{"id":"https://openalex.org/W2883323686","doi":"https://doi.org/10.3233/jifs-169833","title":"Strategies for detecting and mitigating DDoS attacks in SDN: A survey","display_name":"Strategies for detecting and mitigating DDoS attacks in SDN: A survey","publication_year":2018,"publication_date":"2018-07-18","ids":{"openalex":"https://openalex.org/W2883323686","doi":"https://doi.org/10.3233/jifs-169833","mag":"2883323686"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-169833","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169833","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073376307","display_name":"Misenga Mumpela Jo\u00eblle","orcid":null},"institutions":[{"id":"https://openalex.org/I31766871","display_name":"Sookmyung Women's University","ror":"https://ror.org/00vvvt117","country_code":"KR","type":"education","lineage":["https://openalex.org/I31766871"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Misenga Mumpela Jo\u00eblle","raw_affiliation_strings":["Division of Computer Science, Sookmyung Women\u2019s University, South Korea, Seoul","Division of Computer Science, Sookmyung Women's University, South Korea, Seoul"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science, Sookmyung Women\u2019s University, South Korea, Seoul","institution_ids":["https://openalex.org/I31766871"]},{"raw_affiliation_string":"Division of Computer Science, Sookmyung Women's University, South Korea, Seoul","institution_ids":["https://openalex.org/I31766871"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101968606","display_name":"Young-Hoon Park","orcid":"https://orcid.org/0000-0003-2506-4898"},"institutions":[{"id":"https://openalex.org/I31766871","display_name":"Sookmyung Women's University","ror":"https://ror.org/00vvvt117","country_code":"KR","type":"education","lineage":["https://openalex.org/I31766871"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Young-Hoon Park","raw_affiliation_strings":["Division of Computer Science, Sookmyung Women\u2019s University, South Korea, Seoul","Division of Computer Science, Sookmyung Women's University, South Korea, Seoul"],"affiliations":[{"raw_affiliation_string":"Division of Computer Science, Sookmyung Women\u2019s University, South Korea, Seoul","institution_ids":["https://openalex.org/I31766871"]},{"raw_affiliation_string":"Division of Computer Science, Sookmyung Women's University, South Korea, Seoul","institution_ids":["https://openalex.org/I31766871"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101968606"],"corresponding_institution_ids":["https://openalex.org/I31766871"],"apc_list":null,"apc_paid":null,"fwci":1.6608,"has_fulltext":false,"cited_by_count":23,"citation_normalized_percentile":{"value":0.85738858,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"35","issue":"6","first_page":"5913","last_page":"5925"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.943428099155426},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.7943140864372253},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7585580945014954},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.7371354103088379},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6520599126815796},{"id":"https://openalex.org/keywords/trinoo","display_name":"Trinoo","score":0.49457117915153503},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4936738908290863},{"id":"https://openalex.org/keywords/routing-control-plane","display_name":"Routing control plane","score":0.4837925136089325},{"id":"https://openalex.org/keywords/openflow","display_name":"OpenFlow","score":0.48338523507118225},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.45734405517578125},{"id":"https://openalex.org/keywords/application-layer-ddos-attack","display_name":"Application layer DDoS attack","score":0.42949971556663513},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13710427284240723}],"concepts":[{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.943428099155426},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.7943140864372253},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7585580945014954},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.7371354103088379},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6520599126815796},{"id":"https://openalex.org/C43639116","wikidata":"https://www.wikidata.org/wiki/Q7843050","display_name":"Trinoo","level":5,"score":0.49457117915153503},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4936738908290863},{"id":"https://openalex.org/C145595949","wikidata":"https://www.wikidata.org/wiki/Q7371619","display_name":"Routing control plane","level":2,"score":0.4837925136089325},{"id":"https://openalex.org/C192697461","wikidata":"https://www.wikidata.org/wiki/Q4045918","display_name":"OpenFlow","level":3,"score":0.48338523507118225},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.45734405517578125},{"id":"https://openalex.org/C120865594","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Application layer DDoS attack","level":4,"score":0.42949971556663513},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13710427284240723},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-169833","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-169833","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6399999856948853,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":80,"referenced_works":["https://openalex.org/W146206045","https://openalex.org/W627952783","https://openalex.org/W1577498723","https://openalex.org/W1583113493","https://openalex.org/W1646065384","https://openalex.org/W1973273253","https://openalex.org/W1975936173","https://openalex.org/W1978539378","https://openalex.org/W1980825120","https://openalex.org/W1985339973","https://openalex.org/W1998493381","https://openalex.org/W2000326002","https://openalex.org/W2010756360","https://openalex.org/W2014939701","https://openalex.org/W2017524370","https://openalex.org/W2031779012","https://openalex.org/W2037998200","https://openalex.org/W2049508527","https://openalex.org/W2052524124","https://openalex.org/W2067551786","https://openalex.org/W2073926975","https://openalex.org/W2077712897","https://openalex.org/W2087968523","https://openalex.org/W2090020043","https://openalex.org/W2093862276","https://openalex.org/W2097156747","https://openalex.org/W2104692292","https://openalex.org/W2112700013","https://openalex.org/W2115420905","https://openalex.org/W2124450547","https://openalex.org/W2144648100","https://openalex.org/W2147118406","https://openalex.org/W2151267247","https://openalex.org/W2155883880","https://openalex.org/W2162360270","https://openalex.org/W2163375756","https://openalex.org/W2166909190","https://openalex.org/W2183397118","https://openalex.org/W2208357089","https://openalex.org/W2235039675","https://openalex.org/W2240368487","https://openalex.org/W2246155500","https://openalex.org/W2276629685","https://openalex.org/W2409809436","https://openalex.org/W2470577043","https://openalex.org/W2484055111","https://openalex.org/W2528030635","https://openalex.org/W2534481600","https://openalex.org/W2536380892","https://openalex.org/W2547072668","https://openalex.org/W2547441564","https://openalex.org/W2548037070","https://openalex.org/W2548115664","https://openalex.org/W2548716141","https://openalex.org/W2549019577","https://openalex.org/W2553652196","https://openalex.org/W2559035142","https://openalex.org/W2574178706","https://openalex.org/W2584217814","https://openalex.org/W2612558585","https://openalex.org/W2626502800","https://openalex.org/W2743198050","https://openalex.org/W2753898605","https://openalex.org/W2754163055","https://openalex.org/W2756294556","https://openalex.org/W2760839666","https://openalex.org/W2766419684","https://openalex.org/W2771524937","https://openalex.org/W2773285141","https://openalex.org/W2774112487","https://openalex.org/W2775132284","https://openalex.org/W2782978729","https://openalex.org/W2787262689","https://openalex.org/W2789560653","https://openalex.org/W2903008767","https://openalex.org/W2950074435","https://openalex.org/W3099736358","https://openalex.org/W3158646307","https://openalex.org/W4230467205","https://openalex.org/W6658587564"],"related_works":["https://openalex.org/W4243609393","https://openalex.org/W4211055425","https://openalex.org/W1972849324","https://openalex.org/W2481416984","https://openalex.org/W3042077637","https://openalex.org/W2508315983","https://openalex.org/W2464000876","https://openalex.org/W320008505","https://openalex.org/W2235371234","https://openalex.org/W2960674534"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Networking":[2],"(SDN)":[3],"is":[4,21,57,95],"an":[5],"emerging":[6],"paradigm,":[7],"which":[8,65],"brings":[9],"the":[10,16,28,32,48,53,60,63,74,76,80,87,91,101,153],"network":[11,24,64,105,114],"innovation":[12],"and":[13,18,131,141,160],"attracts":[14],"both":[15],"industries":[17],"researchers.":[19],"SDN":[20,49,117,129,145,166],"a":[22,67,124],"programmable":[23],"model":[25],"that":[26,56],"separates":[27],"control":[29,37,77],"logic":[30,54],"from":[31],"forwarding":[33],"plane.":[34],"The":[35,45],"centralize":[36],"plane":[38,55,78],"takes":[39],"care":[40],"of":[41,62,69,83,90],"all":[42],"networking":[43],"resources.":[44],"attackers":[46],"target":[47,82],"controller,":[50],"to":[51,73,103,111],"paralyze":[52],"considered":[58],"as":[59],"brain":[61],"provides":[66],"lot":[68],"benefits.":[70],"However,":[71],"due":[72],"characteristics":[75],"becomes":[79],"attractive":[81],"security":[84,130],"attacks":[85,99,138,158],"for":[86],"adversaries.":[88],"One":[89],"most":[92],"known":[93],"threats":[94],"Distributed":[96],"Denial-of-Service":[97],"(DDoS)":[98],"with":[100],"goal":[102],"exhausting":[104],"resources":[106],"by":[107],"sending":[108],"heavy":[109],"traffic":[110],"them,":[112],"causing":[113],"congestion.":[115],"Since":[116],"was":[118],"proposed,":[119],"DDoS":[120,137,157],"attack":[121],"has":[122],"become":[123],"popular":[125],"research":[126],"field":[127],"in":[128,144,156,165],"many":[132],"researchers":[133],"have":[134],"been":[135],"presented":[136],"detection,":[139],"prevention":[140],"mitigation":[142,161],"solutions":[143],"environment":[146],"using":[147],"different":[148],"methods.":[149],"This":[150],"paper":[151],"surveys":[152],"previous":[154],"researches":[155],"detection":[159],"based":[162],"methods":[163],"available":[164],"environment.":[167]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":8},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
