{"id":"https://openalex.org/W4403094519","doi":"https://doi.org/10.1109/tifs.2024.3472477","title":"rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN","display_name":"rDefender: A Lightweight and Robust Defense Against Flow Table Overflow Attacks in SDN","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4403094519","doi":"https://doi.org/10.1109/tifs.2024.3472477"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2024.3472477","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3472477","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054180209","display_name":"Dezhang Kong","orcid":"https://orcid.org/0000-0001-8522-6081"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dezhang Kong","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011791240","display_name":"Xiang Chen","orcid":"https://orcid.org/0000-0002-0249-9664"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Chen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078198240","display_name":"Chunming Wu","orcid":"https://orcid.org/0000-0001-7958-9687"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunming Wu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052739529","display_name":"Yiming Shen","orcid":"https://orcid.org/0000-0003-0227-3857"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Shen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011451620","display_name":"Zhengyan Zhou","orcid":"https://orcid.org/0000-0003-0536-3196"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengyan Zhou","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043374742","display_name":"Qiumei Cheng","orcid":"https://orcid.org/0000-0001-8972-036X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiumei Cheng","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100362330","display_name":"Xuan Liu","orcid":"https://orcid.org/0000-0002-7966-4488"},"institutions":[{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Liu","raw_affiliation_strings":["College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101665547","display_name":"Mingliang Yang","orcid":"https://orcid.org/0000-0002-6026-4740"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingliang Yang","raw_affiliation_strings":["Alibaba Cloud, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba Cloud, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027578136","display_name":"Yubing Qiu","orcid":"https://orcid.org/0000-0001-7242-2745"},"institutions":[{"id":"https://openalex.org/I45928872","display_name":"Alibaba Group (China)","ror":"https://ror.org/00k642b80","country_code":"CN","type":"company","lineage":["https://openalex.org/I45928872"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yubing Qiu","raw_affiliation_strings":["Alibaba Cloud, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Alibaba Cloud, Hangzhou, China","institution_ids":["https://openalex.org/I45928872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101708792","display_name":"Dong Zhang","orcid":"https://orcid.org/0000-0002-6379-0244"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zhang","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072011650","display_name":"Muhammad Khurram Khan","orcid":"https://orcid.org/0000-0001-6636-0533"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Muhammad Khurram Khan","raw_affiliation_strings":["Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":11,"corresponding_author_ids":["https://openalex.org/A5054180209"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":2.4277,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.89770644,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"19","issue":null,"first_page":"9436","last_page":"9451"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9957000017166138,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10917","display_name":"Smart Grid Security and Resilience","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8183058500289917},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5345959067344666},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4650014638900757},{"id":"https://openalex.org/keywords/flow","display_name":"Flow (mathematics)","score":0.42738062143325806},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.4165959060192108},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.36828190088272095},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.12364324927330017}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8183058500289917},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5345959067344666},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4650014638900757},{"id":"https://openalex.org/C38349280","wikidata":"https://www.wikidata.org/wiki/Q1434290","display_name":"Flow (mathematics)","level":2,"score":0.42738062143325806},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.4165959060192108},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.36828190088272095},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.12364324927330017},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2024.3472477","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2024.3472477","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G4493073156","display_name":null,"funder_award_id":"623B2090","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5247297094","display_name":null,"funder_award_id":"2022YFB2901305","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1531996150","https://openalex.org/W1573161722","https://openalex.org/W2036642572","https://openalex.org/W2084915558","https://openalex.org/W2118404561","https://openalex.org/W2276629685","https://openalex.org/W2514791705","https://openalex.org/W2610817200","https://openalex.org/W2746655652","https://openalex.org/W2762715230","https://openalex.org/W2762794304","https://openalex.org/W2783534159","https://openalex.org/W2789780249","https://openalex.org/W2796499819","https://openalex.org/W2808622696","https://openalex.org/W2819252821","https://openalex.org/W2884204879","https://openalex.org/W2885027817","https://openalex.org/W2998158308","https://openalex.org/W2999113954","https://openalex.org/W3006775817","https://openalex.org/W3010887667","https://openalex.org/W3095305453","https://openalex.org/W3127030798","https://openalex.org/W3127120656","https://openalex.org/W3173170122","https://openalex.org/W3185596546","https://openalex.org/W3187528790","https://openalex.org/W3192882631","https://openalex.org/W4236202168","https://openalex.org/W4290991207","https://openalex.org/W4315630320","https://openalex.org/W4320487229","https://openalex.org/W4376481072","https://openalex.org/W6607068850"],"related_works":["https://openalex.org/W4394360958","https://openalex.org/W2948670949","https://openalex.org/W4288047943","https://openalex.org/W4394193569","https://openalex.org/W1797990060","https://openalex.org/W4232484699","https://openalex.org/W2473636215","https://openalex.org/W4242025311","https://openalex.org/W2990655940","https://openalex.org/W2478535484"],"abstract_inverted_index":{"The":[0,192],"flow":[1,12,21,148,213],"table":[2,22,50,109],"is":[3,38,112],"a":[4,54,91,113,171],"critical":[5],"component":[6],"of":[7,116,119,146],"Software-Defined":[8],"Networking":[9],"(SDN).":[10],"However,":[11],"tables\u2019":[13],"limited":[14],"capacity":[15],"makes":[16],"them":[17],"highly":[18,33],"vulnerable":[19],"to":[20,27,40,94,101,126,203],"overflow":[23],"attacks":[24,185],"(FTOAs).":[25],"Due":[26],"the":[28,62,96,102,143,198],"low":[29],"attack":[30,35,120],"cost":[31],"and":[32,52,89,158,173,186,190],"flexible":[34],"forms,":[36],"it":[37,196],"hard":[39],"eradicate":[41],"FTOAs.":[42],"This":[43],"paper":[44],"addresses":[45],"three":[46],"unsolved":[47],"problems":[48],"for":[49,211],"security":[51,210],"proposes":[53],"robust":[55,159,172],"defense":[56,67,175],"accordingly.":[57],"First,":[58],"we":[59,105,135,168],"reveal":[60],"that":[61,80,107,138,195],"existing":[63,205],"defenses":[64],"with":[65],"fixed":[66],"speeds":[68],"will":[69],"cause":[70],"severe":[71],"packet":[72],"loss":[73],"when":[74],"handling":[75],"diverse":[76],"traffic.":[77],"We":[78,177],"prove":[79,137],"deleting":[81],"multiple":[82],"rules":[83,149],"can":[84,123,141],"efficiently":[85],"solve":[86],"this":[87],"problem":[88],"give":[90],"rigorous":[92],"derivation":[93],"calculate":[95],"suitable":[97],"deletion":[98,140],"number":[99],"according":[100],"environment.":[103],"Second,":[104],"illustrate":[106],"abnormal":[108],"occupancy":[110],"squeezing":[111],"constant":[114],"characteristic":[115],"FTOAs":[117],"regardless":[118],"forms.":[121],"It":[122,154],"be":[124],"used":[125],"identify":[127],"attacked":[128,152],"ports":[129],"accurately":[130],"in":[131,161],"different":[132,162],"scenarios.":[133],"Third,":[134],"mathematically":[136],"random":[139],"guarantee":[142],"continuous":[144],"decrease":[145],"malicious":[147],"after":[150],"confirming":[151],"ports.":[153],"achieves":[155,197],"fast":[156],"speed":[157],"effectiveness":[160],"environments.":[163],"Based":[164],"on":[165],"these":[166],"findings,":[167],"design":[169],"rDefender,":[170],"lightweight":[174],"prototype.":[176],"evaluate":[178],"its":[179],"effect":[180],"by":[181],"designing":[182],"diverse,":[183],"powerful":[184],"using":[187],"real-world":[188],"datasets":[189],"topology.":[191],"results":[193],"demonstrate":[194],"best":[199],"overall":[200],"performance":[201],"compared":[202],"six":[204],"mainstream":[206],"defenses,":[207],"providing":[208],"stable":[209],"switch":[212],"tables.":[214]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":2}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
