{"id":"https://openalex.org/W4322775556","doi":"https://doi.org/10.1186/s13677-023-00406-w","title":"OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure","display_name":"OpenStackDP: a scalable network security framework for SDN-based OpenStack cloud infrastructure","publication_year":2023,"publication_date":"2023-02-28","ids":{"openalex":"https://openalex.org/W4322775556","doi":"https://doi.org/10.1186/s13677-023-00406-w"},"language":"en","primary_location":{"id":"doi:10.1186/s13677-023-00406-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00406-w","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00406-w","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00406-w","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5011073660","display_name":"Prabhakar Krishnan","orcid":"https://orcid.org/0000-0001-6702-112X"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Prabhakar Krishnan","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri-Campus, Kollam, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri-Campus, Kollam, Kerala, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013774176","display_name":"Kurunandan Jain","orcid":"https://orcid.org/0000-0003-2038-1114"},"institutions":[{"id":"https://openalex.org/I81556334","display_name":"Amrita Vishwa Vidyapeetham","ror":"https://ror.org/03am10p12","country_code":"IN","type":"education","lineage":["https://openalex.org/I81556334"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Kurunandan Jain","raw_affiliation_strings":["Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri-Campus, Kollam, Kerala, India"],"affiliations":[{"raw_affiliation_string":"Center for Cybersecurity Systems and Networks, Amrita Vishwa Vidyapeetham, Amritapuri-Campus, Kollam, Kerala, India","institution_ids":["https://openalex.org/I81556334"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070543103","display_name":"Amjad Aldweesh","orcid":"https://orcid.org/0000-0001-9358-1323"},"institutions":[{"id":"https://openalex.org/I206935292","display_name":"Shaqra University","ror":"https://ror.org/05hawb687","country_code":"SA","type":"education","lineage":["https://openalex.org/I206935292"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Amjad Aldweesh","raw_affiliation_strings":["College of Computing and Information Technology, Shaqra University, Riyadh, 11911, Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computing and Information Technology, Shaqra University, Riyadh, 11911, Saudi Arabia","institution_ids":["https://openalex.org/I206935292"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014588735","display_name":"P. Prabu","orcid":null},"institutions":[{"id":"https://openalex.org/I48018076","display_name":"Christ University","ror":"https://ror.org/022tv9y30","country_code":"IN","type":"education","lineage":["https://openalex.org/I48018076"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"P. Prabu","raw_affiliation_strings":["Department of Computer Science, Christ University, Bengaluru, Karnataka, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Christ University, Bengaluru, Karnataka, India","institution_ids":["https://openalex.org/I48018076"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014716105","display_name":"Rajkumar Buyya","orcid":"https://orcid.org/0000-0001-9754-6496"},"institutions":[{"id":"https://openalex.org/I165779595","display_name":"University of Melbourne","ror":"https://ror.org/01ej9dk98","country_code":"AU","type":"education","lineage":["https://openalex.org/I165779595"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Rajkumar Buyya","raw_affiliation_strings":["Cloud Computing and Distributed Systems (CLOUDS) Lab, School of Computing and Information Systems, The University of Melbourne, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"Cloud Computing and Distributed Systems (CLOUDS) Lab, School of Computing and Information Systems, The University of Melbourne, Melbourne, Australia","institution_ids":["https://openalex.org/I165779595"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5011073660"],"corresponding_institution_ids":["https://openalex.org/I81556334"],"apc_list":{"value":990,"currency":"GBP","value_usd":1214},"apc_paid":{"value":990,"currency":"GBP","value_usd":1214},"fwci":16.1635,"has_fulltext":true,"cited_by_count":90,"citation_normalized_percentile":{"value":0.99423043,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":"12","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8485785722732544},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.8270848989486694},{"id":"https://openalex.org/keywords/virtualization","display_name":"Virtualization","score":0.5991848707199097},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.5656209588050842},{"id":"https://openalex.org/keywords/virtual-machine","display_name":"Virtual machine","score":0.5647739768028259},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5276526212692261},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.4996500015258789},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.4888729453086853},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4645198583602905},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.4173322319984436},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4114854335784912},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3652479648590088},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.34703147411346436},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3429655432701111},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3017691969871521},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.26218917965888977},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.1625092625617981}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8485785722732544},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.8270848989486694},{"id":"https://openalex.org/C513985346","wikidata":"https://www.wikidata.org/wiki/Q270471","display_name":"Virtualization","level":3,"score":0.5991848707199097},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.5656209588050842},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.5647739768028259},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5276526212692261},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.4996500015258789},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.4888729453086853},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4645198583602905},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.4173322319984436},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4114854335784912},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3652479648590088},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.34703147411346436},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3429655432701111},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3017691969871521},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.26218917965888977},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.1625092625617981},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s13677-023-00406-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00406-w","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00406-w","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:a255f48e19c347c08ed205c7b8db6b2c","is_oa":true,"landing_page_url":"https://doaj.org/article/a255f48e19c347c08ed205c7b8db6b2c","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Journal of Cloud Computing: Advances, Systems and Applications, Vol 12, Iss 1, Pp 1-42 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s13677-023-00406-w","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s13677-023-00406-w","pdf_url":"https://journalofcloudcomputing.springeropen.com/counter/pdf/10.1186/s13677-023-00406-w","source":{"id":"https://openalex.org/S2486819371","display_name":"Journal of Cloud Computing Advances Systems and Applications","issn_l":"2192-113X","issn":["2192-113X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Cloud Computing","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4322775556.pdf"},"referenced_works_count":40,"referenced_works":["https://openalex.org/W590686347","https://openalex.org/W1512071441","https://openalex.org/W1526821023","https://openalex.org/W1992204376","https://openalex.org/W2011130843","https://openalex.org/W2027941036","https://openalex.org/W2093931563","https://openalex.org/W2147118406","https://openalex.org/W2465526829","https://openalex.org/W2514563602","https://openalex.org/W2516477161","https://openalex.org/W2531376625","https://openalex.org/W2552755005","https://openalex.org/W2570065507","https://openalex.org/W2574070836","https://openalex.org/W2737645917","https://openalex.org/W2756261137","https://openalex.org/W2789828921","https://openalex.org/W2790386461","https://openalex.org/W2790865812","https://openalex.org/W2913831828","https://openalex.org/W2930144424","https://openalex.org/W2945446878","https://openalex.org/W2973082347","https://openalex.org/W2975191072","https://openalex.org/W2979539300","https://openalex.org/W2996807748","https://openalex.org/W3013873400","https://openalex.org/W3016554829","https://openalex.org/W3027706554","https://openalex.org/W3035870791","https://openalex.org/W3038007528","https://openalex.org/W3103731783","https://openalex.org/W3132428738","https://openalex.org/W3145843217","https://openalex.org/W3162876817","https://openalex.org/W3194133686","https://openalex.org/W4244070247","https://openalex.org/W4255488039","https://openalex.org/W6757121694"],"related_works":["https://openalex.org/W2088620127","https://openalex.org/W4214777079","https://openalex.org/W3122360749","https://openalex.org/W2743348030","https://openalex.org/W4377224402","https://openalex.org/W2947629119","https://openalex.org/W1963799338","https://openalex.org/W2542775576","https://openalex.org/W2900408237","https://openalex.org/W2036412865"],"abstract_inverted_index":{"Abstract":[0],"Network":[1,78],"Intrusion":[2],"Detection":[3],"Systems":[4],"(NIDS)":[5],"and":[6,20,34,52,82,87,94,109,176,194,198,217,246,254,259,278,286,297],"firewalls":[7],"are":[8,37,124],"the":[9,14,29,72,103,106,113,126,147,160,209,231,236,290],"de":[10],"facto":[11],"solutions":[12,36,302],"in":[13,65,112,143,159,228],"modern":[15],"cloud":[16,116],"to":[17,50,54,61,101,134,140,220,235],"detect":[18],"cyberattacks":[19],"minimize":[21],"potential":[22],"hazards":[23],"for":[24,88,303],"tenant":[25,237],"networks.":[26],"Most":[27],"of":[28,71,74,105,204,271,275],"existing":[30],"firewalls,":[31],"perimeter":[32],"security,":[33],"middlebox":[35],"built":[38,208],"on":[39,132,168],"static":[40],"rules/signatures":[41],"or":[42,122,240],"simple":[43],"rule":[44],"matching,":[45],"making":[46,89],"them":[47],"inflexible,":[48],"susceptible":[49],"bugs,":[51],"difficult":[53],"introduce":[55],"new":[56],"services.":[57],"This":[58,185],"paper":[59],"aims":[60],"improve":[62],"network":[63,182,186,292],"management":[64],"OpenStack":[66,114,301],"Clouds":[67],"by":[68],"taking":[69],"advantage":[70],"combination":[73],"software-defined":[75],"networking":[76],"(SDN),":[77],"Function":[79],"Virtualization":[80],"(NFV),":[81],"machine":[83,218],"learning/artificial":[84],"intelligence":[85,97],"(ML/AI)":[86],"networks":[90],"more":[91],"predictable,":[92],"reliable,":[93],"secure.":[95],"Artificial":[96],"is":[98,227],"being":[99,138],"used":[100],"monitor":[102],"behavior":[104],"virtual":[107,181],"machines":[108],"applications":[110],"running":[111,171],"SDN":[115],"so":[117],"that":[118,136,226,289],"when":[119],"any":[120],"issues":[121],"degradations":[123],"noticed,":[125],"decision":[127],"can":[128],"be":[129],"quickly":[130],"made":[131],"how":[133],"handle":[135],"issue,":[137],"able":[139],"analyze":[141],"data":[142,161,187,225,242],"motion,":[144],"starting":[145],"at":[146],"edge.":[148],"The":[149,262,284],"OpenStackDP":[150,291],"framework":[151,210,294],"comprises":[152],"lightweight":[153],"monitoring,":[154],"anomaly-detecting":[155],"intelligent":[156],"sensors":[157],"embedded":[158],"plane,":[162],"a":[163,200],"threat":[164,192],"analytics":[165,214,293],"engine":[166],"based":[167],"ML/AI":[169],"algorithms":[170],"inside":[172],"switch":[173],"hardware/network":[174],"co-processor,":[175],"defensive":[177],"actions":[178],"deployed":[179],"as":[180],"functions":[183],"(VNFs).":[184],"plane-based":[188],"architecture":[189],"makes":[190],"high-speed":[191],"detection":[193,266],"rapid":[195],"response":[196,279],"possible":[197],"enables":[199],"much":[201],"higher":[202],"degree":[203],"security.":[205],"We":[206],"have":[207],"with":[211],"advanced":[212],"streaming":[213],"technologies,":[215],"algorithms,":[216],"learning":[219],"draw":[221],"knowledge":[222],"from":[223,250,257],"this":[224],"motion":[229],"before":[230],"malicious":[232],"traffic":[233],"goes":[234],"compute":[238],"nodes":[239],"long-term":[241],"store.":[243],"Cloud":[244,304],"providers":[245],"users":[247],"will":[248],"benefit":[249],"improved":[251],"Quality-of-Services":[252],"(QoS)":[253],"faster":[255],"recovery":[256],"cyber-attacks":[258],"compromised":[260],"switches.":[261],"multi-phase":[263],"collaborative":[264],"anomaly":[265],"scheme":[267],"demonstrates":[268],"an":[269],"accuracy":[270],"99.81%,":[272],"average":[273],"latencies":[274],"0.27":[276],"ms,":[277],"speed":[280],"within":[281],"9":[282],"s.":[283],"simulations":[285],"analysis":[287],"show":[288],"substantially":[295],"secures":[296],"outperforms":[298],"prior":[299],"SDN-based":[300],"architectures.":[305]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":24},{"year":2024,"cited_by_count":42},{"year":2023,"cited_by_count":11},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-03-31T07:56:22.981413","created_date":"2025-10-10T00:00:00"}
