{"id":"https://openalex.org/W2514791705","doi":"https://doi.org/10.1109/tsc.2016.2602861","title":"Defending Against Flow Table Overloading Attack in Software-Defined Networks","display_name":"Defending Against Flow Table Overloading Attack in Software-Defined Networks","publication_year":2016,"publication_date":"2016-08-25","ids":{"openalex":"https://openalex.org/W2514791705","doi":"https://doi.org/10.1109/tsc.2016.2602861","mag":"2514791705"},"language":"en","primary_location":{"id":"doi:10.1109/tsc.2016.2602861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2016.2602861","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://figshare.com/articles/journal_contribution/Defending_against_flow_table_overloading_attack_in_software-defined_networks/20760298","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5076311357","display_name":"Bin Yuan","orcid":"https://orcid.org/0000-0002-5365-904X"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bin Yuan","raw_affiliation_strings":["Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074676946","display_name":"Deqing Zou","orcid":"https://orcid.org/0000-0001-8534-5048"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Deqing Zou","raw_affiliation_strings":["Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China"],"affiliations":[{"raw_affiliation_string":"Shenzhen Huazhong University of Science and Technology Research Institute, Shenzhen, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005228053","display_name":"Shui Yu","orcid":"https://orcid.org/0000-0003-4485-6743"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Shui Yu","raw_affiliation_strings":["School of IT, Deakin University, Melbourne, Vic., Australia"],"affiliations":[{"raw_affiliation_string":"School of IT, Deakin University, Melbourne, Vic., Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022262922","display_name":"Hai Jin","orcid":"https://orcid.org/0000-0002-3934-7605"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hai Jin","raw_affiliation_strings":["Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103053061","display_name":"Weizhong Qiang","orcid":"https://orcid.org/0000-0003-4390-3819"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Weizhong Qiang","raw_affiliation_strings":["Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050167685","display_name":"Jinan Shen","orcid":"https://orcid.org/0000-0001-6222-4278"},"institutions":[{"id":"https://openalex.org/I47720641","display_name":"Huazhong University of Science and Technology","ror":"https://ror.org/00p991c53","country_code":"CN","type":"education","lineage":["https://openalex.org/I47720641"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jinan Shen","raw_affiliation_strings":["Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"Cluster and Grid Computing Lab, Huazhong University of Science and Technology, Wuhan, China","institution_ids":["https://openalex.org/I47720641"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5076311357"],"corresponding_institution_ids":["https://openalex.org/I47720641"],"apc_list":null,"apc_paid":null,"fwci":6.2017,"has_fulltext":false,"cited_by_count":98,"citation_normalized_percentile":{"value":0.96681573,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":"12","issue":"2","first_page":"231","last_page":"246"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.86301589012146},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.707086980342865},{"id":"https://openalex.org/keywords/table","display_name":"Table (database)","score":0.6346992254257202},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.6328456401824951},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5743178129196167},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5321217179298401},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5010828971862793},{"id":"https://openalex.org/keywords/quality-of-service","display_name":"Quality of service","score":0.4732173979282379},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4292522668838501},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.42466968297958374},{"id":"https://openalex.org/keywords/distributed-hash-table","display_name":"Distributed hash table","score":0.41467776894569397},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3797556757926941},{"id":"https://openalex.org/keywords/peer-to-peer","display_name":"Peer-to-peer","score":0.17659184336662292},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.14195775985717773},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1062365174293518}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.86301589012146},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.707086980342865},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.6346992254257202},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.6328456401824951},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5743178129196167},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5321217179298401},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5010828971862793},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.4732173979282379},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4292522668838501},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.42466968297958374},{"id":"https://openalex.org/C2780224649","wikidata":"https://www.wikidata.org/wiki/Q863506","display_name":"Distributed hash table","level":3,"score":0.41467776894569397},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3797556757926941},{"id":"https://openalex.org/C534932454","wikidata":"https://www.wikidata.org/wiki/Q161410","display_name":"Peer-to-peer","level":2,"score":0.17659184336662292},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.14195775985717773},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1062365174293518},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1109/tsc.2016.2602861","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tsc.2016.2602861","pdf_url":null,"source":{"id":"https://openalex.org/S204223317","display_name":"IEEE Transactions on Services Computing","issn_l":"1939-1374","issn":["1939-1374","2372-0204"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Services Computing","raw_type":"journal-article"},{"id":"pmh:oai:dro.deakin.edu.au:DU:30121169","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306401102","display_name":"Own your potential (DEAKIN)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149704539","host_organization_name":"Deakin University","host_organization_lineage":["https://openalex.org/I149704539"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"},{"id":"pmh:oai:figshare.com:article/20760298","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Defending_against_flow_table_overloading_attack_in_software-defined_networks/20760298","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},{"id":"pmh:oai:opus.lib.uts.edu.au:10453/135059","is_oa":false,"landing_page_url":"http://hdl.handle.net/10453/135059","pdf_url":null,"source":{"id":"https://openalex.org/S4306401357","display_name":"UTS ePRESS (University of Technology Sydney)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114017466","host_organization_name":"University of Technology Sydney","host_organization_lineage":["https://openalex.org/I114017466"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/20760298","is_oa":true,"landing_page_url":"https://figshare.com/articles/journal_contribution/Defending_against_flow_table_overloading_attack_in_software-defined_networks/20760298","pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Text"},"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/17","display_name":"Partnerships for the goals"}],"awards":[{"id":"https://openalex.org/G597245083","display_name":null,"funder_award_id":"JCYJ20170413114215614","funder_id":"https://openalex.org/F4320329791","funder_display_name":"Shenzhen Fundamental Research Program"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320329791","display_name":"Shenzhen Fundamental Research Program","ror":null},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":62,"referenced_works":["https://openalex.org/W80075259","https://openalex.org/W1498592591","https://openalex.org/W1520068592","https://openalex.org/W1875112053","https://openalex.org/W1966047661","https://openalex.org/W1971246165","https://openalex.org/W1976969221","https://openalex.org/W1978502884","https://openalex.org/W1982219281","https://openalex.org/W1988065808","https://openalex.org/W1988774297","https://openalex.org/W2000042664","https://openalex.org/W2001065285","https://openalex.org/W2001968297","https://openalex.org/W2009254979","https://openalex.org/W2019091405","https://openalex.org/W2026356331","https://openalex.org/W2040340473","https://openalex.org/W2040931387","https://openalex.org/W2049107478","https://openalex.org/W2059670140","https://openalex.org/W2064266822","https://openalex.org/W2067551786","https://openalex.org/W2074562205","https://openalex.org/W2081357650","https://openalex.org/W2089200871","https://openalex.org/W2101871381","https://openalex.org/W2104692292","https://openalex.org/W2106863923","https://openalex.org/W2109224931","https://openalex.org/W2110722699","https://openalex.org/W2115546448","https://openalex.org/W2119120810","https://openalex.org/W2122695394","https://openalex.org/W2125513999","https://openalex.org/W2127273221","https://openalex.org/W2141434658","https://openalex.org/W2142480021","https://openalex.org/W2147118406","https://openalex.org/W2154350082","https://openalex.org/W2160824842","https://openalex.org/W2163375756","https://openalex.org/W2164740236","https://openalex.org/W2168595508","https://openalex.org/W2170810185","https://openalex.org/W2193422108","https://openalex.org/W2599139426","https://openalex.org/W2950627632","https://openalex.org/W2997134027","https://openalex.org/W3103362336","https://openalex.org/W3105498866","https://openalex.org/W3161886301","https://openalex.org/W3162070257","https://openalex.org/W4211083643","https://openalex.org/W4233458882","https://openalex.org/W4238452917","https://openalex.org/W4299434068","https://openalex.org/W6603262759","https://openalex.org/W6630999382","https://openalex.org/W6678935822","https://openalex.org/W6681162792","https://openalex.org/W6732651503"],"related_works":["https://openalex.org/W2035376224","https://openalex.org/W4220837700","https://openalex.org/W137677872","https://openalex.org/W2058223283","https://openalex.org/W2012852954","https://openalex.org/W4377008240","https://openalex.org/W1675062406","https://openalex.org/W2066879250","https://openalex.org/W2295167007","https://openalex.org/W2558363974"],"abstract_inverted_index":{"The":[0],"Software-Defined":[1],"Network":[2],"(SDN)":[3],"is":[4,42],"a":[5,19,61,66,75,86,93,120,128,139],"new":[6,20],"and":[7,52,137,168],"promising":[8],"network":[9],"architecture.":[10],"At":[11],"the":[12,36,50,103,110,124,134,143,155,161,182],"same":[13],"time,":[14],"SDN":[15,112,185],"will":[16],"surely":[17],"become":[18],"target":[21],"of":[22,38,55,109,123,184],"cyber":[23],"attackers.":[24],"In":[25],"this":[26],"paper,":[27],"we":[28,91,152],"point":[29],"out":[30],"one":[31],"critical":[32],"vulnerability":[33],"in":[34,89,145],"SDNs,":[35],"size":[37],"flow":[39,62,76,106,162],"table,":[40],"which":[41,69,101],"most":[43],"likely":[44],"to":[45,49,114,132],"be":[46,71],"attacked.":[47],"Due":[48],"expensive":[51],"power-hungry":[53],"features":[54],"Ternary":[56],"Content":[57],"Addressable":[58],"Memory":[59],"(TCAM),":[60],"table":[63,77,107,163],"usually":[64],"has":[65],"limited":[67],"size,":[68],"can":[70,158],"easily":[72],"disabled":[73],"by":[74],"overloading":[78,164],"attack":[79,118],"(a":[80],"transformed":[81],"DDoS":[82],"attack).":[83],"To":[84],"provide":[85],"security":[87],"service":[88],"SDN,":[90],"proposed":[92,156],"QoS-aware":[94],"mitigation":[95],"strategy,":[96,100],"namely,":[97],"peer":[98],"support":[99,172],"integrates":[102],"available":[104],"idle":[105],"resource":[108],"whole":[111],"system":[113,144],"mitigate":[115],"such":[116],"an":[117],"on":[119,149,181],"single":[121],"switch":[122],"system.":[125],"We":[126],"established":[127],"practical":[129],"mathematical":[130],"model":[131],"represent":[133],"studied":[135],"system,":[136],"conducted":[138],"thorough":[140],"analysis":[141],"for":[142],"various":[146],"circumstances.":[147],"Based":[148],"our":[150,173,176],"analysis,":[151],"found":[153],"that":[154],"strategy":[157],"effectively":[159],"defeat":[160],"attacks.":[165,190],"Extensive":[166],"simulations":[167],"testbed-based":[169],"experiments":[170],"solidly":[171],"claims.":[174],"Moreover,":[175],"work":[177],"also":[178],"shed":[179],"light":[180],"implementation":[183],"networks":[186],"against":[187],"possible":[188],"brute-force":[189]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":8},{"year":2024,"cited_by_count":10},{"year":2023,"cited_by_count":15},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":13},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":12},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
