Security Issues in Software-Defined Networks Article Swipe
Software-Defined Networking (SDN) is dynamic in nature for future intelligent networks and function applications with reduced operating cost through simplified software, hardware and management. The SDN challenges are performance, security, scalability and interoperability combined with the proposal in potential solutions direction. The Distributed- Denial of Service (DDoS) attack rate is growing year by year. In 2016, the largest attack rate was 800 Gbps. There exists a contradictory relationship between SDN and DDoS attacks. On the one hand, it is easy to detect DDoS attacks in SDN, but on the other hand, SDN itself becomes, a victim of DDoS attacks and potential DDoS vulnerabilities. The good thing with SDN is, it is a good tool to defeat and react against DDoS attack. An SDN survey says it provides a big research opportunity for security and can greatly impact networks security research in different ways. The paper shows some security challenges, with the various threats possible at different parts of SDN. It also, shows DDoS attacks on different SDN layers and its available security solutions, and discusses some directions for detection and mitigation mechanism of DDoS attack in SDN. In future, security policies will be built over the controller to make a tolerant system for DDoS attacks.
Related Topics
- Type
- article
- Language
- en
- Landing Page
- https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880
- OA Status
- green
- Cited By
- 4
- Related Works
- 20
- OpenAlex ID
- https://openalex.org/W2945706593
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W2945706593Canonical identifier for this work in OpenAlex
- Title
-
Security Issues in Software-Defined NetworksWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2018Year of publication
- Publication date
-
2018-10-31Full publication date if available
- Authors
-
Rohit Kumar Gupta, Bibhudatta SahooList of authors in order
- Landing page
-
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880Direct OA link when available
- Concepts
-
Denial-of-service attack, Software-defined networking, Application layer DDoS attack, Computer science, Computer security, Trinoo, Interoperability, Scalability, Network security, Computer network, The Internet, Operating systemTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
4Total citation count in OpenAlex
- Citations by year (recent)
-
2022: 1, 2021: 1, 2020: 2Per-year citation counts (last 5 years)
- Related works (count)
-
20Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W2945706593 |
|---|---|
| doi | |
| ids.mag | 2945706593 |
| ids.openalex | https://openalex.org/W2945706593 |
| fwci | 0.63678644 |
| type | article |
| title | Security Issues in Software-Defined Networks |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T10714 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9950000047683716 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1705 |
| topics[0].subfield.display_name | Computer Networks and Communications |
| topics[0].display_name | Software-Defined Networks and 5G |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9836000204086304 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T10400 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9835000038146973 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1705 |
| topics[2].subfield.display_name | Computer Networks and Communications |
| topics[2].display_name | Network Security and Intrusion Detection |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C38822068 |
| concepts[0].level | 3 |
| concepts[0].score | 0.9355133771896362 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[0].display_name | Denial-of-service attack |
| concepts[1].id | https://openalex.org/C77270119 |
| concepts[1].level | 2 |
| concepts[1].score | 0.817039966583252 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q1655198 |
| concepts[1].display_name | Software-defined networking |
| concepts[2].id | https://openalex.org/C120865594 |
| concepts[2].level | 4 |
| concepts[2].score | 0.7177073955535889 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q131406 |
| concepts[2].display_name | Application layer DDoS attack |
| concepts[3].id | https://openalex.org/C41008148 |
| concepts[3].level | 0 |
| concepts[3].score | 0.714259922504425 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[3].display_name | Computer science |
| concepts[4].id | https://openalex.org/C38652104 |
| concepts[4].level | 1 |
| concepts[4].score | 0.689292311668396 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[4].display_name | Computer security |
| concepts[5].id | https://openalex.org/C43639116 |
| concepts[5].level | 5 |
| concepts[5].score | 0.5912188291549683 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q7843050 |
| concepts[5].display_name | Trinoo |
| concepts[6].id | https://openalex.org/C20136886 |
| concepts[6].level | 2 |
| concepts[6].score | 0.5352602005004883 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q749647 |
| concepts[6].display_name | Interoperability |
| concepts[7].id | https://openalex.org/C48044578 |
| concepts[7].level | 2 |
| concepts[7].score | 0.5065528154373169 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q727490 |
| concepts[7].display_name | Scalability |
| concepts[8].id | https://openalex.org/C182590292 |
| concepts[8].level | 2 |
| concepts[8].score | 0.47324639558792114 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[8].display_name | Network security |
| concepts[9].id | https://openalex.org/C31258907 |
| concepts[9].level | 1 |
| concepts[9].score | 0.37875795364379883 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[9].display_name | Computer network |
| concepts[10].id | https://openalex.org/C110875604 |
| concepts[10].level | 2 |
| concepts[10].score | 0.12792590260505676 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q75 |
| concepts[10].display_name | The Internet |
| concepts[11].id | https://openalex.org/C111919701 |
| concepts[11].level | 1 |
| concepts[11].score | 0.06278184056282043 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q9135 |
| concepts[11].display_name | Operating system |
| keywords[0].id | https://openalex.org/keywords/denial-of-service-attack |
| keywords[0].score | 0.9355133771896362 |
| keywords[0].display_name | Denial-of-service attack |
| keywords[1].id | https://openalex.org/keywords/software-defined-networking |
| keywords[1].score | 0.817039966583252 |
| keywords[1].display_name | Software-defined networking |
| keywords[2].id | https://openalex.org/keywords/application-layer-ddos-attack |
| keywords[2].score | 0.7177073955535889 |
| keywords[2].display_name | Application layer DDoS attack |
| keywords[3].id | https://openalex.org/keywords/computer-science |
| keywords[3].score | 0.714259922504425 |
| keywords[3].display_name | Computer science |
| keywords[4].id | https://openalex.org/keywords/computer-security |
| keywords[4].score | 0.689292311668396 |
| keywords[4].display_name | Computer security |
| keywords[5].id | https://openalex.org/keywords/trinoo |
| keywords[5].score | 0.5912188291549683 |
| keywords[5].display_name | Trinoo |
| keywords[6].id | https://openalex.org/keywords/interoperability |
| keywords[6].score | 0.5352602005004883 |
| keywords[6].display_name | Interoperability |
| keywords[7].id | https://openalex.org/keywords/scalability |
| keywords[7].score | 0.5065528154373169 |
| keywords[7].display_name | Scalability |
| keywords[8].id | https://openalex.org/keywords/network-security |
| keywords[8].score | 0.47324639558792114 |
| keywords[8].display_name | Network security |
| keywords[9].id | https://openalex.org/keywords/computer-network |
| keywords[9].score | 0.37875795364379883 |
| keywords[9].display_name | Computer network |
| keywords[10].id | https://openalex.org/keywords/the-internet |
| keywords[10].score | 0.12792590260505676 |
| keywords[10].display_name | The Internet |
| keywords[11].id | https://openalex.org/keywords/operating-system |
| keywords[11].score | 0.06278184056282043 |
| keywords[11].display_name | Operating system |
| language | en |
| locations[0].id | mag:2945706593 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210172589 |
| locations[0].source.issn | 1556-5068 |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | 1556-5068 |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | SSRN Electronic Journal |
| locations[0].source.host_organization | https://openalex.org/I1318003438 |
| locations[0].source.host_organization_name | RELX Group (Netherlands) |
| locations[0].source.host_organization_lineage | https://openalex.org/I1318003438 |
| locations[0].license | |
| locations[0].pdf_url | |
| locations[0].version | submittedVersion |
| locations[0].raw_type | |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | SSRN Electronic Journal |
| locations[0].landing_page_url | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880 |
| authorships[0].author.id | https://openalex.org/A5038831216 |
| authorships[0].author.orcid | https://orcid.org/0000-0002-1080-2651 |
| authorships[0].author.display_name | Rohit Kumar Gupta |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I16292982 |
| authorships[0].affiliations[0].raw_affiliation_string | National Institute of Technology-Rourkela |
| authorships[0].institutions[0].id | https://openalex.org/I16292982 |
| authorships[0].institutions[0].ror | https://ror.org/011gmn932 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I16292982 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | National Institute of Technology Rourkela |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Rohit Kumar Gupta |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | National Institute of Technology-Rourkela |
| authorships[1].author.id | https://openalex.org/A5062056080 |
| authorships[1].author.orcid | https://orcid.org/0000-0001-8273-9850 |
| authorships[1].author.display_name | Bibhudatta Sahoo |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I16292982 |
| authorships[1].affiliations[0].raw_affiliation_string | National Institute of Technology-Rourkela |
| authorships[1].institutions[0].id | https://openalex.org/I16292982 |
| authorships[1].institutions[0].ror | https://ror.org/011gmn932 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I16292982 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | National Institute of Technology Rourkela |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Bibhudatta Sahoo |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | National Institute of Technology-Rourkela |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Security Issues in Software-Defined Networks |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-10-10T17:16:08.811792 |
| primary_topic.id | https://openalex.org/T10714 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9950000047683716 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1705 |
| primary_topic.subfield.display_name | Computer Networks and Communications |
| primary_topic.display_name | Software-Defined Networks and 5G |
| related_works | https://openalex.org/W2942864670, https://openalex.org/W2276629685, https://openalex.org/W2584217814, https://openalex.org/W2000326002, https://openalex.org/W2883990850, https://openalex.org/W3047707432, https://openalex.org/W2906238566, https://openalex.org/W3172318291, https://openalex.org/W2988977541, https://openalex.org/W3005065054, https://openalex.org/W2914674368, https://openalex.org/W2909098677, https://openalex.org/W2626502800, https://openalex.org/W1612573205, https://openalex.org/W3089211877, https://openalex.org/W1543555101, https://openalex.org/W3162696051, https://openalex.org/W3119727884, https://openalex.org/W2589412831, https://openalex.org/W2975091687 |
| cited_by_count | 4 |
| counts_by_year[0].year | 2022 |
| counts_by_year[0].cited_by_count | 1 |
| counts_by_year[1].year | 2021 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2020 |
| counts_by_year[2].cited_by_count | 2 |
| locations_count | 1 |
| best_oa_location.id | mag:2945706593 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210172589 |
| best_oa_location.source.issn | 1556-5068 |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | 1556-5068 |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | SSRN Electronic Journal |
| best_oa_location.source.host_organization | https://openalex.org/I1318003438 |
| best_oa_location.source.host_organization_name | RELX Group (Netherlands) |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I1318003438 |
| best_oa_location.license | |
| best_oa_location.pdf_url | |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | SSRN Electronic Journal |
| best_oa_location.landing_page_url | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880 |
| primary_location.id | mag:2945706593 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210172589 |
| primary_location.source.issn | 1556-5068 |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | 1556-5068 |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | SSRN Electronic Journal |
| primary_location.source.host_organization | https://openalex.org/I1318003438 |
| primary_location.source.host_organization_name | RELX Group (Netherlands) |
| primary_location.source.host_organization_lineage | https://openalex.org/I1318003438 |
| primary_location.license | |
| primary_location.pdf_url | |
| primary_location.version | submittedVersion |
| primary_location.raw_type | |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | SSRN Electronic Journal |
| primary_location.landing_page_url | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3275880 |
| publication_date | 2018-10-31 |
| publication_year | 2018 |
| referenced_works_count | 0 |
| abstract_inverted_index.a | 65, 94, 111, 127, 199 |
| abstract_inverted_index.An | 121 |
| abstract_inverted_index.In | 54, 187 |
| abstract_inverted_index.It | 159 |
| abstract_inverted_index.On | 73 |
| abstract_inverted_index.at | 154 |
| abstract_inverted_index.be | 192 |
| abstract_inverted_index.by | 52 |
| abstract_inverted_index.in | 5, 37, 84, 140, 185 |
| abstract_inverted_index.is | 3, 49, 78, 110 |
| abstract_inverted_index.it | 77, 109, 125 |
| abstract_inverted_index.of | 44, 96, 157, 182 |
| abstract_inverted_index.on | 87, 164 |
| abstract_inverted_index.to | 80, 114, 197 |
| abstract_inverted_index.800 | 61 |
| abstract_inverted_index.SDN | 25, 69, 91, 107, 122, 166 |
| abstract_inverted_index.The | 24, 41, 103, 143 |
| abstract_inverted_index.and | 11, 22, 31, 70, 99, 116, 133, 168, 173, 179 |
| abstract_inverted_index.are | 27 |
| abstract_inverted_index.big | 128 |
| abstract_inverted_index.but | 86 |
| abstract_inverted_index.can | 134 |
| abstract_inverted_index.for | 7, 131, 177, 202 |
| abstract_inverted_index.is, | 108 |
| abstract_inverted_index.its | 169 |
| abstract_inverted_index.one | 75 |
| abstract_inverted_index.the | 35, 56, 74, 88, 150, 195 |
| abstract_inverted_index.was | 60 |
| abstract_inverted_index.DDoS | 71, 82, 97, 101, 119, 162, 183, 203 |
| abstract_inverted_index.SDN, | 85 |
| abstract_inverted_index.SDN. | 158, 186 |
| abstract_inverted_index.cost | 17 |
| abstract_inverted_index.easy | 79 |
| abstract_inverted_index.good | 104, 112 |
| abstract_inverted_index.make | 198 |
| abstract_inverted_index.over | 194 |
| abstract_inverted_index.rate | 48, 59 |
| abstract_inverted_index.says | 124 |
| abstract_inverted_index.some | 146, 175 |
| abstract_inverted_index.tool | 113 |
| abstract_inverted_index.will | 191 |
| abstract_inverted_index.with | 14, 34, 106, 149 |
| abstract_inverted_index.year | 51 |
| abstract_inverted_index.(SDN) | 2 |
| abstract_inverted_index.2016, | 55 |
| abstract_inverted_index.Gbps. | 62 |
| abstract_inverted_index.There | 63 |
| abstract_inverted_index.also, | 160 |
| abstract_inverted_index.built | 193 |
| abstract_inverted_index.hand, | 76, 90 |
| abstract_inverted_index.other | 89 |
| abstract_inverted_index.paper | 144 |
| abstract_inverted_index.parts | 156 |
| abstract_inverted_index.react | 117 |
| abstract_inverted_index.shows | 145, 161 |
| abstract_inverted_index.thing | 105 |
| abstract_inverted_index.ways. | 142 |
| abstract_inverted_index.year. | 53 |
| abstract_inverted_index.(DDoS) | 46 |
| abstract_inverted_index.Denial | 43 |
| abstract_inverted_index.attack | 47, 58, 184 |
| abstract_inverted_index.defeat | 115 |
| abstract_inverted_index.detect | 81 |
| abstract_inverted_index.exists | 64 |
| abstract_inverted_index.future | 8 |
| abstract_inverted_index.impact | 136 |
| abstract_inverted_index.itself | 92 |
| abstract_inverted_index.layers | 167 |
| abstract_inverted_index.nature | 6 |
| abstract_inverted_index.survey | 123 |
| abstract_inverted_index.system | 201 |
| abstract_inverted_index.victim | 95 |
| abstract_inverted_index.Service | 45 |
| abstract_inverted_index.against | 118 |
| abstract_inverted_index.attack. | 120 |
| abstract_inverted_index.attacks | 83, 98, 163 |
| abstract_inverted_index.between | 68 |
| abstract_inverted_index.dynamic | 4 |
| abstract_inverted_index.future, | 188 |
| abstract_inverted_index.greatly | 135 |
| abstract_inverted_index.growing | 50 |
| abstract_inverted_index.largest | 57 |
| abstract_inverted_index.reduced | 15 |
| abstract_inverted_index.threats | 152 |
| abstract_inverted_index.through | 18 |
| abstract_inverted_index.various | 151 |
| abstract_inverted_index.attacks. | 72, 204 |
| abstract_inverted_index.becomes, | 93 |
| abstract_inverted_index.combined | 33 |
| abstract_inverted_index.function | 12 |
| abstract_inverted_index.hardware | 21 |
| abstract_inverted_index.networks | 10, 137 |
| abstract_inverted_index.policies | 190 |
| abstract_inverted_index.possible | 153 |
| abstract_inverted_index.proposal | 36 |
| abstract_inverted_index.provides | 126 |
| abstract_inverted_index.research | 129, 139 |
| abstract_inverted_index.security | 132, 138, 147, 171, 189 |
| abstract_inverted_index.tolerant | 200 |
| abstract_inverted_index.available | 170 |
| abstract_inverted_index.detection | 178 |
| abstract_inverted_index.different | 141, 155, 165 |
| abstract_inverted_index.discusses | 174 |
| abstract_inverted_index.mechanism | 181 |
| abstract_inverted_index.operating | 16 |
| abstract_inverted_index.potential | 38, 100 |
| abstract_inverted_index.security, | 29 |
| abstract_inverted_index.software, | 20 |
| abstract_inverted_index.solutions | 39 |
| abstract_inverted_index.Networking | 1 |
| abstract_inverted_index.challenges | 26 |
| abstract_inverted_index.controller | 196 |
| abstract_inverted_index.direction. | 40 |
| abstract_inverted_index.directions | 176 |
| abstract_inverted_index.mitigation | 180 |
| abstract_inverted_index.simplified | 19 |
| abstract_inverted_index.solutions, | 172 |
| abstract_inverted_index.challenges, | 148 |
| abstract_inverted_index.intelligent | 9 |
| abstract_inverted_index.management. | 23 |
| abstract_inverted_index.opportunity | 130 |
| abstract_inverted_index.scalability | 30 |
| abstract_inverted_index.Distributed- | 42 |
| abstract_inverted_index.applications | 13 |
| abstract_inverted_index.performance, | 28 |
| abstract_inverted_index.relationship | 67 |
| abstract_inverted_index.contradictory | 66 |
| abstract_inverted_index.Software-Defined | 0 |
| abstract_inverted_index.interoperability | 32 |
| abstract_inverted_index.vulnerabilities. | 102 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.4300000071525574 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.72907712 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |