant":[61],"challenges.":[62],"Security":[63],"is":[64],"main":[66],"crucial":[68],"issue":[69],"SDN.":[71],"This":[72],"paper":[73],"deep":[76],"study":[77,92],"state-of-the-art":[80],"security":[82,104],"challenges":[83],"solutions":[85],"SDN":[88],"paradigm.":[89],"conducted":[91],"helped":[93],"us":[94],"propose":[96],"approach":[99,130],"efficiently":[101],"detect":[102],"different":[103],"violations":[105],"incidents":[107],"caused":[108],"by":[109],"network":[110,120],"updates":[111],"including":[112],"forwarding":[113,115],"loop,":[114],"black":[116],"hole,":[117],"link":[118],"congestion,":[119],"policy":[121],"violation,":[122],"etc.":[123],"Our":[124],"solution":[125],"relies":[126],"on":[127,132],"an":[128],"intelligent":[129],"based":[131],"use":[134],"Machine":[136],"Learning":[137],"Artificial":[139],"Intelligence":[140],"Algorithms.":[141]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
