{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:19:18Z","timestamp":1772727558492,"version":"3.50.1"},"reference-count":114,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T00:00:00Z","timestamp":1626134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,7,31]]},"abstract":"<jats:p>Software Defined Networking (SDN) is an evolving technology that decouples the control functionality from the underlying hardware managed by the control plane. The application plane supports programmers to develop numerous applications (such as networking, management, security, etc.) that can even be executed from remote locations. Northbound interface (NBI) bridges the control and application planes to execute the third-party applications business logic. Due to the software bugs in applications and existing vulnerabilities such as illegal function calling, resource exhaustion, lack of trust, and so on, NBIs are susceptible to different attacks. Based on the extensive literature review, we have identified that the researchers and academia have mainly focused on the security of the control plane, data plane, and southbound interface (SBI). NBI, in comparison, has received far less attention. In this article, the security of the least explored, but a critical component of the SDN architecture, i.e., NBI, is analyzed. The article provides a brief overview of SDN, followed by a detailed discussion on the categories of NBI, vulnerabilities of NBI, and threats posed by malicious applications to NBI. Efforts of the researchers to counter malicious applications and NBI issues are then discussed in detail. The standardization efforts for the single acceptable NBI and security requirements of SDN by Open Networking Foundation (ONF) are also presented. The article concludes with the future research directions for the security of a single acceptable NBI.<\/jats:p>","DOI":"10.1145\/3453648","type":"journal-article","created":{"date-parts":[[2021,7,13]],"date-time":"2021-07-13T16:48:08Z","timestamp":1626194888000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks"],"prefix":"10.1145","volume":"54","author":[{"given":"Bilal","family":"Rauf","sequence":"first","affiliation":[{"name":"National University of Sciences and Technology, Pakistan"}]},{"given":"Haider","family":"Abbas","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Pakistan"}]},{"given":"Muhammad","family":"Usman","sequence":"additional","affiliation":[{"name":"University of South Wales, UK"}]},{"given":"Tanveer A.","family":"Zia","sequence":"additional","affiliation":[{"name":"Charles Sturt University, Australia"}]},{"given":"Waseem","family":"Iqbal","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Pakistan"}]},{"given":"Yawar","family":"Abbas","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Pakistan"}]},{"given":"Hammad","family":"Afzal","sequence":"additional","affiliation":[{"name":"National University of Sciences and Technology, Pakistan"}]}],"member":"320","published-online":{"date-parts":[[2021,7,13]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"e_1_2_2_2_1","unstructured":"Richard Alimi Reinaldo Penno and Y. Yang. 2011. ALTO protocol. Retrieved from draft-ietfalto-protocol-09.txt.  Richard Alimi Reinaldo Penno and Y. Yang. 2011. ALTO protocol. Retrieved from draft-ietfalto-protocol-09.txt."},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107421"},{"key":"e_1_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2017.100"},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2578855.2535862"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.454"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116153"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602211"},{"key":"e_1_2_2_10_1","doi-asserted-by":"crossref","unstructured":"Andy Bierman Martin Bjorklund Kent Watsen and Rex Fernando. 2017. RESTCONF protocol. In IETF RFC 8040.  Andy Bierman Martin Bjorklund Kent Watsen and Rex Fernando. 2017. RESTCONF protocol. In IETF RFC 8040.","DOI":"10.17487\/RFC8040"},{"key":"e_1_2_2_11_1","volume-title":"Maestro: A system for Scalable Openflow Control. Technical Report","author":"Cai Zheng","year":"2010","unstructured":"Zheng Cai , Alan L. Cox , and T. S. Ng . 2010 . Maestro: A system for Scalable Openflow Control. Technical Report . Rice University . https:\/\/hdl.handle.net\/1911\/96391. Zheng Cai, Alan L. Cox, and T. S. Ng. 2010. Maestro: A system for Scalable Openflow Control. Technical Report. Rice University. https:\/\/hdl.handle.net\/1911\/96391."},{"key":"e_1_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670518.2673880"},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890965"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102595"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/WPMC.2017.8301788"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487415"},{"key":"e_1_2_2_17_1","article-title":"On standards for application level interfaces in SDN","volume":"7","author":"Daradkeh Yousef Ibrahim","year":"2016","unstructured":"Yousef Ibrahim Daradkeh , Mujahed A Dhaifallah , Dmitry Namiot , and Manfred Sneps-Sneppe . 2016 . On standards for application level interfaces in SDN . Int. J. Adv. Comput. Sci. Applic. 7 , 10 (2016). Yousef Ibrahim Daradkeh, Mujahed ADhaifallah, Dmitry Namiot, and Manfred Sneps-Sneppe. 2016. On standards for application level interfaces in SDN. Int. J. Adv. Comput. Sci. Applic. 7, 10 (2016).","journal-title":"Int. J. Adv. Comput. Sci. Applic."},{"key":"e_1_2_2_18_1","unstructured":"John Dix. 2013. Clarifying the role of software-defined networking northbound APIs. Retrieved from https:\/\/www.networkworld.com\/article\/2165901\/clarifying-the-role-of-software-defined-networking-northbound-apis.html.  John Dix. 2013. Clarifying the role of software-defined networking northbound APIs. Retrieved from https:\/\/www.networkworld.com\/article\/2165901\/clarifying-the-role-of-software-defined-networking-northbound-apis.html."},{"key":"e_1_2_2_19_1","volume-title":"Robert Haas, Hormuzd M. Khosravi, Weiming Wang, Ligang Dong, Ram Gopal, and Joel M. Halpern.","author":"Doria Avri","year":"2010","unstructured":"Avri Doria , Jamal Hadi Salim , Robert Haas, Hormuzd M. Khosravi, Weiming Wang, Ligang Dong, Ram Gopal, and Joel M. Halpern. 2010 . Forwarding and control element separation (ForCES) protocol specification.RFC 5810 (2010), 1\u2013124. Avri Doria, Jamal Hadi Salim, Robert Haas, Hormuzd M. Khosravi, Weiming Wang, Ligang Dong, Ram Gopal, and Joel M. Halpern. 2010. Forwarding and control element separation (ForCES) protocol specification.RFC 5810 (2010), 1\u2013124."},{"key":"e_1_2_2_20_1","doi-asserted-by":"crossref","unstructured":"Rob Enns Martin Bjorklund Juergen Schoenwaelder and Andy Bierman. 2011. Network configuration protocol (NETCONF). Internet Engineering Task Force. http:\/\/www.rfc-editor.org\/rfc\/rfc6241.txt.  Rob Enns Martin Bjorklund Juergen Schoenwaelder and Andy Bierman. 2011. Network configuration protocol (NETCONF). Internet Engineering Task Force. http:\/\/www.rfc-editor.org\/rfc\/rfc6241.txt.","DOI":"10.17487\/rfc6241"},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491189"},{"key":"e_1_2_2_22_1","volume-title":"Application Layer of Software Defined Networking: Pros and Cons in Terms of Security. Master\u2019s thesis","author":"Fakoorrad Morteza","unstructured":"Morteza Fakoorrad . 2016. Application Layer of Software Defined Networking: Pros and Cons in Terms of Security. Master\u2019s thesis . Tallinn University of Technology . Morteza Fakoorrad. 2016. Application Layer of Software Defined Networking: Pros and Cons in Terms of Security. Master\u2019s thesis. Tallinn University of Technology."},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3397022"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486003"},{"key":"e_1_2_2_26_1","unstructured":"Floodlight Project. 2019. Floodlight Controller. Retrieved from http:\/\/www.projectfloodlight.org\/floodlight\/.  Floodlight Project. 2019. Floodlight Controller. Retrieved from http:\/\/www.projectfloodlight.org\/floodlight\/."},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"e_1_2_2_30_1","volume-title":"OSGi in Action: Creating Modular Applications in Java","author":"Hall Richard S.","unstructured":"Richard S. Hall , Karl Pauls , Stuart McCulloch , and David Savage . 2011. OSGi in Action: Creating Modular Applications in Java . Greenwich : Manning Publications . Richard S. Hall, Karl Pauls, Stuart McCulloch, and David Savage. 2011. OSGi in Action: Creating Modular Applications in Java. Greenwich: Manning Publications."},{"key":"e_1_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342446"},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592683"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368926.3369709"},{"key":"e_1_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"e_1_2_2_35_1","unstructured":"C. Janz N. Davis D. Hood D. Lenrow Li Fengkai F. Schneider J. Strassner and A. Veitch. 2016. Intent NBI-Definition and Principles. Technical Report. ONF TR-523. https:\/\/opennetworking.org\/wp-content\/uploads\/2014\/10\/TR-523_Intent_Definition_Principles.pdf.  C. Janz N. Davis D. Hood D. Lenrow Li Fengkai F. Schneider J. Strassner and A. Veitch. 2016. Intent NBI-Definition and Principles. Technical Report. ONF TR-523. https:\/\/opennetworking.org\/wp-content\/uploads\/2014\/10\/TR-523_Intent_Definition_Principles.pdf."},{"key":"e_1_2_2_36_1","first-page":"20","article-title":"Trust Establishment in SDN: Controller and applications","volume":"9","author":"Isong Bassey","year":"2017","unstructured":"Bassey Isong , Tebogo Kgogo , and Francis Lugayizi . 2017 . Trust Establishment in SDN: Controller and applications . Int. J. Comput. Netw. Inf. Secur. 9 , 7 (2017), 20 . Bassey Isong, Tebogo Kgogo, and Francis Lugayizi. 2017. Trust Establishment in SDN: Controller and applications. Int. J. Comput. Netw. Inf. Secur. 9, 7 (2017), 20.","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"e_1_2_2_37_1","volume-title":"IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW\u201916)","author":"Lalita","unstructured":"Lalita J. Jagadeesan and Veena Mendiratta. 2016. Programming the network: Application software faults in software-defined networks . In IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW\u201916) . IEEE, 125\u2013131. Lalita J. Jagadeesan and Veena Mendiratta. 2016. Programming the network: Application software faults in software-defined networks. In IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW\u201916). IEEE, 125\u2013131."},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.11.017"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2597193"},{"key":"e_1_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916572"},{"key":"e_1_2_2_41_1","volume-title":"10th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201913)","author":"Khurshid Ahmed","unstructured":"Ahmed Khurshid , Xuan Zou , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2013. Veriflow: Verifying network-wide invariants in real time . In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201913) . 15\u201327. Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2013. Veriflow: Verifying network-wide invariants in real time. In 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201913). 15\u201327."},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3022227.3022277"},{"key":"e_1_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"e_1_2_2_44_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation","volume":"10","author":"Koponen Teemu","year":"2010","unstructured":"Teemu Koponen , Martin Casado , Natasha Gude , Jeremy Stribling , Leon Poutievski , Min Zhu , Rajiv Ramanathan , Yuichiro Iwata , Hiroaki Inoue , Takayuki Hama , et\u00a0al. 2010 . Onix: A distributed control platform for large-scale production networks . In USENIX Symposium on Operating Systems Design and Implementation , Vol. 10 . 1\u20136. Teemu Koponen, Martin Casado, Natasha Gude, Jeremy Stribling, Leon Poutievski, Min Zhu, Rajiv Ramanathan, Yuichiro Iwata, Hiroaki Inoue, Takayuki Hama, et\u00a0al. 2010. Onix: A distributed control platform for large-scale production networks. In USENIX Symposium on Operating Systems Design and Implementation, Vol. 10. 1\u20136."},{"key":"e_1_2_2_45_1","unstructured":"L. Kreeger Dinesh Dutt Thomas Narten David Black and Murari Sridharan. 2012. Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00. https:\/\/www.ietf.org\/proceedings\/83\/slides\/slides-83-nvo3-4.pdf.  L. Kreeger Dinesh Dutt Thomas Narten David Black and Murari Sridharan. 2012. Network Virtualization Overlay Control Protocol Requirements draft-kreeger-nvo3-overlay-cp-00. https:\/\/www.ietf.org\/proceedings\/83\/slides\/slides-83-nvo3-4.pdf."},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"e_1_2_2_47_1","volume-title":"Siamak Azodolmolky, and Steve Uhlig.","author":"Kreutz Diego","year":"2014","unstructured":"Diego Kreutz , Fernando Ramos , Paulo Verissimo , Christian Esteve Rothenberg , Siamak Azodolmolky, and Steve Uhlig. 2014 . Software-defined networking: A comprehensive survey. arXiv preprint arXiv:1406.0440 (2014). Diego Kreutz, Fernando Ramos, Paulo Verissimo, Christian Esteve Rothenberg, Siamak Azodolmolky, and Steve Uhlig. 2014. Software-defined networking: A comprehensive survey. arXiv preprint arXiv:1406.0440 (2014)."},{"key":"e_1_2_2_48_1","volume-title":"Md Monjurul Karim, and Yu Wang","author":"Latif Zohaib","year":"2019","unstructured":"Zohaib Latif , Kashif Sharif , Fan Li , Md Monjurul Karim, and Yu Wang . 2019 . A comprehensive survey of interface protocols for software defined networks. arXiv preprint arXiv:1902.07913 (2019). Zohaib Latif, Kashif Sharif, Fan Li, Md Monjurul Karim, and Yu Wang. 2019. A comprehensive survey of interface protocols for software defined networks. arXiv preprint arXiv:1902.07913 (2019)."},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876024"},{"key":"e_1_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSN.2016.042"},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-015-3145-0"},{"key":"e_1_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2491703"},{"key":"e_1_2_2_53_1","volume-title":"Foundations of Logic Programming","author":"Lloyd John W.","unstructured":"John W. Lloyd . 2012. Foundations of Logic Programming . Springer Science & Business Media . John W. Lloyd. 2012. Foundations of Logic Programming. Springer Science & Business Media."},{"key":"e_1_2_2_54_1","unstructured":"M. McCauley. 2012. POX. Retrieved from http:\/\/www.noxrepo.org\/.  M. McCauley. 2012. POX. Retrieved from http:\/\/www.noxrepo.org\/."},{"key":"e_1_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/WD.2018.8361694"},{"key":"e_1_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2018.8436794"},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-016-0505-z"},{"key":"e_1_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103621.2103685"},{"key":"e_1_2_2_60_1","unstructured":"J. Rexford N. P. Katta and D. Walker. 2019. Logic programming for software-defined networks. Retrieved from http:\/\/frenetic-lang.org\/publications\/logic-programming-xldi12-slides.pdf.  J. Rexford N. P. Katta and D. Walker. 2019. Logic programming for software-defined networks. Retrieved from http:\/\/frenetic-lang.org\/publications\/logic-programming-xldi12-slides.pdf."},{"key":"e_1_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477944"},{"key":"e_1_2_2_62_1","volume-title":"IEEE 4th International Conference on Knowledge-based Engineering and Innovation (KBEI\u201917)","author":"Hashemi Natanzi Seyed Bagher","year":"2017","unstructured":"Seyed Bagher Hashemi Natanzi and Mohammad Reza Majma . 2017 . Secure northbound interface for SDN applications with NTRU public key infrastructure . In IEEE 4th International Conference on Knowledge-based Engineering and Innovation (KBEI\u201917) . IEEE, 0452\u20130458. Seyed Bagher Hashemi Natanzi and Mohammad Reza Majma. 2017. Secure northbound interface for SDN applications with NTRU public key infrastructure. In IEEE 4th International Conference on Knowledge-based Engineering and Innovation (KBEI\u201917). IEEE, 0452\u20130458."},{"key":"e_1_2_2_63_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914)","author":"Nelson Tim","year":"2014","unstructured":"Tim Nelson , Andrew D. Ferguson , Michael J. G. Scheer , and Shriram Krishnamurthi . 2014 . Tierless programming and reasoning for software-defined networks . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914) . 519\u2013531. Tim Nelson, Andrew D. Ferguson, Michael J. G. Scheer, and Shriram Krishnamurthi. 2014. Tierless programming and reasoning for software-defined networks. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201914). 519\u2013531."},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2015.7182679"},{"key":"e_1_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.04.038"},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9411-6"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073808"},{"key":"e_1_2_2_69_1","unstructured":"ONF. 2013. Open Networking Foundation Introduces Northbound Interface Working Group. Retrieved from https:\/\/www.opennetworking.org\/news-and-events\/press-releases\/open-networking-foundation-introduces-northbound-interface\/-working-group\/.  ONF. 2013. Open Networking Foundation Introduces Northbound Interface Working Group. Retrieved from https:\/\/www.opennetworking.org\/news-and-events\/press-releases\/open-networking-foundation-introduces-northbound-interface\/-working-group\/."},{"key":"e_1_2_2_71_1","unstructured":"ONOS PROJECT. 2019. Open Networking Operating System. Retrieved from http:\/\/onosproject.org\/.  ONOS PROJECT. 2019. Open Networking Operating System. Retrieved from http:\/\/onosproject.org\/."},{"key":"e_1_2_2_72_1","unstructured":"Open Networking Foundation (ONF). 2019. Retrieved from https:\/\/www.opennetworking.org\/.  Open Networking Foundation (ONF). 2019. Retrieved from https:\/\/www.opennetworking.org\/."},{"key":"e_1_2_2_73_1","volume-title":"Software-defined Networking: The New Norm for Networks. Technical Reports.","author":"Open Networking","year":"2012","unstructured":"Open Networking Foundation (ONF). 2012 . Software-defined Networking: The New Norm for Networks. Technical Reports. Retrieved from https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/white-papers\/wp-sdn-newnorm.pdf. Open Networking Foundation (ONF). 2012. Software-defined Networking: The New Norm for Networks. Technical Reports. Retrieved from https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/white-papers\/wp-sdn-newnorm.pdf."},{"key":"e_1_2_2_76_1","unstructured":"OpenDaylight Project. 2019. OpenDaylight Controller. Retrieved from https:\/\/www.opendaylight.org\/.  OpenDaylight Project. 2019. OpenDaylight Controller. Retrieved from https:\/\/www.opendaylight.org\/."},{"key":"e_1_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914647"},{"key":"e_1_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2846236"},{"key":"e_1_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553677"},{"key":"e_1_2_2_80_1","doi-asserted-by":"crossref","unstructured":"Ben Pfaff and Bruce Davie. 2013. The Open vSwitch database management protocol. Internet Engineering Task Force RFC 7047 (Informational). Retrieved from http:\/\/www.ietf.org\/rfc\/rfc7047.txt.  Ben Pfaff and Bruce Davie. 2013. The Open vSwitch database management protocol. Internet Engineering Task Force RFC 7047 (Informational). Retrieved from http:\/\/www.ietf.org\/rfc\/rfc7047.txt.","DOI":"10.17487\/rfc7047"},{"key":"e_1_2_2_81_1","volume-title":"International Conference on Business Process Management. Springer, 383\u2013394","author":"Pichler Paul","unstructured":"Paul Pichler , Barbara Weber , Stefan Zugal , Jakob Pinggera , Jan Mendling , and Hajo A. Reijers . 2011. Imperative versus declarative process modeling languages: An empirical investigation . In International Conference on Business Process Management. Springer, 383\u2013394 . Paul Pichler, Barbara Weber, Stefan Zugal, Jakob Pinggera, Jan Mendling, and Hajo A. Reijers. 2011. Imperative versus declarative process modeling languages: An empirical investigation. In International Conference on Business Process Management. Springer, 383\u2013394."},{"key":"e_1_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23222"},{"key":"e_1_2_2_84_1","article-title":"Modular SDN programming with pyretic","volume":"5","author":"Reich Joshua","year":"2013","unstructured":"Joshua Reich , Christopher Monsanto , Nate Foster , Jennifer Rexford , and David Walker . 2013 . Modular SDN programming with pyretic . Usenix Magazine 5 , 38 (2013). Joshua Reich, Christopher Monsanto, Nate Foster, Jennifer Rexford, and David Walker. 2013. Modular SDN programming with pyretic. Usenix Magazine 5, 38 (2013).","journal-title":"Usenix Magazine"},{"key":"e_1_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491187"},{"key":"e_1_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229616.3229620"},{"key":"e_1_2_2_87_1","unstructured":"SDN Ryu. 2015. Framework community: RYU SDN framework. Retrieved from http:\/\/osrg.github.io\/ryu.  SDN Ryu. 2015. Framework community: RYU SDN framework. Retrieved from http:\/\/osrg.github.io\/ryu."},{"key":"e_1_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/MELCON.2016.7495430"},{"key":"e_1_2_2_89_1","unstructured":"David Lenrow Sarwar Raza. 2013. Open Networking Foundation North Bound Interface Working Group (NBI-WG) Charter. Retrieved from https:\/\/www.opennetworking.org\/images\/stories\/downloads\/working-groups\/charter-nbi.pdf.  David Lenrow Sarwar Raza. 2013. Open Networking Foundation North Bound Interface Working Group (NBI-WG) Charter. Retrieved from https:\/\/www.opennetworking.org\/images\/stories\/downloads\/working-groups\/charter-nbi.pdf."},{"key":"e_1_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2017.01.005"},{"key":"e_1_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.98"},{"key":"e_1_2_2_92_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"e_1_2_2_93_1","volume-title":"SDN security: A survey","author":"Scott-Hayward Sandra","unstructured":"Sandra Scott-Hayward , Gemma O\u2019Callaghan , and Sakir Sezer . 2013. SDN security: A survey . In IEEE SDN for Future Networks and Services (SDN4FNS\u201913). IEEE , 1\u20137. Sandra Scott-Hayward, Gemma O\u2019Callaghan, and Sakir Sezer. 2013. SDN security: A survey. In IEEE SDN for Future Networks and Services (SDN4FNS\u201913). IEEE, 1\u20137."},{"key":"e_1_2_2_94_1","volume-title":"Rajkumar Buyya, and Sanjay Jha.","author":"Shaghaghi Arash","year":"2018","unstructured":"Arash Shaghaghi , Mohamed Ali Kaafar , Rajkumar Buyya, and Sanjay Jha. 2018 . Software-defined network (SDN) data plane security: Issues , solutions and future directions. arXiv preprint arXiv:1804.00262 (2018). Arash Shaghaghi, Mohamed Ali Kaafar, Rajkumar Buyya, and Sanjay Jha. 2018. Software-defined network (SDN) data plane security: Issues, solutions and future directions. arXiv preprint arXiv:1804.00262 (2018)."},{"key":"e_1_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-19156-6_32"},{"key":"e_1_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_2_2_97_1","volume-title":"20th Network & Distributed System Security Symposium.","author":"Shin Seung Won","year":"2013","unstructured":"Seung Won Shin , Phillip Porras , Vinod Yegneswara , Martin Fong , Guofei Gu , and Mabry Tyson . 2013 . FRESCO: Modular composable security services for software-defined networks . In 20th Network & Distributed System Security Symposium. Seung Won Shin, Phillip Porras, Vinod Yegneswara, Martin Fong, Guofei Gu, and Mabry Tyson. 2013. FRESCO: Modular composable security services for software-defined networks. In 20th Network & Distributed System Security Symposium."},{"key":"e_1_2_2_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-016-0676-x"},{"key":"e_1_2_2_99_1","unstructured":"MEA Smith M. Dvorkin Y. Laribi V. Pandey P. Garg and N. Weidenbacher. 2014. OpFlex control protocol. IETF J. (Apr. 2014).  MEA Smith M. Dvorkin Y. Laribi V. Pandey P. Garg and N. Weidenbacher. 2014. OpFlex control protocol. IETF J. (Apr. 2014)."},{"key":"e_1_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491190"},{"key":"e_1_2_2_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535771.2535792"},{"key":"e_1_2_2_102_1","volume-title":"NFV, QoE, IoT, and Cloud","author":"Stallings William","unstructured":"William Stallings . 2015. Foundations of Modern Networking: SDN , NFV, QoE, IoT, and Cloud . Addison-Wesley Professional . William Stallings. 2015. Foundations of Modern Networking: SDN, NFV, QoE, IoT, and Cloud. Addison-Wesley Professional."},{"key":"e_1_2_2_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.214"},{"key":"e_1_2_2_104_1","article-title":"The northbound APIs of software defined networks","volume":"5","author":"Tijare P. V.","year":"2016","unstructured":"P. V. Tijare and D. Vasudevan . 2016 . The northbound APIs of software defined networks . Int. J. Eng. Sci. Res. Tech. 5 , 10 (2016). P. V. Tijare and D. Vasudevan. 2016. The northbound APIs of software defined networks. Int. J. Eng. Sci. Res. Tech. 5, 10 (2016).","journal-title":"Int. J. Eng. Sci. Res. Tech."},{"key":"e_1_2_2_105_1","unstructured":"Nippon Telegraph and Telephone Corporation. 2012. RYU network operating system. http:\/\/osrg.github.com\/ryu\/.  Nippon Telegraph and Telephone Corporation. 2012. RYU network operating system. http:\/\/osrg.github.com\/ryu\/."},{"key":"e_1_2_2_106_1","volume-title":"28th International Conference on Computer Communication and Networks (ICCCN\u201919)","author":"Toshniwal B.","year":"2019","unstructured":"B. Toshniwal , K. D. Joshi , P. Shrivastava , and K. Kataoka . 2019. BEAM: behavior-based access control mechanism for SDN applications . In 28th International Conference on Computer Communication and Networks (ICCCN\u201919) . 1\u20132. DOI:DOI:https:\/\/doi.org\/10.1109\/ICCCN. 2019 .8846954 10.1109\/ICCCN.2019.8846954 B. Toshniwal, K. D. Joshi, P. Shrivastava, and K. Kataoka. 2019. BEAM: behavior-based access control mechanism for SDN applications. In 28th International Conference on Computer Communication and Networks (ICCCN\u201919). 1\u20132. DOI:DOI:https:\/\/doi.org\/10.1109\/ICCCN.2019.8846954"},{"key":"e_1_2_2_107_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACOMP.2019.00027"},{"key":"e_1_2_2_108_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-019-0009-9"},{"key":"e_1_2_2_109_1","unstructured":"Trema. 2019. Trema project. Retrieved from http:\/\/trema.github.io\/trema.  Trema. 2019. Trema project. Retrieved from http:\/\/trema.github.io\/trema."},{"key":"e_1_2_2_110_1","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.21"},{"key":"e_1_2_2_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997249"},{"key":"e_1_2_2_112_1","doi-asserted-by":"publisher","DOI":"10.1109\/PDCAT.2016.064"},{"key":"e_1_2_2_113_1","first-page":"2","article-title":"PERM-GUARD: Authenticating the validity of flow rules in software defined networking","volume":"86","author":"Wang Mengmeng","year":"2017","unstructured":"Mengmeng Wang , Jianwei Liu , Jie Chen , Xiao Liu , and Jian Mao . 2017 . PERM-GUARD: Authenticating the validity of flow rules in software defined networking . J. Sig. Process. Syst. 86 , 2 \u2013 3 (2017), 157\u2013173. Mengmeng Wang, Jianwei Liu, Jie Chen, Xiao Liu, and Jian Mao. 2017. PERM-GUARD: Authenticating the validity of flow rules in software defined networking. J. Sig. Process. Syst. 86, 2\u20133 (2017), 157\u2013173.","journal-title":"J. Sig. Process. Syst."},{"key":"e_1_2_2_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491212"},{"key":"e_1_2_2_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"e_1_2_2_116_1","first-page":"e4518","article-title":"A trust management framework for software-defined network applications","volume":"32","author":"Yao Zhen","year":"2018","unstructured":"Zhen Yao and Zheng Yan . 2018 . A trust management framework for software-defined network applications . Concurr. Comput.: Pract. Exper. 32 , 16 (2018), e4518 . Zhen Yao and Zheng Yan. 2018. A trust management framework for software-defined network applications. Concurr. Comput.: Pract. Exper. 32, 16 (2018), e4518.","journal-title":"Concurr. Comput.: Pract. Exper."},{"key":"e_1_2_2_117_1","unstructured":"H. Yin H Xie T. Tsou D. Lopez P. Aranda and R. Sidi. 2012. SDNi: A Message Exchange Protocol for Software Defined Networks (SDNS) across Multiple Domains- Internet Draft.  H. Yin H Xie T. Tsou D. Lopez P. Aranda and R. Sidi. 2012. SDNi: A Message Exchange Protocol for Software Defined Networks (SDNS) across Multiple Domains- Internet Draft."},{"key":"e_1_2_2_118_1","volume-title":"28th International Conference on Advanced Information Networking and Applications Workshops. 358\u2013365","author":"Zhou W.","year":"2014","unstructured":"W. Zhou , L. Li , M. Luo , and W. Chou . 2014. REST API design patterns for SDN Northbound API . In 28th International Conference on Advanced Information Networking and Applications Workshops. 358\u2013365 . DOI:DOI:https:\/\/doi.org\/10.1109\/WAINA. 2014 .153 10.1109\/WAINA.2014.153 W. Zhou, L. Li, M. Luo, and W. Chou. 2014. REST API design patterns for SDN Northbound API. In 28th International Conference on Advanced Information Networking and Applications Workshops. 358\u2013365. DOI:DOI:https:\/\/doi.org\/10.1109\/WAINA.2014.153"},{"key":"e_1_2_2_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2828132"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453648","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3453648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:48Z","timestamp":1750193268000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3453648"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,13]]},"references-count":114,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,7,31]]}},"alternative-id":["10.1145\/3453648"],"URL":"https:\/\/doi.org\/10.1145\/3453648","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,13]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}