{"id":"https://openalex.org/W2795660709","doi":"https://doi.org/10.1109/tdsc.2018.2822275","title":"Detecting and Mitigating Target Link-Flooding Attacks Using SDN","display_name":"Detecting and Mitigating Target Link-Flooding Attacks Using SDN","publication_year":2018,"publication_date":"2018-04-02","ids":{"openalex":"https://openalex.org/W2795660709","doi":"https://doi.org/10.1109/tdsc.2018.2822275","mag":"2795660709"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2018.2822275","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2822275","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100347410","display_name":"Juan Wang","orcid":"https://orcid.org/0000-0001-8813-7842"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juan Wang","raw_affiliation_strings":["Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0001-8813-7842","affiliations":[{"raw_affiliation_string":"Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038929593","display_name":"Ru Wen","orcid":"https://orcid.org/0000-0002-0745-4051"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ru Wen","raw_affiliation_strings":["Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0002-0745-4051","affiliations":[{"raw_affiliation_string":"Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057320518","display_name":"Jiangqi Li","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiangqi Li","raw_affiliation_strings":["Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101649813","display_name":"Fei Yan","orcid":"https://orcid.org/0000-0003-0492-3278"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fei Yan","raw_affiliation_strings":["Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":"https://orcid.org/0000-0003-0492-3278","affiliations":[{"raw_affiliation_string":"Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071895912","display_name":"Bo Zhao","orcid":"https://orcid.org/0000-0003-4307-9380"},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Zhao","raw_affiliation_strings":["Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103909029","display_name":"Fajiang Yu","orcid":null},"institutions":[{"id":"https://openalex.org/I37461747","display_name":"Wuhan University","ror":"https://ror.org/033vjfk17","country_code":"CN","type":"education","lineage":["https://openalex.org/I37461747"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fajiang Yu","raw_affiliation_strings":["Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Wuhan, China","institution_ids":["https://openalex.org/I37461747"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5100347410"],"corresponding_institution_ids":["https://openalex.org/I37461747"],"apc_list":null,"apc_paid":null,"fwci":8.7937,"has_fulltext":false,"cited_by_count":109,"citation_normalized_percentile":{"value":0.97963137,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":"16","issue":"6","first_page":"944","last_page":"956"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8452634811401367},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.7024160623550415},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6625608801841736},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6346985697746277},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.4704013764858246},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.4425725042819977},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4196159243583679},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.18175697326660156}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8452634811401367},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7024160623550415},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6625608801841736},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6346985697746277},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.4704013764858246},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.4425725042819977},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4196159243583679},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.18175697326660156},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2018.2822275","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2018.2822275","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5449677192","display_name":null,"funder_award_id":"2014CB340660","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G703678893","display_name":null,"funder_award_id":"61402342","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8418013771","display_name":null,"funder_award_id":"61772384","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":46,"referenced_works":["https://openalex.org/W163975515","https://openalex.org/W1486426806","https://openalex.org/W1587546357","https://openalex.org/W1766291720","https://openalex.org/W1829787244","https://openalex.org/W1869854851","https://openalex.org/W1882012874","https://openalex.org/W1984253071","https://openalex.org/W2020729428","https://openalex.org/W2033637032","https://openalex.org/W2074616737","https://openalex.org/W2101031060","https://openalex.org/W2111162397","https://openalex.org/W2111942706","https://openalex.org/W2118404561","https://openalex.org/W2126957850","https://openalex.org/W2139054829","https://openalex.org/W2139684699","https://openalex.org/W2144182447","https://openalex.org/W2144200194","https://openalex.org/W2147118406","https://openalex.org/W2155624544","https://openalex.org/W2159262496","https://openalex.org/W2160824842","https://openalex.org/W2365754967","https://openalex.org/W2505895234","https://openalex.org/W2517220266","https://openalex.org/W2528354449","https://openalex.org/W2567699270","https://openalex.org/W2573541888","https://openalex.org/W2798915702","https://openalex.org/W2976487595","https://openalex.org/W4285719527","https://openalex.org/W6628906117","https://openalex.org/W6637850030","https://openalex.org/W6638835209","https://openalex.org/W6639178140","https://openalex.org/W6639592347","https://openalex.org/W6676707958","https://openalex.org/W6680746742","https://openalex.org/W6682894363","https://openalex.org/W6726438902","https://openalex.org/W6727995849","https://openalex.org/W6750886310","https://openalex.org/W6768378809","https://openalex.org/W7024919624"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W1994311829","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W4213341501","https://openalex.org/W1543555101","https://openalex.org/W3195575042","https://openalex.org/W2898113880","https://openalex.org/W2793567886"],"abstract_inverted_index":{"DDoS":[0,15],"attacks":[1],"have":[2],"caused":[3,143],"very":[4,39],"serious":[5],"damage":[6],"to":[7,30,41,55,101,124,138,154],"enterprise":[8],"networks.":[9],"Recently,":[10],"a":[11,65,73,111,119,132,149],"new":[12],"kind":[13],"of":[14,93],"attack":[16,19],"called":[17,78],"link-flooding":[18],"(LFA),":[20],"has":[21],"surfaced":[22],"and":[23,32,51,71,90,104,117,167,183],"is":[24,38],"already":[25],"being":[26],"used":[27],"by":[28,144],"attackers":[29],"flood":[31],"congest":[33],"network":[34,96,181],"critical":[35,66],"links.":[36],"LFA":[37,75,112,120],"difficult":[40],"detect":[42,103,126,166],"since":[43],"adversaries":[44],"often":[45],"utilize":[46],"large-scale":[47],"legitimate":[48],"low-speed":[49],"flows":[50],"rolls":[52],"target":[53,57,113],"links":[54,141],"isolate":[56],"areas":[58],"for":[59],"launching":[60],"attacks.":[61],"To":[62],"address":[63],"such":[64,85],"security":[67],"problem,":[68],"we":[69,109,130],"design":[70,118],"implement":[72],"novel":[74],"defense":[76],"system":[77],"LFADefender":[79,163],"that":[80,162],"leverages":[81],"some":[82],"key":[83],"features,":[84],"as":[86],"programmability,":[87],"network-wide":[88],"view,":[89],"flow":[91],"traceability,":[92],"an":[94],"emerging":[95],"technology,":[97],"Software-Defined":[98],"Networking":[99],"(SDN),":[100],"effectively":[102,125],"migrate":[105],"LFA.":[106,127,145,157],"In":[107,128],"LFADefender,":[108],"propose":[110,148],"link":[114],"selection":[115],"approach":[116,153],"congestion":[121,142],"monitoring":[122],"mechanism":[123],"addition,":[129],"present":[131],"multiple":[133],"optional":[134],"paths":[135],"rerouting":[136],"method":[137],"temporarily":[139],"mitigate":[140,156,169],"We":[146],"further":[147],"malicious":[150],"traffic":[151],"blocking":[152],"radically":[155],"Our":[158],"evaluation":[159],"results":[160],"show":[161],"can":[164],"accurately":[165],"rapidly":[168],"LFA,":[170],"but":[171],"only":[172],"imposes":[173],"minimal":[174],"overhead":[175],"in":[176],"the":[177],"communication":[178],"channels":[179],"between":[180],"controllers":[182],"data":[184],"planes.":[185]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":14},{"year":2024,"cited_by_count":18},{"year":2023,"cited_by_count":20},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":20},{"year":2020,"cited_by_count":16},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
