{"id":"https://openalex.org/W2995775583","doi":"https://doi.org/10.1109/tnsm.2019.2959268","title":"Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic","display_name":"Detecting Saturation Attacks Based on Self-Similarity of OpenFlow Traffic","publication_year":2019,"publication_date":"2019-12-13","ids":{"openalex":"https://openalex.org/W2995775583","doi":"https://doi.org/10.1109/tnsm.2019.2959268","mag":"2995775583"},"language":"en","primary_location":{"id":"doi:10.1109/tnsm.2019.2959268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2019.2959268","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5080109358","display_name":"Zhiyuan Li","orcid":"https://orcid.org/0000-0002-6088-8086"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhiyuan Li","raw_affiliation_strings":["Jiangsu University, Zhenjiang, China"],"affiliations":[{"raw_affiliation_string":"Jiangsu University, Zhenjiang, China","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014231074","display_name":"Weijia Xing","orcid":null},"institutions":[{"id":"https://openalex.org/I84218800","display_name":"University of California, Davis","ror":"https://ror.org/05rrcem69","country_code":"US","type":"education","lineage":["https://openalex.org/I84218800"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Weijia Xing","raw_affiliation_strings":["University of California at Davis, Davis, USA"],"affiliations":[{"raw_affiliation_string":"University of California at Davis, Davis, USA","institution_ids":["https://openalex.org/I84218800"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000486246","display_name":"Samer Khamaiseh","orcid":"https://orcid.org/0000-0001-9339-1685"},"institutions":[{"id":"https://openalex.org/I46896759","display_name":"Midwestern State University","ror":"https://ror.org/00t30ch44","country_code":"US","type":"education","lineage":["https://openalex.org/I46896759"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Samer Khamaiseh","raw_affiliation_strings":["Midwestern State University, Wichita Falls, USA"],"affiliations":[{"raw_affiliation_string":"Midwestern State University, Wichita Falls, USA","institution_ids":["https://openalex.org/I46896759"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5080541939","display_name":"Dianxiang Xu","orcid":"https://orcid.org/0000-0003-4529-3540"},"institutions":[{"id":"https://openalex.org/I75421653","display_name":"University of Missouri\u2013Kansas City","ror":"https://ror.org/01w0d5g70","country_code":"US","type":"education","lineage":["https://openalex.org/I75421653"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dianxiang Xu","raw_affiliation_strings":["University of Missouri\u2013Kansas City, Kansas City, USA"],"affiliations":[{"raw_affiliation_string":"University of Missouri\u2013Kansas City, Kansas City, USA","institution_ids":["https://openalex.org/I75421653"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5080109358"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":4.7747,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.95549714,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"17","issue":"1","first_page":"607","last_page":"621"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.8795979022979736},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7470182180404663},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.6464043855667114},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5802010297775269},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5509566068649292},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5030245184898376},{"id":"https://openalex.org/keywords/spoofing-attack","display_name":"Spoofing attack","score":0.490894615650177},{"id":"https://openalex.org/keywords/hurst-exponent","display_name":"Hurst exponent","score":0.48146286606788635},{"id":"https://openalex.org/keywords/traffic-generation-model","display_name":"Traffic generation model","score":0.4219290614128113},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.37029701471328735},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.32643812894821167},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.1884009838104248},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.09368026256561279}],"concepts":[{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.8795979022979736},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7470182180404663},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.6464043855667114},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5802010297775269},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5509566068649292},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5030245184898376},{"id":"https://openalex.org/C167900197","wikidata":"https://www.wikidata.org/wiki/Q11081100","display_name":"Spoofing attack","level":2,"score":0.490894615650177},{"id":"https://openalex.org/C96835011","wikidata":"https://www.wikidata.org/wiki/Q1638718","display_name":"Hurst exponent","level":2,"score":0.48146286606788635},{"id":"https://openalex.org/C176715033","wikidata":"https://www.wikidata.org/wiki/Q2080768","display_name":"Traffic generation model","level":2,"score":0.4219290614128113},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.37029701471328735},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.32643812894821167},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.1884009838104248},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.09368026256561279},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2019.2959268","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnsm.2019.2959268","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W191468885","https://openalex.org/W627952783","https://openalex.org/W1506250613","https://openalex.org/W1531996150","https://openalex.org/W1988774297","https://openalex.org/W2040340473","https://openalex.org/W2067559086","https://openalex.org/W2084611853","https://openalex.org/W2085261163","https://openalex.org/W2105818147","https://openalex.org/W2115122866","https://openalex.org/W2116183119","https://openalex.org/W2136451165","https://openalex.org/W2137756376","https://openalex.org/W2147118406","https://openalex.org/W2151235465","https://openalex.org/W2153334513","https://openalex.org/W2160824842","https://openalex.org/W2166657964","https://openalex.org/W2171377901","https://openalex.org/W2469255646","https://openalex.org/W2559035142","https://openalex.org/W2566860197","https://openalex.org/W2612104483","https://openalex.org/W2753652472","https://openalex.org/W2758509082","https://openalex.org/W2762715230","https://openalex.org/W2800860906","https://openalex.org/W2906704188","https://openalex.org/W2997198836","https://openalex.org/W4243493583","https://openalex.org/W6680650911","https://openalex.org/W6684679328"],"related_works":["https://openalex.org/W4220837700","https://openalex.org/W2012852954","https://openalex.org/W4377008240","https://openalex.org/W2533666503","https://openalex.org/W1675062406","https://openalex.org/W2066879250","https://openalex.org/W2295167007","https://openalex.org/W2558363974","https://openalex.org/W2324336707","https://openalex.org/W4250919833"],"abstract_inverted_index":{"As":[0],"a":[1,38,91,156,168],"new":[2],"networking":[3],"paradigm,":[4],"Software-Defined":[5],"Networking":[6],"(SDN)":[7],"separates":[8],"data":[9,60,129],"and":[10,17,48,103,128,138,178,199,209,213,229,244,270],"control":[11,63,127],"planes":[12],"to":[13,111],"facilitate":[14],"programmable":[15],"functions":[16],"improve":[18],"the":[19,43,51,59,62,117,126,136,143,161,218,222,230,236,239,245,257,266,283],"efficiency":[20],"of":[21,46,55,93,106,119,122,163,171,181,225,265,285],"packet":[22],"delivery.":[23],"Recent":[24],"studies":[25],"have":[26,147,192,253],"shown":[27,134],"that":[28,135,278],"there":[29],"exist":[30],"various":[31,204],"security":[32],"threats":[33],"in":[34,109,196,263,288],"SDN.":[35,289],"For":[36,217,235],"example,":[37],"saturation":[39,73,94,164,259,286],"attack":[40,260],"may":[41],"disturb":[42],"normal":[44,137,152],"delivery":[45],"packets":[47],"even":[49],"make":[50],"SDN":[52,201,220],"system":[53],"out":[54],"service":[56],"by":[57,76,185],"flooding":[58],"plane,":[61,64],"or":[65],"both.":[66],"The":[67,274],"existing":[68,258],"research":[69],"has":[70,133,155],"focused":[71],"on":[72],"attacks":[74,95,165,287],"caused":[75],"SYN":[77,112],"flooding.":[78,113],"This":[79],"paper":[80],"presents":[81],"an":[82],"anomaly":[83,189],"detection":[84,226,261,284],"method,":[85],"called":[86],"SA-Detector,":[87],"for":[88,188,282],"dealing":[89],"with":[90,203,256],"family":[92],"through":[96,142],"IP":[97],"spoofing,":[98],"ICMP":[99],"flooding,":[100,102,108],"UDP":[101],"other":[104],"types":[105],"TCP":[107],"addition":[110],"SA-Detector":[114,174,255,279],"builds":[115],"upon":[116],"study":[118],"self-similarity":[120,158,179],"characteristics":[121],"OpenFlow":[123,144,153,182],"traffic":[124,140,154,214],"between":[125],"planes.":[130],"Our":[131],"work":[132],"abnormal":[139],"flows":[141],"communication":[145],"channel":[146],"different":[148],"statistical":[149,176],"properties.":[150],"Specifically,":[151],"low":[157],"degree":[159,170],"whereas":[160],"occurrences":[162],"typically":[166],"imply":[167],"higher":[169],"self-similarity.":[172],"Therefore,":[173],"exploits":[175],"results":[177,276],"degrees":[180],"traffic,":[183],"measured":[184],"Hurst":[186],"exponents,":[187],"detection.":[190],"We":[191],"evaluated":[193],"our":[194],"approach":[195],"both":[197],"physical":[198,219],"simulation":[200,237],"environments":[202],"time":[205],"intervals,":[206],"network":[207],"topologies":[208],"applications,":[210],"Internet":[211],"protocols,":[212],"generation":[215],"tools.":[216],"environment,":[221,238],"average":[223,231,240,246],"accuracy":[224,241],"is":[227,233,242,248,280],"97.68%":[228],"precision":[232,247],"94.67%.":[234],"96.54%":[243],"92.06%.":[249],"In":[250],"addition,":[251],"we":[252],"compared":[254],"methods":[262],"terms":[264],"aforementioned":[267],"performance":[268],"metrics":[269],"controller's":[271],"CPU":[272],"utilization.":[273],"experiment":[275],"indicate":[277],"effective":[281]},"counts_by_year":[{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":7},{"year":2020,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
