{"id":"https://openalex.org/W3007000529","doi":"https://doi.org/10.1155/2020/7235043","title":"A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models","display_name":"A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models","publication_year":2020,"publication_date":"2020-02-18","ids":{"openalex":"https://openalex.org/W3007000529","doi":"https://doi.org/10.1155/2020/7235043","mag":"3007000529"},"language":"en","primary_location":{"id":"doi:10.1155/2020/7235043","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/7235043","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/7235043.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2020/7235043.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007095677","display_name":"Taehoon Eom","orcid":null},"institutions":[{"id":"https://openalex.org/I24456540","display_name":"Korea Aerospace University","ror":"https://ror.org/05jmm0651","country_code":"KR","type":"education","lineage":["https://openalex.org/I24456540"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Taehoon Eom","raw_affiliation_strings":["Department of Computer Engineering, Korea Aerospace University, Goyang, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Korea Aerospace University, Goyang, Republic of Korea","institution_ids":["https://openalex.org/I24456540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011163136","display_name":"Jin B. Hong","orcid":"https://orcid.org/0000-0003-1359-3813"},"institutions":[{"id":"https://openalex.org/I177877127","display_name":"The University of Western Australia","ror":"https://ror.org/047272k79","country_code":"AU","type":"education","lineage":["https://openalex.org/I177877127"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Jin B. Hong","raw_affiliation_strings":["Department of Computer Science and Software Engineering, University of Western Australia, Perth, Australia"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Software Engineering, University of Western Australia, Perth, Australia","institution_ids":["https://openalex.org/I177877127"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060344741","display_name":"Seongmo An","orcid":"https://orcid.org/0009-0006-1823-3162"},"institutions":[{"id":"https://openalex.org/I24456540","display_name":"Korea Aerospace University","ror":"https://ror.org/05jmm0651","country_code":"KR","type":"education","lineage":["https://openalex.org/I24456540"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"SeongMo An","raw_affiliation_strings":["Department of Computer Engineering, Korea Aerospace University, Goyang, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Korea Aerospace University, Goyang, Republic of Korea","institution_ids":["https://openalex.org/I24456540"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065963028","display_name":"Jong Sou Park","orcid":null},"institutions":[{"id":"https://openalex.org/I24456540","display_name":"Korea Aerospace University","ror":"https://ror.org/05jmm0651","country_code":"KR","type":"education","lineage":["https://openalex.org/I24456540"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jong Sou Park","raw_affiliation_strings":["Department of Computer Engineering, Korea Aerospace University, Goyang, Republic of Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Engineering, Korea Aerospace University, Goyang, Republic of Korea","institution_ids":["https://openalex.org/I24456540"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5019789320","display_name":"Dong Seong Kim","orcid":"https://orcid.org/0000-0003-2605-187X"},"institutions":[{"id":"https://openalex.org/I160993911","display_name":"Queensland University of Technology","ror":"https://ror.org/03pnv4752","country_code":"AU","type":"education","lineage":["https://openalex.org/I160993911"]},{"id":"https://openalex.org/I165143802","display_name":"The University of Queensland","ror":"https://ror.org/00rqy9422","country_code":"AU","type":"education","lineage":["https://openalex.org/I165143802"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dong Seong Kim","raw_affiliation_strings":["School of Information Technology and Electrical Engineering, The University of Queensland, Brisbane, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology and Electrical Engineering, The University of Queensland, Brisbane, Australia","institution_ids":["https://openalex.org/I160993911","https://openalex.org/I165143802"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5007095677"],"corresponding_institution_ids":["https://openalex.org/I24456540"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.9701,"has_fulltext":true,"cited_by_count":9,"citation_normalized_percentile":{"value":0.7713861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":"2020","issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9991000294685364,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9898999929428101,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8977572917938232},{"id":"https://openalex.org/keywords/precomputation","display_name":"Precomputation","score":0.787209689617157},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5961025357246399},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5189071297645569},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4677113890647888},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4111325740814209},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.37631621956825256},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3286510705947876},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.07848465442657471},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.07552984356880188}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8977572917938232},{"id":"https://openalex.org/C159379195","wikidata":"https://www.wikidata.org/wiki/Q7239568","display_name":"Precomputation","level":3,"score":0.787209689617157},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5961025357246399},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5189071297645569},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4677113890647888},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4111325740814209},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.37631621956825256},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3286510705947876},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.07848465442657471},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.07552984356880188},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.0}],"mesh":[],"locations_count":5,"locations":[{"id":"doi:10.1155/2020/7235043","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/7235043","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/7235043.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:pure.atira.dk:openaire/a89f5958-20bd-4d83-b259-ab654d299185","is_oa":true,"landing_page_url":"https://admin.research-repository.uwa.edu.au/en/publications/a89f5958-20bd-4d83-b259-ab654d299185","pdf_url":null,"source":{"id":"https://openalex.org/S4306402492","display_name":"UWA Profiles and Research Repository (UWA)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Eom, T, Hong, J, An, S, Park, J S & Kim, D S 2020, 'A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models', Security and Communication Networks, vol. 2020, 7235043. https://doi.org/10.1155/2020/7235043","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.atira.dk:publications/a89f5958-20bd-4d83-b259-ab654d299185","is_oa":true,"landing_page_url":"https://research-repository.uwa.edu.au/en/publications/a89f5958-20bd-4d83-b259-ab654d299185","pdf_url":null,"source":{"id":"https://openalex.org/S4306402523","display_name":"UWA Profiles and Research Repository (University of Western Australia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177877127","host_organization_name":"The University of Western Australia","host_organization_lineage":["https://openalex.org/I177877127"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Eom , T , Hong , J , An , S , Park , J S &amp; Kim , D S 2020 , ' A Framework for Real-Time Intrusion Response in Software Defined Networking Using Precomputed Graphical Security Models ' , Security and Communication Networks , vol. 2020 , 7235043 . https://doi.org/10.1155/2020/7235043","raw_type":"article"},{"id":"pmh:oai:doaj.org/article:6aee9728b4eb48fa9d9a1fedb93fa601","is_oa":true,"landing_page_url":"https://doaj.org/article/6aee9728b4eb48fa9d9a1fedb93fa601","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2020 (2020)","raw_type":"article"},{"id":"pmh:oai:espace.library.uq.edu.au:UQ:dfd4686","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402388","display_name":"Queensland's institutional digital repository (The University of Queensland)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I165143802","host_organization_name":"The University of Queensland","host_organization_lineage":["https://openalex.org/I165143802"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"doi:10.1155/2020/7235043","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2020/7235043","pdf_url":"https://downloads.hindawi.com/journals/scn/2020/7235043.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3007000529.pdf","grobid_xml":"https://content.openalex.org/works/W3007000529.grobid-xml"},"referenced_works_count":11,"referenced_works":["https://openalex.org/W78267021","https://openalex.org/W119067220","https://openalex.org/W2017524370","https://openalex.org/W2022758041","https://openalex.org/W2031175798","https://openalex.org/W2040340473","https://openalex.org/W2156607688","https://openalex.org/W2235039675","https://openalex.org/W2293796414","https://openalex.org/W2515955240","https://openalex.org/W2766228646"],"related_works":["https://openalex.org/W126258643","https://openalex.org/W2157769033","https://openalex.org/W2096978683","https://openalex.org/W414359703","https://openalex.org/W2687399516","https://openalex.org/W2543067032","https://openalex.org/W2170398238","https://openalex.org/W3029113864","https://openalex.org/W2020308516","https://openalex.org/W4242327143"],"abstract_inverted_index":{"Software":[0],"defined":[1],"networking":[2],"(SDN)":[3],"has":[4],"been":[5,47],"adopted":[6],"in":[7,56,97,115,177],"many":[8,43],"application":[9],"domains":[10],"as":[11,180,182],"it":[12,88,176],"provides":[13],"functionalities":[14],"to":[15,27,33,53,58,91,101,119,139,165,174,204],"dynamically":[16],"control":[17],"the":[18,28,35,38,60,63,69,72,121,151,184,190,194,198],"network":[19],"flow":[20,191],"more":[21,24],"robust":[22],"and":[23,67,84],"economical":[25],"compared":[26,55],"traditional":[29],"networks.":[30],"In":[31,106],"order":[32,57],"strengthen":[34],"security":[36,44,61,70,79,142,185],"of":[37,62,71,123,153,170],"SDN":[39,73,116,137,195],"against":[40,94],"cyber":[41],"attacks,":[42],"solutions":[45,51,209],"have":[46],"proposed.":[48],"However,":[49,87],"those":[50],"need":[52],"be":[54,202],"optimize":[59],"SDN.":[64,212],"To":[65],"assess":[66],"evaluate":[68],"systematically,":[74],"one":[75],"can":[76,201],"use":[77],"graphical":[78],"models":[80],"(e.g.,":[81],"attack":[82,85,96,125,168,173],"graphs":[83],"trees).":[86],"is":[89],"difficult":[90],"provide":[92,205],"defense":[93],"an":[95,128,154,171],"real":[98,178],"time":[99],"due":[100],"their":[102],"high":[103],"computational":[104],"complexity.":[105],"this":[107],"paper,":[108],"we":[109,162],"propose":[110],"a":[111,141],"real-time":[112,207],"intrusion":[113],"response":[114],"using":[117],"precomputation":[118],"estimate":[120,166],"likelihood":[122],"future":[124],"paths":[126,169],"from":[127],"ongoing":[129,172],"attack.":[130],"We":[131],"also":[132],"take":[133],"into":[134],"account":[135],"various":[136],"components":[138,152],"conduct":[140],"assessment,":[143],"which":[144],"were":[145],"not":[146],"available":[147],"when":[148],"addressing":[149],"only":[150],"existing":[155],"network.":[156],"Our":[157],"experimental":[158],"analysis":[159],"shows":[160],"that":[161,187],"are":[163],"able":[164],"possible":[167],"mitigate":[175],"time,":[179],"well":[181],"showing":[183],"metrics":[186],"depend":[188],"on":[189],"table,":[192],"including":[193],"component.":[196],"Hence,":[197],"proposed":[199],"approach":[200],"used":[203],"effective":[206],"mitigation":[208],"for":[210],"securing":[211]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
