Defending SDN against packet injection attacks using deep learning Article Swipe
YOU?
·
· 2023
· Open Access
·
· DOI: https://doi.org/10.1016/j.comnet.2023.109935
The (logically) centralized architecture of software-defined networks makes them an easy target for packet injection attacks. In these attacks, the attacker injects malicious packets into the SDN network to affect the services and performance of the SDN controller and overflows the capacity of the SDN switches. Such attacks have been shown to ultimately stop the network functioning in real-time, leading to network breakdowns. There have been significant works on detecting and defending against similar DoS attacks in non-SDN networks, but detection and protection techniques for SDN against packet injection attacks are still in their infancy. Furthermore, many of the proposed solutions have been shown to be easily bypassed by simple modifications to the attacking packets or by altering the attacking profile. In this paper, we develop novel Graph Convolutional Neural Network models and algorithms for grouping network nodes/users into security classes by learning from network data. We start with two simple classes — nodes that engage in suspicious packet injection attacks and nodes that are not. From these classes, we then partition the network into separate segments with different security policies using distributed Ryu controllers in an SDN network. We show in experiments on an emulated SDN that our detection solution outperforms alternative approaches with above 99% detection accuracy for various types (both old and new) of injection attacks. More importantly, our mitigation solution maintains continuous functions of non-compromised nodes while isolating compromised/suspicious nodes in real-time. All code and data are publicly available for the reproducibility of our results. © 2023 The Author(s)
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.1016/j.comnet.2023.109935
- OA Status
- hybrid
- Cited By
- 20
- References
- 42
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4384937665
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4384937665Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1016/j.comnet.2023.109935Digital Object Identifier
- Title
-
Defending SDN against packet injection attacks using deep learningWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2023Year of publication
- Publication date
-
2023-07-20Full publication date if available
- Authors
-
Anh Tuan Phu, Bo Li, Faheem Ullah, Tanvir Ul Huque, Ranesh Kumar Naha, Muhammad Ali Babar, Hung T. NguyenList of authors in order
- Landing page
-
https://doi.org/10.1016/j.comnet.2023.109935Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1016/j.comnet.2023.109935Direct OA link when available
- Concepts
-
Computer science, Network packet, Computer network, Packet forwarding, Software-defined networking, Computer security, Network architecture, Denial-of-service attack, Network security, Convolutional neural network, Distributed computing, Artificial intelligence, Operating system, The InternetTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
20Total citation count in OpenAlex
- Citations by year (recent)
-
2025: 12, 2024: 8Per-year citation counts (last 5 years)
- References (count)
-
42Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4384937665 |
|---|---|
| doi | https://doi.org/10.1016/j.comnet.2023.109935 |
| ids.doi | https://doi.org/10.1016/j.comnet.2023.109935 |
| ids.openalex | https://openalex.org/W4384937665 |
| fwci | 8.79104584 |
| type | article |
| title | Defending SDN against packet injection attacks using deep learning |
| biblio.issue | |
| biblio.volume | 234 |
| biblio.last_page | 109935 |
| biblio.first_page | 109935 |
| topics[0].id | https://openalex.org/T10714 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9988999962806702 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Software-Defined Networks and 5G |
| topics[1].id | https://openalex.org/T10400 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9927999973297119 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1705 |
| topics[1].subfield.display_name | Computer Networks and Communications |
| topics[1].display_name | Network Security and Intrusion Detection |
| topics[2].id | https://openalex.org/T11598 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9735999703407288 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Internet Traffic Analysis and Secure E-voting |
| funders[0].id | https://openalex.org/F4320321709 |
| funders[0].ror | https://ror.org/05mcs2t73 |
| funders[0].display_name | Ministry of Higher Education, Malaysia |
| is_xpac | False |
| apc_list.value | 2370 |
| apc_list.currency | USD |
| apc_list.value_usd | 2370 |
| apc_paid.value | 2370 |
| apc_paid.currency | USD |
| apc_paid.value_usd | 2370 |
| concepts[0].id | https://openalex.org/C41008148 |
| concepts[0].level | 0 |
| concepts[0].score | 0.9112610816955566 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[0].display_name | Computer science |
| concepts[1].id | https://openalex.org/C158379750 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7293612957000732 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[1].display_name | Network packet |
| concepts[2].id | https://openalex.org/C31258907 |
| concepts[2].level | 1 |
| concepts[2].score | 0.6896845102310181 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[2].display_name | Computer network |
| concepts[3].id | https://openalex.org/C120317029 |
| concepts[3].level | 3 |
| concepts[3].score | 0.4791554808616638 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q874048 |
| concepts[3].display_name | Packet forwarding |
| concepts[4].id | https://openalex.org/C77270119 |
| concepts[4].level | 2 |
| concepts[4].score | 0.468799889087677 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q1655198 |
| concepts[4].display_name | Software-defined networking |
| concepts[5].id | https://openalex.org/C38652104 |
| concepts[5].level | 1 |
| concepts[5].score | 0.44295933842658997 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[5].display_name | Computer security |
| concepts[6].id | https://openalex.org/C193415008 |
| concepts[6].level | 2 |
| concepts[6].score | 0.42967450618743896 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q639681 |
| concepts[6].display_name | Network architecture |
| concepts[7].id | https://openalex.org/C38822068 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4290933907032013 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[7].display_name | Denial-of-service attack |
| concepts[8].id | https://openalex.org/C182590292 |
| concepts[8].level | 2 |
| concepts[8].score | 0.4199153184890747 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[8].display_name | Network security |
| concepts[9].id | https://openalex.org/C81363708 |
| concepts[9].level | 2 |
| concepts[9].score | 0.41254401206970215 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q17084460 |
| concepts[9].display_name | Convolutional neural network |
| concepts[10].id | https://openalex.org/C120314980 |
| concepts[10].level | 1 |
| concepts[10].score | 0.367236852645874 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q180634 |
| concepts[10].display_name | Distributed computing |
| concepts[11].id | https://openalex.org/C154945302 |
| concepts[11].level | 1 |
| concepts[11].score | 0.1309988796710968 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[11].display_name | Artificial intelligence |
| concepts[12].id | https://openalex.org/C111919701 |
| concepts[12].level | 1 |
| concepts[12].score | 0.08710989356040955 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[12].display_name | Operating system |
| concepts[13].id | https://openalex.org/C110875604 |
| concepts[13].level | 2 |
| concepts[13].score | 0.0 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[13].display_name | The Internet |
| keywords[0].id | https://openalex.org/keywords/computer-science |
| keywords[0].score | 0.9112610816955566 |
| keywords[0].display_name | Computer science |
| keywords[1].id | https://openalex.org/keywords/network-packet |
| keywords[1].score | 0.7293612957000732 |
| keywords[1].display_name | Network packet |
| keywords[2].id | https://openalex.org/keywords/computer-network |
| keywords[2].score | 0.6896845102310181 |
| keywords[2].display_name | Computer network |
| keywords[3].id | https://openalex.org/keywords/packet-forwarding |
| keywords[3].score | 0.4791554808616638 |
| keywords[3].display_name | Packet forwarding |
| keywords[4].id | https://openalex.org/keywords/software-defined-networking |
| keywords[4].score | 0.468799889087677 |
| keywords[4].display_name | Software-defined networking |
| keywords[5].id | https://openalex.org/keywords/computer-security |
| keywords[5].score | 0.44295933842658997 |
| keywords[5].display_name | Computer security |
| keywords[6].id | https://openalex.org/keywords/network-architecture |
| keywords[6].score | 0.42967450618743896 |
| keywords[6].display_name | Network architecture |
| keywords[7].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[7].score | 0.4290933907032013 |
| keywords[7].display_name | Denial-of-service attack |
| keywords[8].id | https://openalex.org/keywords/network-security |
| keywords[8].score | 0.4199153184890747 |
| keywords[8].display_name | Network security |
| keywords[9].id | https://openalex.org/keywords/convolutional-neural-network |
| keywords[9].score | 0.41254401206970215 |
| keywords[9].display_name | Convolutional neural network |
| keywords[10].id | https://openalex.org/keywords/distributed-computing |
| keywords[10].score | 0.367236852645874 |
| keywords[10].display_name | Distributed computing |
| keywords[11].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[11].score | 0.1309988796710968 |
| keywords[11].display_name | Artificial intelligence |
| keywords[12].id | https://openalex.org/keywords/operating-system |
| keywords[12].score | 0.08710989356040955 |
| keywords[12].display_name | Operating system |
| language | en |
| locations[0].id | doi:10.1016/j.comnet.2023.109935 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S63392143 |
| locations[0].source.issn | 1389-1286, 1872-7069 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1389-1286 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computer Networks |
| locations[0].source.host_organization | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_name | Elsevier BV |
| locations[0].source.host_organization_lineage | https://openalex.org/P4310320990 |
| locations[0].source.host_organization_lineage_names | Elsevier BV |
| locations[0].license | cc-by |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | journal-article |
| locations[0].license_id | https://openalex.org/licenses/cc-by |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computer Networks |
| locations[0].landing_page_url | https://doi.org/10.1016/j.comnet.2023.109935 |
| locations[1].id | pmh:vital:19050 |
| locations[1].is_oa | True |
| locations[1].source | |
| locations[1].license | cc-by |
| locations[1].pdf_url | |
| locations[1].version | submittedVersion |
| locations[1].raw_type | Text |
| locations[1].license_id | https://openalex.org/licenses/cc-by |
| locations[1].is_accepted | False |
| locations[1].is_published | False |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/198319 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5051413599 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Anh Tuan Phu |
| authorships[0].countries | AU |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I5681781 |
| authorships[0].affiliations[0].raw_affiliation_string | The University of Adelaide, Australia |
| authorships[0].institutions[0].id | https://openalex.org/I5681781 |
| authorships[0].institutions[0].ror | https://ror.org/00892tw58 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I5681781 |
| authorships[0].institutions[0].country_code | AU |
| authorships[0].institutions[0].display_name | The University of Adelaide |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Anh Tuan Phu |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | The University of Adelaide, Australia |
| authorships[1].author.id | https://openalex.org/A5100374506 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-2083-9105 |
| authorships[1].author.display_name | Bo Li |
| authorships[1].countries | AU |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I5681781 |
| authorships[1].affiliations[0].raw_affiliation_string | The University of Adelaide, Australia |
| authorships[1].institutions[0].id | https://openalex.org/I5681781 |
| authorships[1].institutions[0].ror | https://ror.org/00892tw58 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I5681781 |
| authorships[1].institutions[0].country_code | AU |
| authorships[1].institutions[0].display_name | The University of Adelaide |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Bo Li |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | The University of Adelaide, Australia |
| authorships[2].author.id | https://openalex.org/A5101765155 |
| authorships[2].author.orcid | https://orcid.org/0000-0001-8476-1218 |
| authorships[2].author.display_name | Faheem Ullah |
| authorships[2].countries | AU |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I5681781 |
| authorships[2].affiliations[0].raw_affiliation_string | The University of Adelaide, Australia |
| authorships[2].institutions[0].id | https://openalex.org/I5681781 |
| authorships[2].institutions[0].ror | https://ror.org/00892tw58 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I5681781 |
| authorships[2].institutions[0].country_code | AU |
| authorships[2].institutions[0].display_name | The University of Adelaide |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Faheem Ullah |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | The University of Adelaide, Australia |
| authorships[3].author.id | https://openalex.org/A5034531660 |
| authorships[3].author.orcid | |
| authorships[3].author.display_name | Tanvir Ul Huque |
| authorships[3].affiliations[0].raw_affiliation_string | CyberCX, Australia |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Tanvir Ul Huque |
| authorships[3].is_corresponding | False |
| authorships[3].raw_affiliation_strings | CyberCX, Australia |
| authorships[4].author.id | https://openalex.org/A5054337099 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-4165-9349 |
| authorships[4].author.display_name | Ranesh Kumar Naha |
| authorships[4].countries | AU |
| authorships[4].affiliations[0].institution_ids | https://openalex.org/I149672521 |
| authorships[4].affiliations[0].raw_affiliation_string | Federation University Australia, Australia |
| authorships[4].affiliations[1].institution_ids | https://openalex.org/I5681781 |
| authorships[4].affiliations[1].raw_affiliation_string | The University of Adelaide, Australia |
| authorships[4].institutions[0].id | https://openalex.org/I149672521 |
| authorships[4].institutions[0].ror | https://ror.org/05qbzwv83 |
| authorships[4].institutions[0].type | education |
| authorships[4].institutions[0].lineage | https://openalex.org/I149672521 |
| authorships[4].institutions[0].country_code | AU |
| authorships[4].institutions[0].display_name | Federation University |
| authorships[4].institutions[1].id | https://openalex.org/I5681781 |
| authorships[4].institutions[1].ror | https://ror.org/00892tw58 |
| authorships[4].institutions[1].type | education |
| authorships[4].institutions[1].lineage | https://openalex.org/I5681781 |
| authorships[4].institutions[1].country_code | AU |
| authorships[4].institutions[1].display_name | The University of Adelaide |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Ranesh Naha |
| authorships[4].is_corresponding | True |
| authorships[4].raw_affiliation_strings | Federation University Australia, Australia, The University of Adelaide, Australia |
| authorships[5].author.id | https://openalex.org/A5058693284 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-6653-6076 |
| authorships[5].author.display_name | Muhammad Ali Babar |
| authorships[5].countries | AU |
| authorships[5].affiliations[0].institution_ids | https://openalex.org/I5681781 |
| authorships[5].affiliations[0].raw_affiliation_string | The University of Adelaide, Australia |
| authorships[5].institutions[0].id | https://openalex.org/I5681781 |
| authorships[5].institutions[0].ror | https://ror.org/00892tw58 |
| authorships[5].institutions[0].type | education |
| authorships[5].institutions[0].lineage | https://openalex.org/I5681781 |
| authorships[5].institutions[0].country_code | AU |
| authorships[5].institutions[0].display_name | The University of Adelaide |
| authorships[5].author_position | middle |
| authorships[5].raw_author_name | Muhammad Ali Babar |
| authorships[5].is_corresponding | False |
| authorships[5].raw_affiliation_strings | The University of Adelaide, Australia |
| authorships[6].author.id | https://openalex.org/A5100716476 |
| authorships[6].author.orcid | https://orcid.org/0000-0003-3373-8178 |
| authorships[6].author.display_name | Hung T. Nguyen |
| authorships[6].countries | AU |
| authorships[6].affiliations[0].institution_ids | https://openalex.org/I5681781 |
| authorships[6].affiliations[0].raw_affiliation_string | The University of Adelaide, Australia |
| authorships[6].institutions[0].id | https://openalex.org/I5681781 |
| authorships[6].institutions[0].ror | https://ror.org/00892tw58 |
| authorships[6].institutions[0].type | education |
| authorships[6].institutions[0].lineage | https://openalex.org/I5681781 |
| authorships[6].institutions[0].country_code | AU |
| authorships[6].institutions[0].display_name | The University of Adelaide |
| authorships[6].author_position | last |
| authorships[6].raw_author_name | Hung Nguyen |
| authorships[6].is_corresponding | False |
| authorships[6].raw_affiliation_strings | The University of Adelaide, Australia |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1016/j.comnet.2023.109935 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Defending SDN against packet injection attacks using deep learning |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T10714 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9988999962806702 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Software-Defined Networks and 5G |
| related_works | https://openalex.org/W4320503161, https://openalex.org/W1806628227, https://openalex.org/W4298012271, https://openalex.org/W3112295988, https://openalex.org/W4386549369, https://openalex.org/W3195864701, https://openalex.org/W4381112698, https://openalex.org/W4384026613, https://openalex.org/W4207079371, https://openalex.org/W4205631404 |
| cited_by_count | 20 |
| counts_by_year[0].year | 2025 |
| counts_by_year[0].cited_by_count | 12 |
| counts_by_year[1].year | 2024 |
| counts_by_year[1].cited_by_count | 8 |
| locations_count | 2 |
| best_oa_location.id | doi:10.1016/j.comnet.2023.109935 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S63392143 |
| best_oa_location.source.issn | 1389-1286, 1872-7069 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1389-1286 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computer Networks |
| best_oa_location.source.host_organization | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_name | Elsevier BV |
| best_oa_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| best_oa_location.source.host_organization_lineage_names | Elsevier BV |
| best_oa_location.license | cc-by |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | journal-article |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computer Networks |
| best_oa_location.landing_page_url | https://doi.org/10.1016/j.comnet.2023.109935 |
| primary_location.id | doi:10.1016/j.comnet.2023.109935 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S63392143 |
| primary_location.source.issn | 1389-1286, 1872-7069 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1389-1286 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computer Networks |
| primary_location.source.host_organization | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_name | Elsevier BV |
| primary_location.source.host_organization_lineage | https://openalex.org/P4310320990 |
| primary_location.source.host_organization_lineage_names | Elsevier BV |
| primary_location.license | cc-by |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | journal-article |
| primary_location.license_id | https://openalex.org/licenses/cc-by |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computer Networks |
| primary_location.landing_page_url | https://doi.org/10.1016/j.comnet.2023.109935 |
| publication_date | 2023-07-20 |
| publication_year | 2023 |
| referenced_works | https://openalex.org/W2067453331, https://openalex.org/W2136329599, https://openalex.org/W2914152503, https://openalex.org/W2767197769, https://openalex.org/W2910980958, https://openalex.org/W6772928000, https://openalex.org/W6773902967, https://openalex.org/W2529328334, https://openalex.org/W2835960805, https://openalex.org/W6632999134, https://openalex.org/W6748503732, https://openalex.org/W2519428799, https://openalex.org/W6742430128, https://openalex.org/W3155885603, https://openalex.org/W6745609711, https://openalex.org/W3197871814, https://openalex.org/W4289545090, https://openalex.org/W4210637581, https://openalex.org/W4206401645, https://openalex.org/W4205712817, https://openalex.org/W6730169028, https://openalex.org/W2783146946, https://openalex.org/W2908941882, https://openalex.org/W6760727179, https://openalex.org/W6634767497, https://openalex.org/W3212650931, https://openalex.org/W3133516607, https://openalex.org/W6781210695, https://openalex.org/W3175448228, https://openalex.org/W2907492528, https://openalex.org/W2964015378, https://openalex.org/W317456669, https://openalex.org/W2945365184, https://openalex.org/W3082212141, https://openalex.org/W4256037559, https://openalex.org/W4302068785, https://openalex.org/W2768348081, https://openalex.org/W3098576337, https://openalex.org/W4240396547, https://openalex.org/W4213310870, https://openalex.org/W4246282713, https://openalex.org/W4253669374 |
| referenced_works_count | 42 |
| abstract_inverted_index.In | 16, 121 |
| abstract_inverted_index.We | 146, 189 |
| abstract_inverted_index.an | 9, 186, 194 |
| abstract_inverted_index.be | 105 |
| abstract_inverted_index.by | 108, 116, 141 |
| abstract_inverted_index.in | 57, 76, 92, 156, 185, 191, 234 |
| abstract_inverted_index.of | 4, 34, 42, 97, 216, 227, 246 |
| abstract_inverted_index.on | 68, 193 |
| abstract_inverted_index.or | 115 |
| abstract_inverted_index.to | 28, 51, 60, 104, 111 |
| abstract_inverted_index.we | 124, 169 |
| abstract_inverted_index.© | 249 |
| abstract_inverted_index.99% | 206 |
| abstract_inverted_index.All | 236 |
| abstract_inverted_index.DoS | 74 |
| abstract_inverted_index.Ryu | 183 |
| abstract_inverted_index.SDN | 26, 36, 44, 85, 187, 196 |
| abstract_inverted_index.The | 0, 251 |
| abstract_inverted_index.and | 32, 38, 70, 81, 132, 161, 214, 238 |
| abstract_inverted_index.are | 90, 164, 240 |
| abstract_inverted_index.but | 79 |
| abstract_inverted_index.for | 12, 84, 134, 209, 243 |
| abstract_inverted_index.old | 213 |
| abstract_inverted_index.our | 198, 221, 247 |
| abstract_inverted_index.the | 19, 25, 30, 35, 40, 43, 54, 98, 112, 118, 172, 244 |
| abstract_inverted_index.two | 149 |
| abstract_inverted_index.— | 152 |
| abstract_inverted_index.2023 | 250 |
| abstract_inverted_index.From | 166 |
| abstract_inverted_index.More | 219 |
| abstract_inverted_index.Such | 46 |
| abstract_inverted_index.been | 49, 65, 102 |
| abstract_inverted_index.code | 237 |
| abstract_inverted_index.data | 239 |
| abstract_inverted_index.easy | 10 |
| abstract_inverted_index.from | 143 |
| abstract_inverted_index.have | 48, 64, 101 |
| abstract_inverted_index.into | 24, 138, 174 |
| abstract_inverted_index.many | 96 |
| abstract_inverted_index.new) | 215 |
| abstract_inverted_index.not. | 165 |
| abstract_inverted_index.show | 190 |
| abstract_inverted_index.stop | 53 |
| abstract_inverted_index.that | 154, 163, 197 |
| abstract_inverted_index.them | 8 |
| abstract_inverted_index.then | 170 |
| abstract_inverted_index.this | 122 |
| abstract_inverted_index.with | 148, 177, 204 |
| abstract_inverted_index.(both | 212 |
| abstract_inverted_index.Graph | 127 |
| abstract_inverted_index.There | 63 |
| abstract_inverted_index.above | 205 |
| abstract_inverted_index.data. | 145 |
| abstract_inverted_index.makes | 7 |
| abstract_inverted_index.nodes | 153, 162, 229, 233 |
| abstract_inverted_index.novel | 126 |
| abstract_inverted_index.shown | 50, 103 |
| abstract_inverted_index.start | 147 |
| abstract_inverted_index.still | 91 |
| abstract_inverted_index.their | 93 |
| abstract_inverted_index.these | 17, 167 |
| abstract_inverted_index.types | 211 |
| abstract_inverted_index.using | 181 |
| abstract_inverted_index.while | 230 |
| abstract_inverted_index.works | 67 |
| abstract_inverted_index.Neural | 129 |
| abstract_inverted_index.affect | 29 |
| abstract_inverted_index.easily | 106 |
| abstract_inverted_index.engage | 155 |
| abstract_inverted_index.models | 131 |
| abstract_inverted_index.packet | 13, 87, 158 |
| abstract_inverted_index.paper, | 123 |
| abstract_inverted_index.simple | 109, 150 |
| abstract_inverted_index.target | 11 |
| abstract_inverted_index.Network | 130 |
| abstract_inverted_index.against | 72, 86 |
| abstract_inverted_index.attacks | 47, 75, 89, 160 |
| abstract_inverted_index.classes | 140, 151 |
| abstract_inverted_index.develop | 125 |
| abstract_inverted_index.injects | 21 |
| abstract_inverted_index.leading | 59 |
| abstract_inverted_index.network | 27, 55, 61, 136, 144, 173 |
| abstract_inverted_index.non-SDN | 77 |
| abstract_inverted_index.packets | 23, 114 |
| abstract_inverted_index.similar | 73 |
| abstract_inverted_index.various | 210 |
| abstract_inverted_index.accuracy | 208 |
| abstract_inverted_index.altering | 117 |
| abstract_inverted_index.attacker | 20 |
| abstract_inverted_index.attacks, | 18 |
| abstract_inverted_index.attacks. | 15, 218 |
| abstract_inverted_index.bypassed | 107 |
| abstract_inverted_index.capacity | 41 |
| abstract_inverted_index.classes, | 168 |
| abstract_inverted_index.emulated | 195 |
| abstract_inverted_index.grouping | 135 |
| abstract_inverted_index.infancy. | 94 |
| abstract_inverted_index.learning | 142 |
| abstract_inverted_index.network. | 188 |
| abstract_inverted_index.networks | 6 |
| abstract_inverted_index.policies | 180 |
| abstract_inverted_index.profile. | 120 |
| abstract_inverted_index.proposed | 99 |
| abstract_inverted_index.publicly | 241 |
| abstract_inverted_index.results. | 248 |
| abstract_inverted_index.security | 139, 179 |
| abstract_inverted_index.segments | 176 |
| abstract_inverted_index.separate | 175 |
| abstract_inverted_index.services | 31 |
| abstract_inverted_index.solution | 200, 223 |
| abstract_inverted_index.Author(s) | 252 |
| abstract_inverted_index.attacking | 113, 119 |
| abstract_inverted_index.available | 242 |
| abstract_inverted_index.defending | 71 |
| abstract_inverted_index.detecting | 69 |
| abstract_inverted_index.detection | 80, 199, 207 |
| abstract_inverted_index.different | 178 |
| abstract_inverted_index.functions | 226 |
| abstract_inverted_index.injection | 14, 88, 159, 217 |
| abstract_inverted_index.isolating | 231 |
| abstract_inverted_index.maintains | 224 |
| abstract_inverted_index.malicious | 22 |
| abstract_inverted_index.networks, | 78 |
| abstract_inverted_index.overflows | 39 |
| abstract_inverted_index.partition | 171 |
| abstract_inverted_index.solutions | 100 |
| abstract_inverted_index.switches. | 45 |
| abstract_inverted_index.algorithms | 133 |
| abstract_inverted_index.approaches | 203 |
| abstract_inverted_index.continuous | 225 |
| abstract_inverted_index.controller | 37 |
| abstract_inverted_index.mitigation | 222 |
| abstract_inverted_index.protection | 82 |
| abstract_inverted_index.real-time, | 58 |
| abstract_inverted_index.real-time. | 235 |
| abstract_inverted_index.suspicious | 157 |
| abstract_inverted_index.techniques | 83 |
| abstract_inverted_index.ultimately | 52 |
| abstract_inverted_index.(logically) | 1 |
| abstract_inverted_index.alternative | 202 |
| abstract_inverted_index.breakdowns. | 62 |
| abstract_inverted_index.centralized | 2 |
| abstract_inverted_index.controllers | 184 |
| abstract_inverted_index.distributed | 182 |
| abstract_inverted_index.experiments | 192 |
| abstract_inverted_index.functioning | 56 |
| abstract_inverted_index.nodes/users | 137 |
| abstract_inverted_index.outperforms | 201 |
| abstract_inverted_index.performance | 33 |
| abstract_inverted_index.significant | 66 |
| abstract_inverted_index.Furthermore, | 95 |
| abstract_inverted_index.architecture | 3 |
| abstract_inverted_index.importantly, | 220 |
| abstract_inverted_index.Convolutional | 128 |
| abstract_inverted_index.modifications | 110 |
| abstract_inverted_index.non-compromised | 228 |
| abstract_inverted_index.reproducibility | 245 |
| abstract_inverted_index.software-defined | 5 |
| abstract_inverted_index.compromised/suspicious | 232 |
| cited_by_percentile_year.max | 99 |
| cited_by_percentile_year.min | 98 |
| corresponding_author_ids | https://openalex.org/A5054337099 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 7 |
| corresponding_institution_ids | https://openalex.org/I149672521, https://openalex.org/I5681781 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.6600000262260437 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.95438919 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | True |