{"id":"https://openalex.org/W3203933998","doi":"https://doi.org/10.1109/spac53836.2021.9539961","title":"SDN-based Industrial Internet Security Gateway","display_name":"SDN-based Industrial Internet Security Gateway","publication_year":2021,"publication_date":"2021-06-18","ids":{"openalex":"https://openalex.org/W3203933998","doi":"https://doi.org/10.1109/spac53836.2021.9539961","mag":"3203933998"},"language":"en","primary_location":{"id":"doi:10.1109/spac53836.2021.9539961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spac53836.2021.9539961","pdf_url":null,"source":{"id":"https://openalex.org/S4306498851","display_name":"2021 International Conference on Security, Pattern Analysis, and Cybernetics\uff08SPAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Security, Pattern Analysis, and Cybernetics\uff08SPAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101772378","display_name":"Yan Song","orcid":"https://orcid.org/0000-0003-2719-2818"},"institutions":[{"id":"https://openalex.org/I118803816","display_name":"Liaoning University","ror":"https://ror.org/03xpwj629","country_code":"CN","type":"education","lineage":["https://openalex.org/I118803816"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yan Song","raw_affiliation_strings":["College of Physics, Liaoning University, ShenYang, China"],"affiliations":[{"raw_affiliation_string":"College of Physics, Liaoning University, ShenYang, China","institution_ids":["https://openalex.org/I118803816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5033291576","display_name":"Wenjing Luo","orcid":null},"institutions":[{"id":"https://openalex.org/I118803816","display_name":"Liaoning University","ror":"https://ror.org/03xpwj629","country_code":"CN","type":"education","lineage":["https://openalex.org/I118803816"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjing Luo","raw_affiliation_strings":["College of Physics, Liaoning University, ShenYang, China"],"affiliations":[{"raw_affiliation_string":"College of Physics, Liaoning University, ShenYang, China","institution_ids":["https://openalex.org/I118803816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100402458","display_name":"Jian Li","orcid":"https://orcid.org/0000-0002-0030-1423"},"institutions":[{"id":"https://openalex.org/I118803816","display_name":"Liaoning University","ror":"https://ror.org/03xpwj629","country_code":"CN","type":"education","lineage":["https://openalex.org/I118803816"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jian Li","raw_affiliation_strings":["College of Physics, Liaoning University, ShenYang, China"],"affiliations":[{"raw_affiliation_string":"College of Physics, Liaoning University, ShenYang, China","institution_ids":["https://openalex.org/I118803816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112235108","display_name":"Panfeng Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I118803816","display_name":"Liaoning University","ror":"https://ror.org/03xpwj629","country_code":"CN","type":"education","lineage":["https://openalex.org/I118803816"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Panfeng Xu","raw_affiliation_strings":["College of Physics, Liaoning University, ShenYang, China"],"affiliations":[{"raw_affiliation_string":"College of Physics, Liaoning University, ShenYang, China","institution_ids":["https://openalex.org/I118803816"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060461941","display_name":"Jianwei Wei","orcid":"https://orcid.org/0000-0002-6872-3534"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Jianwei Wei","raw_affiliation_strings":["FieldIoT Co., Ltd, ShenYang, China"],"affiliations":[{"raw_affiliation_string":"FieldIoT Co., Ltd, ShenYang, China","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101772378"],"corresponding_institution_ids":["https://openalex.org/I118803816"],"apc_list":null,"apc_paid":null,"fwci":0.924,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.64941528,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"238","last_page":"243"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7342467904090881},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6013162732124329},{"id":"https://openalex.org/keywords/industry-4.0","display_name":"Industry 4.0","score":0.5678696632385254},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.5663996338844299},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5656481385231018},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5493653416633606},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.48512300848960876},{"id":"https://openalex.org/keywords/internet-security","display_name":"Internet security","score":0.47635698318481445},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.46317747235298157},{"id":"https://openalex.org/keywords/gateway","display_name":"Gateway (web page)","score":0.4607802927494049},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4557274878025055},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.44636180996894836},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4144095182418823},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3723255395889282},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.10505235195159912}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7342467904090881},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6013162732124329},{"id":"https://openalex.org/C2777986313","wikidata":"https://www.wikidata.org/wiki/Q1661989","display_name":"Industry 4.0","level":2,"score":0.5678696632385254},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.5663996338844299},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5656481385231018},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5493653416633606},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.48512300848960876},{"id":"https://openalex.org/C22111027","wikidata":"https://www.wikidata.org/wiki/Q1070427","display_name":"Internet security","level":4,"score":0.47635698318481445},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.46317747235298157},{"id":"https://openalex.org/C2777710495","wikidata":"https://www.wikidata.org/wiki/Q5527195","display_name":"Gateway (web page)","level":2,"score":0.4607802927494049},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4557274878025055},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.44636180996894836},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4144095182418823},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3723255395889282},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.10505235195159912},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/spac53836.2021.9539961","is_oa":false,"landing_page_url":"https://doi.org/10.1109/spac53836.2021.9539961","pdf_url":null,"source":{"id":"https://openalex.org/S4306498851","display_name":"2021 International Conference on Security, Pattern Analysis, and Cybernetics\uff08SPAC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 International Conference on Security, Pattern Analysis, and Cybernetics\uff08SPAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.6299999952316284}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W199255154","https://openalex.org/W1587184606","https://openalex.org/W2101109743","https://openalex.org/W2110687935","https://openalex.org/W2165523614","https://openalex.org/W2526518335","https://openalex.org/W2560146204","https://openalex.org/W2593167772","https://openalex.org/W2885128583","https://openalex.org/W2898296916"],"related_works":["https://openalex.org/W2368931217","https://openalex.org/W2379389012","https://openalex.org/W2362217043","https://openalex.org/W2372674753","https://openalex.org/W3188450124","https://openalex.org/W2153264224","https://openalex.org/W2068842798","https://openalex.org/W2378885848","https://openalex.org/W2339586525","https://openalex.org/W2373080253"],"abstract_inverted_index":{"Industrial":[0,66],"Internet":[1,43,118,169,236],"is":[2,139,199,221,318],"widely":[3],"used":[4],"in":[5,223,255,259,323],"the":[6,10,37,42,72,83,95,101,110,116,121,127,146,152,156,160,163,167,173,179,184,195,202,208,240,244,256,264,269,273,283,286,296,311,316],"production":[7],"field.":[8],"As":[9],"openness":[11],"of":[12,39,44,71,98,115,124,130,166,175,204,211,243,253,276,285],"networks":[13,16],"increases,":[14],"industrial":[15,30,90,117,168,176,235,245,257,292,306,324],"facing":[17,86],"increasing":[18],"security":[19,59,91,99,149,154,157,164,237,241],"risks.":[20,65],"Information":[21],"and":[22,49,75,93,113,132,159,181,191,207,218,310],"communication":[23],"technologies":[24,54],"are":[25,55,170,186,249,305],"now":[26],"available":[27],"for":[28,109,239,300,320],"most":[29,73],"manufacturing.":[31],"This":[32,142,228],"industry-oriented":[33],"evolution":[34],"has":[35,68],"driven":[36],"emergence":[38],"cloud":[40],"systems,":[41],"Things":[45],"(IoT),":[46],"Big":[47],"Data,":[48],"Industry":[50,87],"4.0.":[51],"However,":[52],"new":[53],"always":[56],"accompanied":[57],"by":[58],"vulnerabilities,":[60],"which":[61],"often":[62],"expose":[63],"unpredictable":[64],"safety":[67],"become":[69],"one":[70],"essential":[74],"challenging":[76],"requirements.":[77],"In":[78,103,279],"this":[79,104,212,288],"article,":[80],"we":[81,106,267],"highlight":[82],"serious":[84],"challenges":[85],"4.0,":[88],"introduce":[89],"issues":[92],"present":[94],"current":[96,196],"awareness":[97],"within":[100],"industry.":[102],"paper,":[105,213],"propose":[107],"solutions":[108],"anomaly":[111,216,277,321],"detection":[112,217,274,322],"defense":[114],"based":[119],"on":[120,183],"demand":[122],"characteristics":[123,174],"network":[125,148,153,185,205,215,219,233,293,307],"security,":[126],"main":[128,137],"types":[129,252],"intrusions":[131],"their":[133],"vulnerability":[134],"characteristics.":[135],"The":[136,302],"work":[138],"as":[140],"follows:":[141],"paper":[143,229,289],"first":[144],"analyzes":[145],"basic":[147],"issues,":[150],"including":[151],"needs,":[155],"threats":[158,180,190],"solutions.":[161],"Secondly,":[162],"requirements":[165],"analyzed":[171],"with":[172,225],"sites.":[177],"Then,":[178],"attacks":[182,254],"analyzed,":[187],"i.e.,":[188,214],"system-related":[189],"process-related":[192],"threats;":[193],"finally,":[194],"research":[197,209],"status":[198],"introduced":[200],"from":[201],"perspective":[203],"protection,":[206],"angle":[210],"defense,":[220],"proposed":[222],"conjunction":[224],"relevant":[226],"standards.":[227],"proposes":[230],"a":[231],"software-defined":[232],"(SDN)-based":[234],"gateway":[238],"protection":[242],"Internet.":[246],"Since":[247],"there":[248],"some":[250],"known":[251],"network,":[258],"order":[260,280],"to":[261,271,281],"fully":[262],"exploit":[263],"effective":[265],"information,":[266],"combine":[268],"ExtratreesClassifier":[270],"enhance":[272],"rate":[275],"detection.":[278],"verify":[282],"effectiveness":[284],"algorithm,":[287],"simulates":[290],"an":[291],"attack,":[294],"using":[295],"acquired":[297],"training":[298],"data":[299,304],"testing.":[301],"test":[303],"traffic":[308],"datasets,":[309],"experimental":[312],"results":[313],"show":[314],"that":[315],"algorithm":[317],"suitable":[319],"networks.":[325]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
