{"id":"https://openalex.org/W3121208708","doi":"https://doi.org/10.1155/2021/6688489","title":"A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies","display_name":"A Lightweight SDN Fingerprint Attack Defense Mechanism Based on Probabilistic Scrambling and Controller Dynamic Scheduling Strategies","publication_year":2021,"publication_date":"2021-01-25","ids":{"openalex":"https://openalex.org/W3121208708","doi":"https://doi.org/10.1155/2021/6688489","mag":"3121208708"},"language":"en","primary_location":{"id":"doi:10.1155/2021/6688489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6688489","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6688489.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://downloads.hindawi.com/journals/scn/2021/6688489.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100453626","display_name":"Tao Wang","orcid":"https://orcid.org/0000-0002-9613-4294"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Tao Wang","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","PLA Strategic Support Force Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"PLA Strategic Support Force Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088893645","display_name":"Hongchang Chen","orcid":"https://orcid.org/0009-0005-0626-9830"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hongchang Chen","raw_affiliation_strings":["National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","PLA Strategic Support Force Information Engineering University, Zhengzhou, China"],"affiliations":[{"raw_affiliation_string":"National Digital Switching System Engineering and Technological Research Center, Zhengzhou, China","institution_ids":[]},{"raw_affiliation_string":"PLA Strategic Support Force Information Engineering University, Zhengzhou, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100453626"],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":{"value":2100,"currency":"USD","value_usd":2100},"apc_paid":{"value":2100,"currency":"USD","value_usd":2100},"fwci":0.6112,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.68005367,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"2021","issue":null,"first_page":"1","last_page":"23"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.888954758644104},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.6322089433670044},{"id":"https://openalex.org/keywords/scheduling","display_name":"Scheduling (production processes)","score":0.5834608674049377},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5403286814689636},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5270403027534485},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4715942144393921},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.4640229344367981},{"id":"https://openalex.org/keywords/scrambling","display_name":"Scrambling","score":0.41277700662612915},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.37806010246276855},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3409808874130249},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10277247428894043}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.888954758644104},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.6322089433670044},{"id":"https://openalex.org/C206729178","wikidata":"https://www.wikidata.org/wiki/Q2271896","display_name":"Scheduling (production processes)","level":2,"score":0.5834608674049377},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5403286814689636},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5270403027534485},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4715942144393921},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.4640229344367981},{"id":"https://openalex.org/C182548165","wikidata":"https://www.wikidata.org/wiki/Q2261483","display_name":"Scrambling","level":2,"score":0.41277700662612915},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.37806010246276855},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3409808874130249},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10277247428894043},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1155/2021/6688489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6688489","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6688489.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:5972e10067c34c1ca3efa1116b2a0532","is_oa":true,"landing_page_url":"https://doaj.org/article/5972e10067c34c1ca3efa1116b2a0532","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Security and Communication Networks, Vol 2021 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1155/2021/6688489","is_oa":true,"landing_page_url":"https://doi.org/10.1155/2021/6688489","pdf_url":"https://downloads.hindawi.com/journals/scn/2021/6688489.pdf","source":{"id":"https://openalex.org/S120683614","display_name":"Security and Communication Networks","issn_l":"1939-0114","issn":["1939-0114","1939-0122"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319869","host_organization_name":"Hindawi Publishing Corporation","host_organization_lineage":["https://openalex.org/P4310319869"],"host_organization_lineage_names":["Hindawi Publishing Corporation"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Security and Communication Networks","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7099999785423279}],"awards":[{"id":"https://openalex.org/G1901222907","display_name":null,"funder_award_id":"62002383","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G4137032510","display_name":null,"funder_award_id":"61521003","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6148211353","display_name":null,"funder_award_id":"62072467","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G6959256984","display_name":null,"funder_award_id":"2018YFB0804004","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3121208708.pdf","grobid_xml":"https://content.openalex.org/works/W3121208708.grobid-xml"},"referenced_works_count":30,"referenced_works":["https://openalex.org/W70341044","https://openalex.org/W1497071712","https://openalex.org/W1503398984","https://openalex.org/W1524371323","https://openalex.org/W1573745704","https://openalex.org/W1583113493","https://openalex.org/W1977891450","https://openalex.org/W1984451560","https://openalex.org/W1986495842","https://openalex.org/W1988774297","https://openalex.org/W2019419295","https://openalex.org/W2084915558","https://openalex.org/W2094096834","https://openalex.org/W2104599106","https://openalex.org/W2129586531","https://openalex.org/W2147118406","https://openalex.org/W2155624544","https://openalex.org/W2160824842","https://openalex.org/W2318569658","https://openalex.org/W2494110282","https://openalex.org/W2549449872","https://openalex.org/W2754782772","https://openalex.org/W2936418882","https://openalex.org/W2962734603","https://openalex.org/W2963653989","https://openalex.org/W2971005195","https://openalex.org/W3006641418","https://openalex.org/W3012454270","https://openalex.org/W3046117906","https://openalex.org/W6602894725"],"related_works":["https://openalex.org/W4214777079","https://openalex.org/W2051935741","https://openalex.org/W3122360749","https://openalex.org/W2547441564","https://openalex.org/W4377224402","https://openalex.org/W4243609393","https://openalex.org/W4211055425","https://openalex.org/W2926903444","https://openalex.org/W2130026698","https://openalex.org/W2292300552"],"abstract_inverted_index":{"Software-defined":[0],"networking":[1],"(SDN)":[2],"decouples":[3],"the":[4,8,18,57,77,89,93,116,151,159,174,194,199,205],"control":[5],"plane":[6],"from":[7],"data":[9],"plane,":[10],"which":[11],"increases":[12],"network":[13,35,209],"flexibility":[14],"and":[15,39,168,182],"programmability.":[16],"However,":[17,101],"\u201cthree-layer":[19],"two-interface\u201d":[20],"architecture":[21],"of":[22,49,80,95,141,180],"SDN":[23,133,200],"introduces":[24],"new":[25],"security":[26,166],"issues.":[27],"Attackers":[28],"can":[29,196],"collect":[30],"fingerprint":[31,58,103,134,201],"information":[32,135,202],"(such":[33],"as":[34],"types,":[36,38],"controller":[37,127],"critical":[40],"flow":[41,85],"rules)":[42],"by":[43,119],"analyzing":[44],"round-trip":[45],"time":[46,162],"(RTT)":[47],"distribution":[48,79],"test":[50],"packets.":[51],"In":[52],"order":[53],"to":[54,113,131,143,164],"defend":[55,114],"against":[56,115],"attack":[59,62,84,107,117],"with":[60,76],"limited":[61],"time,":[63,108],"we":[64,123,172],"first":[65],"design":[66],"a":[67,126],"probabilistic":[68],"scrambling":[69],"strategy.":[70,121],"This":[71],"strategy":[72,130,153],"not":[73,111],"only":[74,118],"interferes":[75],"delay":[78],"probe":[81],"packets":[82,97],"in":[83,98,145,186],"but":[86],"also":[87,155],"reduces":[88],"negative":[90,206],"impact":[91,207],"on":[92,177,208],"performance":[94],"legal":[96],"normal":[99],"flow.":[100],"if":[102],"attackers":[104],"have":[105],"unlimited":[106],"it":[109],"is":[110,154],"enough":[112],"this":[120],"Therefore,":[122],"further":[124],"propose":[125],"dynamic":[128],"scheduling":[129,138,152],"change":[132],"actively.":[136],"Because":[137],"different":[139,146,178],"types":[140,179],"controllers":[142,181],"work":[144],"periods":[147],"will":[148],"generate":[149],"costs,":[150],"responsible":[156],"for":[157],"determining":[158],"optimal":[160],"switching":[161],"point":[163],"balance":[165],"benefits":[167],"costs.":[169],"At":[170],"last,":[171],"implement":[173],"defense":[175],"mechanism":[176,195],"verify":[183],"its":[184],"effectiveness":[185],"experimental":[187,190],"scenarios.":[188],"The":[189],"results":[191],"show":[192],"that":[193],"effectively":[197],"hide":[198],"while":[203],"reducing":[204],"performance.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2025-11-15T23:13:30.683059","created_date":"2025-10-10T00:00:00"}
