{"id":"https://openalex.org/W2533393212","doi":"https://doi.org/10.1145/2995272.2995274","title":"SDN based Scalable MTD solution in Cloud Network","display_name":"SDN based Scalable MTD solution in Cloud Network","publication_year":2016,"publication_date":"2016-10-24","ids":{"openalex":"https://openalex.org/W2533393212","doi":"https://doi.org/10.1145/2995272.2995274","mag":"2533393212"},"language":"en","primary_location":{"id":"doi:10.1145/2995272.2995274","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2995272.2995274","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2995274&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dl.acm.org/ft_gateway.cfm?id=2995274&type=pdf","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063462575","display_name":"Ankur Chowdhary","orcid":"https://orcid.org/0000-0001-7131-067X"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Ankur Chowdhary","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5003360458","display_name":"Sandeep Pisharody","orcid":"https://orcid.org/0000-0003-3382-8579"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sandeep Pisharody","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003921452","display_name":"Dijiang Huang","orcid":"https://orcid.org/0000-0003-3257-6349"},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dijiang Huang","raw_affiliation_strings":["Arizona State University, Tempe, AZ, USA"],"affiliations":[{"raw_affiliation_string":"Arizona State University, Tempe, AZ, USA","institution_ids":["https://openalex.org/I55732556"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5063462575"],"corresponding_institution_ids":["https://openalex.org/I55732556"],"apc_list":null,"apc_paid":null,"fwci":7.3828,"has_fulltext":false,"cited_by_count":64,"citation_normalized_percentile":{"value":0.9738915,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"27","last_page":"36"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8139335513114929},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.7343999147415161},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.6597047448158264},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6510670185089111},{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.6061078310012817},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.5536639094352722},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5440064072608948},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.4788815379142761},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security policy","score":0.4754098057746887},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.4665849804878235},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.444904625415802},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.44264543056488037},{"id":"https://openalex.org/keywords/reachability","display_name":"Reachability","score":0.4397713243961334},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4294845163822174},{"id":"https://openalex.org/keywords/controller","display_name":"Controller (irrigation)","score":0.41112425923347473},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.15160584449768066},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11112269759178162},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10027503967285156},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09718766808509827}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8139335513114929},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.7343999147415161},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.6597047448158264},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6510670185089111},{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.6061078310012817},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.5536639094352722},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5440064072608948},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.4788815379142761},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.4754098057746887},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4665849804878235},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.444904625415802},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44264543056488037},{"id":"https://openalex.org/C136643341","wikidata":"https://www.wikidata.org/wiki/Q1361526","display_name":"Reachability","level":2,"score":0.4397713243961334},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4294845163822174},{"id":"https://openalex.org/C203479927","wikidata":"https://www.wikidata.org/wiki/Q5165939","display_name":"Controller (irrigation)","level":2,"score":0.41112425923347473},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.15160584449768066},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11112269759178162},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10027503967285156},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09718766808509827},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C6557445","wikidata":"https://www.wikidata.org/wiki/Q173113","display_name":"Agronomy","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2995272.2995274","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2995272.2995274","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2995274&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/2995272.2995274","is_oa":true,"landing_page_url":"https://doi.org/10.1145/2995272.2995274","pdf_url":"http://dl.acm.org/ft_gateway.cfm?id=2995274&type=pdf","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2016 ACM Workshop on Moving Target Defense","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.5299999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[{"id":"https://openalex.org/G5150511570","display_name":null,"funder_award_id":"NSF-SFS-112956","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G5626833710","display_name":null,"funder_award_id":"NSF-SFS-1129561","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G6277944304","display_name":null,"funder_award_id":"1528099","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G848032724","display_name":null,"funder_award_id":"Science","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G8888557302","display_name":"SFS: An Information and Systems Assurance Scholarship Program","funder_award_id":"1129561","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2533393212.pdf","grobid_xml":"https://content.openalex.org/works/W2533393212.grobid-xml"},"referenced_works_count":31,"referenced_works":["https://openalex.org/W78267021","https://openalex.org/W125598877","https://openalex.org/W1498432697","https://openalex.org/W1508638970","https://openalex.org/W1524563393","https://openalex.org/W1590488181","https://openalex.org/W1894272157","https://openalex.org/W1976540969","https://openalex.org/W1986495842","https://openalex.org/W2010947830","https://openalex.org/W2013901835","https://openalex.org/W2020729428","https://openalex.org/W2031175798","https://openalex.org/W2034677282","https://openalex.org/W2046822739","https://openalex.org/W2078174680","https://openalex.org/W2080529963","https://openalex.org/W2086454935","https://openalex.org/W2120900812","https://openalex.org/W2131975293","https://openalex.org/W2132243817","https://openalex.org/W2143396794","https://openalex.org/W2150127671","https://openalex.org/W2155512447","https://openalex.org/W2155624544","https://openalex.org/W2273810844","https://openalex.org/W2591097296","https://openalex.org/W2616742437","https://openalex.org/W2912516925","https://openalex.org/W4239212093","https://openalex.org/W4253554696"],"related_works":["https://openalex.org/W4214777079","https://openalex.org/W2051935741","https://openalex.org/W3122360749","https://openalex.org/W2547441564","https://openalex.org/W4377224402","https://openalex.org/W4243609393","https://openalex.org/W4211055425","https://openalex.org/W2926903444","https://openalex.org/W2130026698","https://openalex.org/W2292300552"],"abstract_inverted_index":{"Software-Defined":[0],"Networking":[1],"(SDN)":[2],"has":[3,136],"emerged":[4],"as":[5,101],"a":[6,50,58,65,69,137,152],"framework":[7,135],"for":[8],"centralized":[9,77],"command":[10],"and":[11,21,30,88,93,121,141,168],"control":[12,22],"in":[13,49,57,151],"cloud":[14,155],"data":[15,20],"centric":[16],"environments.":[17],"SDN":[18,39,109],"separates":[19],"plane,":[23],"which":[24,60],"provides":[25],"network":[26,59,87,127,131],"administrator":[27],"better":[28],"visibility":[29],"policy":[31,166],"enforcement":[32],"capability":[33],"compared":[34],"to":[35,79,111,125,129],"traditional":[36],"networks.":[37],"The":[38],"controller":[40,78,110],"can":[41,61],"assess":[42,80,112],"reachability":[43],"information":[44,170],"of":[45,76,84],"all":[46],"the":[47,81,85,108,113],"hosts":[48],"network.":[51],"There":[52],"are":[53],"many":[54],"critical":[55],"assets":[56],"be":[62],"compromised":[63],"by":[64],"malicious":[66],"attacker":[67],"through":[68,116],"multistage":[70],"attack.":[71],"Thus":[72],"we":[73],"make":[74],"use":[75,107],"security":[82],"state":[83],"entire":[86],"pro-actively":[89],"perform":[90,126],"attack":[91,114],"analysis":[92],"countermeasure":[94],"selection.":[95],"This":[96],"approach":[97],"is":[98],"also":[99],"known":[100],"Moving":[102],"Target":[103],"Defense":[104],"(MTD).":[105],"We":[106],"scenarios":[115],"scalable":[117],"Attack":[118],"Graphs":[119],"(AG)":[120],"select":[122],"necessary":[123],"countermeasures":[124],"reconfiguration":[128],"counter":[130],"attacks.":[132],"Moreover,":[133],"our":[134],"comprehensive":[138],"conflict":[139],"detection":[140],"resolution":[142],"module":[143],"that":[144,146],"ensures":[145],"no":[147],"two":[148],"flow":[149],"rules":[150],"distributed":[153],"SDN-based":[154],"environment":[156],"have":[157],"conflicts":[158],"at":[159],"any":[160],"layer;":[161],"thereby":[162],"assuring":[163],"consistent":[164],"conflict-free":[165],"implementation":[167],"preventing":[169],"leakage.":[171]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":5}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
