{"id":"https://openalex.org/W2150187400","doi":"https://doi.org/10.1145/2775088.2775104","title":"Security Analysis of Software Defined Networking Applications for Monitoring and Measurement","display_name":"Security Analysis of Software Defined Networking Applications for Monitoring and Measurement","publication_year":2015,"publication_date":"2015-06-08","ids":{"openalex":"https://openalex.org/W2150187400","doi":"https://doi.org/10.1145/2775088.2775104","mag":"2150187400"},"language":"en","primary_location":{"id":"doi:10.1145/2775088.2775104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2775088.2775104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 10th International Conference on Future Internet","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://publica.fraunhofer.de/documents/N-360562.html","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029140695","display_name":"Pascal Dauer","orcid":null},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Pascal Dauer","raw_affiliation_strings":["Department of Computer Science, TU Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, TU Darmstadt, Germany","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005175180","display_name":"Rahamatullah Khondoker","orcid":"https://orcid.org/0000-0002-2540-0604"},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Rahamatullah Khondoker","raw_affiliation_strings":["Fraunhofer SIT, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022886678","display_name":"Ronald W. Marx","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Ronald Marx","raw_affiliation_strings":["Fraunhofer SIT, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210133470"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036410085","display_name":"Kpatcha Bayarou","orcid":null},"institutions":[{"id":"https://openalex.org/I4210133470","display_name":"Fraunhofer Institute for Secure Information Technology","ror":"https://ror.org/03qt2gs44","country_code":"DE","type":"facility","lineage":["https://openalex.org/I4210133470","https://openalex.org/I4923324"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kpatcha Bayarou","raw_affiliation_strings":["Fraunhofer SIT, Darmstadt, Germany"],"affiliations":[{"raw_affiliation_string":"Fraunhofer SIT, Darmstadt, Germany","institution_ids":["https://openalex.org/I4210133470"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029140695"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":null,"apc_paid":null,"fwci":1.3313,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.83532876,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"51","last_page":"56"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.75547194480896},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.6663903594017029},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6322042942047119},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6173332929611206},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.5858299732208252},{"id":"https://openalex.org/keywords/stride","display_name":"STRIDE","score":0.5538191795349121},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4941692650318146},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.4264543056488037},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.42432719469070435},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.18969765305519104},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.1797773540019989},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.10057303309440613},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.0926264226436615}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.75547194480896},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6663903594017029},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6322042942047119},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6173332929611206},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.5858299732208252},{"id":"https://openalex.org/C18007350","wikidata":"https://www.wikidata.org/wiki/Q7394815","display_name":"STRIDE","level":2,"score":0.5538191795349121},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4941692650318146},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.4264543056488037},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.42432719469070435},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.18969765305519104},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.1797773540019989},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.10057303309440613},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0926264226436615}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/2775088.2775104","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2775088.2775104","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The 10th International Conference on Future Internet","raw_type":"proceedings-article"},{"id":"pmh:oai:fraunhofer.de:N-360562","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-360562.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer SIT","raw_type":"Conference Paper"},{"id":"pmh:oai:publica.fraunhofer.de:publica/389190","is_oa":false,"landing_page_url":"https://publica.fraunhofer.de/handle/publica/389190","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"conference paper"}],"best_oa_location":{"id":"pmh:oai:fraunhofer.de:N-360562","is_oa":true,"landing_page_url":"http://publica.fraunhofer.de/documents/N-360562.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400318","display_name":"Fraunhofer-Publica (Fraunhofer-Gesellschaft)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4923324","host_organization_name":"Fraunhofer-Gesellschaft","host_organization_lineage":["https://openalex.org/I4923324"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Fraunhofer SIT","raw_type":"Conference Paper"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.49000000953674316}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1966921407","https://openalex.org/W1969449821","https://openalex.org/W2011130843"],"related_works":["https://openalex.org/W2086178534","https://openalex.org/W1561562093","https://openalex.org/W2907868081","https://openalex.org/W2120086576","https://openalex.org/W2784006287","https://openalex.org/W2222589037","https://openalex.org/W4206910357","https://openalex.org/W2056275442","https://openalex.org/W2097628364","https://openalex.org/W2395987867"],"abstract_inverted_index":{"Security":[0],"is":[1],"one":[2],"of":[3,22,40,43,52,91],"the":[4,20,49,77,88,92,96],"most":[5],"important":[6],"aspects":[7],"in":[8],"networks":[9],"which":[10],"sometimes":[11],"need":[12],"network":[13],"monitoring":[14,65],"and":[15,24,28,66,72,94],"measurement":[16,29,67],"tools":[17,30],"to":[18,32,114],"identify":[19],"source":[21],"misbehavior":[23],"performance":[25],"degradation.":[26],"Monitoring":[27],"promise":[31],"provide":[33],"critical":[34],"functions":[35],"including":[36],"an":[37],"early":[38],"detection":[39],"a":[41],"Denial":[42],"Service":[44],"(DoS)":[45],"attack.":[46],"To":[47],"ensure":[48],"internal":[50],"security":[51,107],"those":[53],"tools,":[54],"they":[55],"must":[56,99],"also":[57],"be":[58,100],"evaluated.":[59],"This":[60,81],"paper":[61,82],"analyses":[62],"two":[63],"networking":[64],"tools:":[68],"sFlow":[69,85],"(open":[70],"source)":[71],"BigTap":[73,103],"(commercial),":[74],"by":[75],"applying":[76],"STRIDE":[78],"threat":[79],"model.":[80],"concludes":[83],"that":[84,95],"relies":[86],"on":[87],"correct":[89],"configuration":[90],"agent":[93],"deployment":[97],"environment":[98],"properly":[101],"secured.":[102],"comes":[104],"with":[105],"several":[106],"mechanisms,":[108],"however,":[109],"other":[110],"mechanisms":[111],"are":[112],"required":[113],"improve":[115],"its":[116],"security.":[117]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
