{"id":"https://openalex.org/W3172318291","doi":"https://doi.org/10.1109/syscon48628.2021.9447143","title":"Systematic Mapping on Prevention of DDoS Attacks on Software Defined Networks","display_name":"Systematic Mapping on Prevention of DDoS Attacks on Software Defined Networks","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3172318291","doi":"https://doi.org/10.1109/syscon48628.2021.9447143","mag":"3172318291"},"language":"en","primary_location":{"id":"doi:10.1109/syscon48628.2021.9447143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5027203321","display_name":"Alfredo Menezes Vieira","orcid":"https://orcid.org/0000-0002-5946-5254"},"institutions":[{"id":"https://openalex.org/I190085865","display_name":"Universidade Federal de Sergipe","ror":"https://ror.org/028ka0n85","country_code":"BR","type":"education","lineage":["https://openalex.org/I190085865"]}],"countries":["BR"],"is_corresponding":true,"raw_author_name":"Alfredo Menezes Vieira","raw_affiliation_strings":["Federal Institute of Sergipe Federal University of Sergipe, S\u00e3o Cristov\u00e3o, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal Institute of Sergipe Federal University of Sergipe, S\u00e3o Cristov\u00e3o, Brazil","institution_ids":["https://openalex.org/I190085865"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047702689","display_name":"Rubens Matos","orcid":"https://orcid.org/0000-0002-9535-632X"},"institutions":[{"id":"https://openalex.org/I190085865","display_name":"Universidade Federal de Sergipe","ror":"https://ror.org/028ka0n85","country_code":"BR","type":"education","lineage":["https://openalex.org/I190085865"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Rubens de Souza Matos Junior","raw_affiliation_strings":["Federal Institute of Sergipe Federal University of Sergipe, Lagarto, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal Institute of Sergipe Federal University of Sergipe, Lagarto, Brazil","institution_ids":["https://openalex.org/I190085865"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109845902","display_name":"Admilson de Ribamar Lima Ribeiro","orcid":null},"institutions":[{"id":"https://openalex.org/I190085865","display_name":"Universidade Federal de Sergipe","ror":"https://ror.org/028ka0n85","country_code":"BR","type":"education","lineage":["https://openalex.org/I190085865"]}],"countries":["BR"],"is_corresponding":false,"raw_author_name":"Admilson de Ribamar Lima Ribeiro","raw_affiliation_strings":["Federal University of Sergipe UFS, S\u00e3o Cristov\u00e3o, Brazil"],"affiliations":[{"raw_affiliation_string":"Federal University of Sergipe UFS, S\u00e3o Cristov\u00e3o, Brazil","institution_ids":["https://openalex.org/I190085865"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5027203321"],"corresponding_institution_ids":["https://openalex.org/I190085865"],"apc_list":null,"apc_paid":null,"fwci":0.3056,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.58274518,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.995199978351593,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.9295998811721802},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.772154688835144},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7708433866500854},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6711426973342896},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.6067808866500854},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5726856589317322},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.5232364535331726},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.5149756073951721},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.5088334679603577},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4605265259742737},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.4599887430667877},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.43499329686164856},{"id":"https://openalex.org/keywords/network-management","display_name":"Network management","score":0.43387794494628906},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.38626641035079956},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14307203888893127}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.9295998811721802},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.772154688835144},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7708433866500854},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6711426973342896},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.6067808866500854},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5726856589317322},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.5232364535331726},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.5149756073951721},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.5088334679603577},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4605265259742737},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.4599887430667877},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.43499329686164856},{"id":"https://openalex.org/C129763632","wikidata":"https://www.wikidata.org/wiki/Q1454667","display_name":"Network management","level":2,"score":0.43387794494628906},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38626641035079956},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14307203888893127},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/syscon48628.2021.9447143","is_oa":false,"landing_page_url":"https://doi.org/10.1109/syscon48628.2021.9447143","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 IEEE International Systems Conference (SysCon)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.44999998807907104}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W4214443","https://openalex.org/W1170801354","https://openalex.org/W1483376241","https://openalex.org/W1573569338","https://openalex.org/W2168894761","https://openalex.org/W2276629685","https://openalex.org/W2278953052","https://openalex.org/W2305976078","https://openalex.org/W2490388713","https://openalex.org/W2735228015","https://openalex.org/W2744767842","https://openalex.org/W2771467037","https://openalex.org/W2889811061","https://openalex.org/W2900590901","https://openalex.org/W2911343969","https://openalex.org/W2946152575","https://openalex.org/W2956633232","https://openalex.org/W2970145645","https://openalex.org/W2971114167","https://openalex.org/W2981202059","https://openalex.org/W2990914279","https://openalex.org/W3195403305","https://openalex.org/W6684456340","https://openalex.org/W6694860121","https://openalex.org/W6767241043","https://openalex.org/W6771230760"],"related_works":["https://openalex.org/W2051935741","https://openalex.org/W1989064996","https://openalex.org/W2926903444","https://openalex.org/W2738801488","https://openalex.org/W4211055425","https://openalex.org/W85890223","https://openalex.org/W4243609393","https://openalex.org/W2783466926","https://openalex.org/W2901563743","https://openalex.org/W2560450376"],"abstract_inverted_index":{"Cyber":[0],"attacks":[1,89,113,143],"are":[2,15],"a":[3,52,65,98,120],"major":[4,99],"concern":[5],"for":[6,34,140,171],"network":[7],"administrators":[8],"as":[9,51],"the":[10,19,38,41,45,48,62,80,83,102,109,154,169,172,176,186,189,201,208],"occurrences":[11],"of":[12,40,61,82,86,111,123,175,191,204],"such":[13],"events":[14],"continuously":[16],"increasing":[17],"on":[18,114],"Internet.":[20],"Software-defined":[21],"networks":[22,193],"(SDN)":[23],"enable":[24],"many":[25],"management":[26],"applications,":[27],"but":[28],"they":[29],"may":[30],"also":[31],"become":[32],"targets":[33],"attackers.":[35],"Due":[36],"to":[37,74,101,159,181],"separation":[39],"data":[42],"plane":[43],"and":[44,129,138,184],"control":[46,60],"plane,":[47],"controller":[49,156],"appears":[50],"new":[53],"element":[54],"in":[55,68,94,144,168],"SDN":[56,155,209],"networks,":[57],"allowing":[58],"centralized":[59],"network,":[63],"becoming":[64],"strategic":[66],"target":[67],"carrying":[69],"out":[70],"an":[71,92,205],"attack.":[72],"According":[73],"reports":[75],"generated":[76],"by":[77],"security":[78,190],"labs,":[79],"frequency":[81],"distributed":[84],"denial":[85],"service":[87],"(DDoS)":[88],"has":[90],"seen":[91],"increase":[93],"recent":[95],"years,":[96],"characterizing":[97],"threat":[100],"SDN.":[103,115,145],"However,":[104],"few":[105],"research":[106,133],"papers":[107],"address":[108],"prevention":[110,164],"DDoS":[112,142,161,198],"Therefore,":[116,188],"this":[117],"work":[118],"presents":[119],"Systematic":[121],"Mapping":[122],"Literature,":[124],"aiming":[125],"at":[126],"identifying,":[127],"classifying,":[128],"thus":[130],"disseminating":[131],"current":[132],"studies":[134],"that":[135,153],"propose":[136],"techniques":[137],"methods":[139,165],"preventing":[141],"When":[146],"answering":[147],"these":[148],"questions,":[149],"it":[150],"was":[151,157],"determined":[152],"vulnerable":[158],"possible":[160],"attacks.":[162],"No":[163],"were":[166],"found":[167],"literature":[170],"first":[173],"phase":[174],"attack":[177,206],"(when":[178],"attackers":[179],"try":[180],"deceive":[182],"users":[183],"infect":[185],"host).":[187],"software-defined":[192],"still":[194],"needs":[195],"improvement":[196],"over":[197],"attacks,":[199],"despite":[200],"evident":[202],"risk":[203],"targeting":[207],"controller.":[210]},"counts_by_year":[{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
