{"id":"https://openalex.org/W4295832347","doi":"https://doi.org/10.1109/tnet.2022.3203561","title":"Combination Attacks and Defenses on SDN Topology Discovery","display_name":"Combination Attacks and Defenses on SDN Topology Discovery","publication_year":2022,"publication_date":"2022-09-13","ids":{"openalex":"https://openalex.org/W4295832347","doi":"https://doi.org/10.1109/tnet.2022.3203561"},"language":"en","primary_location":{"id":"doi:10.1109/tnet.2022.3203561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2022.3203561","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5054180209","display_name":"Dezhang Kong","orcid":"https://orcid.org/0000-0001-8522-6081"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Dezhang Kong","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052739529","display_name":"Yiming Shen","orcid":"https://orcid.org/0000-0003-0227-3857"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Shen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011791240","display_name":"Xiang Chen","orcid":"https://orcid.org/0000-0002-0249-9664"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Chen","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043374742","display_name":"Qiumei Cheng","orcid":"https://orcid.org/0000-0001-8972-036X"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiumei Cheng","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040307358","display_name":"Hongyan Liu","orcid":"https://orcid.org/0000-0001-7753-0294"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongyan Liu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101708792","display_name":"Dong Zhang","orcid":"https://orcid.org/0000-0002-6379-0244"},"institutions":[{"id":"https://openalex.org/I80947539","display_name":"Fuzhou University","ror":"https://ror.org/011xvna82","country_code":"CN","type":"education","lineage":["https://openalex.org/I80947539"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dong Zhang","raw_affiliation_strings":["College of Computer and Data Science, Fuzhou University, Fuzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer and Data Science, Fuzhou University, Fuzhou, China","institution_ids":["https://openalex.org/I80947539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100362330","display_name":"Xuan Liu","orcid":"https://orcid.org/0000-0002-7966-4488"},"institutions":[{"id":"https://openalex.org/I76569877","display_name":"Southeast University","ror":"https://ror.org/04ct4d772","country_code":"CN","type":"education","lineage":["https://openalex.org/I76569877"]},{"id":"https://openalex.org/I78978612","display_name":"Yangzhou University","ror":"https://ror.org/03tqb8s11","country_code":"CN","type":"education","lineage":["https://openalex.org/I78978612"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xuan Liu","raw_affiliation_strings":["College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China","School of Computer Science and Engineering, Southeast University, Nanjing, China"],"affiliations":[{"raw_affiliation_string":"College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China","institution_ids":["https://openalex.org/I78978612"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Southeast University, Nanjing, China","institution_ids":["https://openalex.org/I76569877"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109100126","display_name":"Chen Shuang-xi","orcid":null},"institutions":[{"id":"https://openalex.org/I4210106931","display_name":"Jiaxing Vocational Technical College","ror":"https://ror.org/02cydx698","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210106931"]},{"id":"https://openalex.org/I4210132079","display_name":"Hangzhou Wanxiang Polytechnic","ror":"https://ror.org/03sxnxp24","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210132079"]},{"id":"https://openalex.org/I76130692","display_name":"Zhejiang University","ror":"https://ror.org/00a2xv884","country_code":"CN","type":"education","lineage":["https://openalex.org/I76130692"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Shuangxi Chen","raw_affiliation_strings":["Jiaxing Vocational Technical College, Jiaxing, China","Jiaxing Key Laboratory of Industrial Internet, Jiaxing, China","Polytechnic Institute, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"Jiaxing Vocational Technical College, Jiaxing, China","institution_ids":["https://openalex.org/I4210106931"]},{"raw_affiliation_string":"Jiaxing Key Laboratory of Industrial Internet, Jiaxing, China","institution_ids":[]},{"raw_affiliation_string":"Polytechnic Institute, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I4210132079","https://openalex.org/I76130692"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078198240","display_name":"Chunming Wu","orcid":"https://orcid.org/0000-0001-7958-9687"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chunming Wu","raw_affiliation_strings":["College of Computer Science and Technology, Zhejiang University, Hangzhou, China"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China","institution_ids":["https://openalex.org/I168879160"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5054180209"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":3.4066,"has_fulltext":false,"cited_by_count":26,"citation_normalized_percentile":{"value":0.92687551,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"31","issue":"2","first_page":"904","last_page":"919"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7956244945526123},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6228165030479431},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5951933860778809},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5856156945228577},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.5555152893066406},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4644695818424225},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3984862267971039},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09858277440071106}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7956244945526123},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6228165030479431},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5951933860778809},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5856156945228577},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.5555152893066406},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4644695818424225},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3984862267971039},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09858277440071106},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnet.2022.3203561","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnet.2022.3203561","pdf_url":null,"source":{"id":"https://openalex.org/S62238642","display_name":"IEEE/ACM Transactions on Networking","issn_l":"1063-6692","issn":["1063-6692","1558-2566"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE/ACM Transactions on Networking","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6499999761581421,"id":"https://metadata.un.org/sdg/13","display_name":"Climate action"}],"awards":[{"id":"https://openalex.org/G2793727704","display_name":null,"funder_award_id":"2020YFB1804705","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W1984451560","https://openalex.org/W1999152634","https://openalex.org/W2067551786","https://openalex.org/W2084915558","https://openalex.org/W2085361835","https://openalex.org/W2147118406","https://openalex.org/W2240142285","https://openalex.org/W2245908696","https://openalex.org/W2484385583","https://openalex.org/W2500120503","https://openalex.org/W2505630732","https://openalex.org/W2553816634","https://openalex.org/W2561163316","https://openalex.org/W2575352857","https://openalex.org/W2587508615","https://openalex.org/W2606501539","https://openalex.org/W2612205004","https://openalex.org/W2614116486","https://openalex.org/W2754506751","https://openalex.org/W2763704363","https://openalex.org/W2767197769","https://openalex.org/W2783534159","https://openalex.org/W2785134294","https://openalex.org/W2785346526","https://openalex.org/W2790712558","https://openalex.org/W2796499819","https://openalex.org/W2810683059","https://openalex.org/W2883042941","https://openalex.org/W2886008498","https://openalex.org/W2887712777","https://openalex.org/W2890515393","https://openalex.org/W2891859757","https://openalex.org/W2897702072","https://openalex.org/W2903874277","https://openalex.org/W2965257972","https://openalex.org/W2986931599","https://openalex.org/W3002827865","https://openalex.org/W3009061343","https://openalex.org/W3011695087","https://openalex.org/W3024174819","https://openalex.org/W3108630517","https://openalex.org/W3108860110","https://openalex.org/W3152510350","https://openalex.org/W4212917135","https://openalex.org/W4230038347","https://openalex.org/W4230634801","https://openalex.org/W4236202168","https://openalex.org/W6738237072","https://openalex.org/W6743419719"],"related_works":["https://openalex.org/W2086397253","https://openalex.org/W2133122801","https://openalex.org/W600422426","https://openalex.org/W2007156430","https://openalex.org/W2170882281","https://openalex.org/W3081478936","https://openalex.org/W2785612136","https://openalex.org/W1539291615","https://openalex.org/W1988224651","https://openalex.org/W2096179639"],"abstract_inverted_index":{"The":[0],"topology":[1,30,36,68],"discovery":[2],"service":[3],"in":[4,39,103,118],"Software-Defined":[5],"Networking":[6],"(SDN)":[7],"provides":[8],"the":[9,16,25,34,65,100,152],"controller":[10],"with":[11,159],"a":[12,119,135,175],"global":[13],"view":[14],"of":[15,24,71,88],"substrate":[17],"network":[18,35,112],"topology,":[19],"allowing":[20],"for":[21],"central":[22],"management":[23],"entire":[26],"network.":[27],"Unfortunately,":[28],"emerging":[29],"attacks":[31],"can":[32,155],"poison":[33],"and":[37,73,114],"result":[38],"unforeseeable":[40],"disasters.":[41],"Although":[42],"researchers":[43],"have":[44],"made":[45],"great":[46],"efforts":[47],"to":[48,146,151],"mitigate":[49,130],"this":[50,57,131],"problem,":[51],"security":[52],"hazards":[53],"still":[54],"exist.":[55],"In":[56],"paper,":[58],"we":[59,133],"propose":[60,134],"Invisible":[61],"Assailant":[62],"Attack":[63],"(IAA),":[64],"first":[66],"combination":[67],"attack":[69,90,95,101],"capable":[70],"injecting":[72],"maintaining":[74],"fake":[75,148],"links":[76],"even":[77],"when":[78],"12":[79],"existing":[80,124],"defense":[81,144],"strategies":[82,145],"are":[83],"deployed":[84],"simultaneously.":[85],"IAA":[86,158],"consists":[87],"14":[89],"phases":[91,117],"that":[92,107,141],"apply":[93],"multiple":[94,143],"strategies.":[96],"Attackers":[97],"skillfully":[98],"disguise":[99],"traffic":[102],"each":[104],"phase":[105],"so":[106],"it":[108],"looks":[109],"like":[110],"normal":[111],"traffic,":[113],"perform":[115],"these":[116],"well-planned":[120],"sequence,":[121],"thereby":[122],"bypassing":[123],"defenses":[125],"step":[126],"by":[127],"step.":[128],"To":[129],"attack,":[132],"Route":[136],"Path":[137],"Verification":[138],"(RPV)":[139],"mechanism":[140],"orchestrates":[142],"identify":[147],"links.":[149],"According":[150],"experiments,":[153],"RPV":[154],"successfully":[156],"detect":[157],"low":[160],"overhead:":[161],"its":[162,169],"detection":[163],"completes":[164],"within":[165],"1":[166],"ms":[167],"while":[168],"per-flow":[170],"storage":[171],"consumption":[172],"is":[173],"only":[174],"few":[176],"KB.":[177]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":4}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
