{"id":"https://openalex.org/W2912905125","doi":"https://doi.org/10.1109/icspcs.2018.8631762","title":"Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack","display_name":"Analysis of Traffic Signals on an SDN for Detection and Classification of a Man-in-the-Middle Attack","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2912905125","doi":"https://doi.org/10.1109/icspcs.2018.8631762","mag":"2912905125"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspcs.2018.8631762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063070674","display_name":"Julian N. D\u2019Orsaneo","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Julian D'Orsaneo","raw_affiliation_strings":["Command Element Systems, Marine Corps Systems Command, Quantico, VA"],"affiliations":[{"raw_affiliation_string":"Command Element Systems, Marine Corps Systems Command, Quantico, VA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5111435850","display_name":"Murali Tummala","orcid":null},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215","https://openalex.org/I4399598358"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Murali Tummala","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Naval Postgraduate School, Monterey, CA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Naval Postgraduate School, Monterey, CA","institution_ids":["https://openalex.org/I35364215"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109032896","display_name":"John McEachen","orcid":null},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215","https://openalex.org/I4399598358"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John McEachen","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Naval Postgraduate School, Monterey, CA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Naval Postgraduate School, Monterey, CA","institution_ids":["https://openalex.org/I35364215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5055955332","display_name":"Bryan Martin","orcid":null},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215","https://openalex.org/I4399598358"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Bryan Martin","raw_affiliation_strings":["Department of Electrical and Computer Engineering, Naval Postgraduate School, Monterey, CA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, Naval Postgraduate School, Monterey, CA","institution_ids":["https://openalex.org/I35364215"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.367,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.757616,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":80,"max":82},"biblio":{"volume":"6","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9999,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9994,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.993,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/man-in-the-middle-attack","display_name":"Man-in-the-middle attack","score":0.95905876}],"concepts":[{"id":"https://openalex.org/C196491621","wikidata":"https://www.wikidata.org/wiki/Q554830","display_name":"Man-in-the-middle attack","level":3,"score":0.95905876},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.8355551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7468872},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5848302},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5826761},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.56046176},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.52514267},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.46834773},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.42734632},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.2595488},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1370418},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07506713},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icspcs.2018.8631762","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":15,"referenced_works":["https://openalex.org/W1546036754","https://openalex.org/W1984451560","https://openalex.org/W2027817020","https://openalex.org/W2040340473","https://openalex.org/W2054473533","https://openalex.org/W2084915558","https://openalex.org/W2115379950","https://openalex.org/W2121511513","https://openalex.org/W2122646361","https://openalex.org/W2144936818","https://openalex.org/W2553816634","https://openalex.org/W2900406259","https://openalex.org/W3021190427","https://openalex.org/W3103225357","https://openalex.org/W4253664895"],"related_works":["https://openalex.org/W2384741105","https://openalex.org/W2376886931","https://openalex.org/W2374845301","https://openalex.org/W2351448539","https://openalex.org/W2185594426","https://openalex.org/W2061466315","https://openalex.org/W2010561419","https://openalex.org/W1992118813","https://openalex.org/W1977863481","https://openalex.org/W1495178644"],"abstract_inverted_index":{"Software-defined":[0],"networking":[1],"(SDN)":[2],"has":[3],"the":[4,8,41,61,64,77,97,120,132,138,148,154],"potential":[5],"to":[6,46,71,101,119,123,134,143,153],"revolutionize":[7],"management":[9],"capabilities":[10],"of":[11,19,27,60,93,156],"a":[12,24,35,53,103,111],"highly":[13],"distributed":[14,112],"communications":[15],"environment.":[16],"Yet,":[17],"adoption":[18],"SDN":[20,47],"is":[21],"contingent":[22],"on":[23],"thorough":[25],"analysis":[26,70],"security":[28,155],"implications.":[29],"In":[30,49],"this":[31],"paper,":[32],"we":[33,51,129],"investigate":[34],"man-in-the-middle":[36],"(MITM)":[37],"attack":[38,62,79,140],"that":[39],"exploits":[40],"centralized":[42],"topological":[43],"view":[44],"critical":[45],"operations.":[48],"particular,":[50],"present":[52],"new":[54],"scheme":[55,122],"for":[56],"detection":[57,121],"and":[58,114,136],"classification":[59,104],"at":[63,84,147],"network":[65,85,115,149],"layer.":[66],"We":[67,88],"apply":[68],"wavelet":[69],"detect":[72,135],"anomalous":[73],"conditions":[74],"introduced":[75],"by":[76],"MITM":[78,139],"using":[80],"traffic":[81,99],"signals":[82,100],"collected":[83,98],"switch":[86],"ports.":[87],"then":[89],"identify":[90],"unique":[91],"characteristics":[92],"reported":[94],"anomalies":[95],"in":[96,141],"build":[102],"framework.":[105],"Other":[106],"cyber":[107,145],"events,":[108],"such":[109],"as":[110],"denial-of-service":[113],"congestion,":[116],"are":[117],"presented":[118],"validate":[124],"its":[125],"general":[126],"applicability.":[127],"Overall,":[128],"successfully":[130],"demonstrate":[131],"capability":[133],"classify":[137],"addition":[142],"other":[144],"events":[146],"layer,":[150],"thereby":[151],"contributing":[152],"SDN.":[157]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2912905125","counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-01-22T15:22:21.395765","created_date":"2019-02-21"}