{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T21:45:40Z","timestamp":1773351940566,"version":"3.50.1"},"reference-count":122,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Bright Spark Unit, University of Malaya, Malaysia and by Malaysian Ministry of Higher Education under the University of Malaya High Impact Research","award":["UM.C\/625\/1\/HIR\/MOE\/FCSIT\/03"],"award-info":[{"award-number":["UM.C\/625\/1\/HIR\/MOE\/FCSIT\/03"]}]},{"name":"Bright Spark Unit, University of Malaya, Malaysia and by Malaysian Ministry of Higher Education under the University of Malaya High Impact Research","award":["RP012C-13AFR"],"award-info":[{"award-number":["RP012C-13AFR"]}]},{"DOI":"10.13039\/501100002383","name":"Deanship of Scientific Research at King Saud University through Prolific Research Group","doi-asserted-by":"publisher","award":["PRG-1436-16"],"award-info":[{"award-number":["PRG-1436-16"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2016.2597193","type":"journal-article","created":{"date-parts":[[2016,8,5]],"date-time":"2016-08-05T18:22:34Z","timestamp":1470421354000},"page":"303-324","source":"Crossref","is-referenced-by-count":145,"title":["Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5725-6184","authenticated-orcid":false,"given":"Suleman","family":"Khan","sequence":"first","affiliation":[]},{"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]},{"given":"Ainuddin Wahid","family":"Abdul Wahab","sequence":"additional","affiliation":[]},{"given":"Mohsen","family":"Guizani","sequence":"additional","affiliation":[]},{"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.06.002"},{"key":"ref38","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2620728.2620729","article-title":"Flow-level state transition as a new switch primitive for SDN","author":"moshref","year":"2014","journal-title":"Proceedings of the Workshop on Hot Topics in Software Defined Networks"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.8"},{"key":"ref32","article-title":"Supporting software defined networking with application layer traffic optimization","author":"zou","year":"2013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7389832"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2015.7194099"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320094"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.28"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620749"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838227"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref27","author":"moy","year":"1998","journal-title":"OSPF Anatomy of an Internet Routing Protocol"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CONFLUENCE.2016.7508193"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2330903"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2402617"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref26","author":"stewart","year":"1998","journal-title":"BGP4 Inter-Domain Routing in the Internet"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2496955"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364688"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2016.7474344"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2013.21"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491700"},{"key":"ref55","doi-asserted-by":"crossref","first-page":"302","DOI":"10.3390\/fi6020302","article-title":"Software-defined networking using OpenFlow: Protocols, applications and architectural design choices","volume":"6","author":"braun","year":"2014","journal-title":"Future Internet"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2355227"},{"key":"ref53","first-page":"1","article-title":"DISCO: Distributed multi-domain SDN controllers","author":"phemius","year":"2014","journal-title":"Proc IEEE Netw Operat Manage Symp (NOMS)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116185"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461198"},{"key":"ref6","first-page":"1","article-title":"Composing software defined networks","author":"monsanto","year":"0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461196"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.20"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_14"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2809826.2809833"},{"key":"ref48","first-page":"10","article-title":"On controller performance in software-defined networks","volume":"12","author":"tootoonchian","year":"2012","journal-title":"Proc HOT-ICE"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref42","first-page":"688","article-title":"Enhancing network management frameworks with SDN-like control","author":"sharma","year":"2013","journal-title":"Proc IFIP\/IEEE Int Symp Integr Netw Manage"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2014.153"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2491193"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2014.10.015"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/I4CT.2014.6914202"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.005"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/547062"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1187-9"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_16"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7378421"},{"key":"ref74","article-title":"WDARS: A weighted data aggregation routing strategy with minimum link cost in event-driven WSNs","author":"mahdi","year":"2016","journal-title":"J Sensors"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2016.05.022"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23309"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342452"},{"key":"ref60","first-page":"202","article-title":"Cyber-crimes and their impacts: A review","volume":"2","author":"saini","year":"2012","journal-title":"Int J Eng Res Appl"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073803"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.144"},{"key":"ref63","author":"nadeau","year":"2013","journal-title":"SDN Software Defined Networks"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535789"},{"key":"ref65","author":"dover","year":"2013","journal-title":"A Denial of Service Attack Against the Open Floodlight SDN Controller"},{"key":"ref66","article-title":"Of-guard: A DoS attack prevention extension in software-defined networks","author":"wang","year":"2014","journal-title":"Proc Open Netw Summit"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2015.5869"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2014.2300365"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491194"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2012.6212011"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702551"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3626"},{"key":"ref108","first-page":"86","article-title":"Applying SDN\/OpenFlow in virtualized lte to support distributed mobility management (DMM)","author":"karimzadeh","year":"2014","journal-title":"Proc 4th Int Conf Cloud Comput Services Sci (CLOSER)"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3623"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00269-9"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3630"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2015.179"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.34"},{"key":"ref105","article-title":"Current trends of topology discovery in OpenFlow-based software defined networks","author":"ochoa-aday","year":"2015"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258478"},{"key":"ref104","author":"hollander","year":"2007","journal-title":"A Link Layer Discovery Protocol Fuzzer"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"key":"ref103","first-page":"1","article-title":"A fail-safe SDN bridging platform for cloud networks","author":"gon\u00e7alves","year":"2014","journal-title":"Proc 16th Int Telecommun Netw Strategy Planning Symp (Networks)"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626304"},{"key":"ref111","first-page":"1419","article-title":"Towards security in virtualization of SDN","author":"you","year":"2014","journal-title":"Proc Int Conf Comput Commun Netw Security (ICCCNS)"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342444"},{"key":"ref110","first-page":"1","article-title":"FlowVisor: A network virtualization layer","author":"sherwood","year":"2009"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535795"},{"key":"ref96","article-title":"Distributed BPDU processing for spanning tree protocols","author":"choudhary","year":"2010"},{"key":"ref97","article-title":"Man in the middle attacks","author":"ornaghi","year":"2003","journal-title":"Proc Black Hat Conf"},{"key":"ref10","article-title":"FRESCO: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"Proc NDSS"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.012"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2489183"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/ICSPCS.2014.7021050"},{"key":"ref16","first-page":"1","article-title":"Security in software-defined networking: Threats and countermeasures","author":"shu","year":"2016","journal-title":"Mobile Netw Appl"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1631\/FITEE.1500321","article-title":"A secure and high-performance multi-controller architecture for software-defined networks","volume":"17","author":"wang","year":"2016","journal-title":"Frontiers Inf Technol Electron Eng"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2013.6496914"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876024"},{"key":"ref81","article-title":"Dynamic filtering for SDN API calls across a security boundary","author":"martin","year":"2014"},{"key":"ref18","first-page":"553","article-title":"Topology discovery, loop finding and alternative path solution in POX controller","author":"saha","year":"2016","journal-title":"Proc Int Multiconf Eng Comput Sci"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2390231.2390241"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702540"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366363"},{"key":"ref83","article-title":"The future of networking, and the past of protocols","volume":"20","author":"shenker","year":"2011","journal-title":"Proc Open Netw Summit"},{"key":"ref114","first-page":"1","article-title":"Experimental seamless virtual machine migration using a integrated SDN IT and network orchestrator","author":"mayoral","year":"2015","journal-title":"Optical Fiber Communication Conf Exhibit (OFC)"},{"key":"ref113","first-page":"519","article-title":"Tierless programming and reasoning for software-defined networks","author":"nelson","year":"2014","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-28537-0_9"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/APSITT.2015.7217098"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-24230-9_9"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.04.009"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1109\/ICCE-TW.2015.7216975"},{"key":"ref85","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/2814326","article-title":"A purpose-built global network: Google&#x2019;s move to SDN","volume":"59","author":"vahdat","year":"2016","journal-title":"Commun ACM"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838409"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"ref88","first-page":"105","article-title":"Middlebox driven security threats in software defined network","author":"hwang","year":"2014","journal-title":"Proc ISIT"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/7862305\/07534866.pdf?arnumber=7534866","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T06:31:03Z","timestamp":1657002663000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7534866\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":122,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/comst.2016.2597193","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}