{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T18:35:31Z","timestamp":1773167731115,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3700853","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"66-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Advanced Method for Flow Frequency Estimation and Top-k Heavy Hitters Detection in SDN Leveraging Programmable Switch"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-5735-6457","authenticated-orcid":false,"given":"Ali Nadim","family":"Alhaj","sequence":"first","affiliation":[{"name":"School of Computer and Information Sciences, Phd. Scholar at University of Hyderabad, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2708-2232","authenticated-orcid":false,"given":"Wilson Naik","family":"Bhukya","sequence":"additional","affiliation":[{"name":"School of Computer and Information Sciences, Associate professor University of Hyderabad, Hyderabad, Telangana, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-5621-0442","authenticated-orcid":false,"given":"Rajendra Prasad","family":"Lal","sequence":"additional","affiliation":[{"name":"School of Computer and Information Sciences, Assistant professor University of Hyderabad, Hyderabad, Telangana, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"crossref","unstructured":"Daniel\u00a0C Ahfock William\u00a0J Astle and Sylvia Richardson. 2021. Statistical properties of sketching algorithms. Biometrika 108 2 (2021) 283\u2013297.","DOI":"10.1093\/biomet\/asaa062"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"crossref","unstructured":"Ali\u00a0Nadim Alhaj and Nitul Dutta. 2022. Analysis of security attacks in SDN network: A comprehensive survey. Contemporary Issues in Communication Cloud and Big Data Analytics: Proceedings of CCB 2020 (2022) 27\u201337.","DOI":"10.1007\/978-981-16-4244-9_3"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Ali\u00a0Nadim Alhaj Narottam\u00a0Das Patel Ajeet Singh Rohit\u00a0Kumar Bondugula Mohsin\u00a0Furkh Dar and Jameel Ahamed. 2024. Design and analysis of a robust security layer for software defined network framework. International Journal of Sensor Networks 46 1 (2024) 1\u201314.","DOI":"10.1504\/IJSNET.2024.141613"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079304"},{"key":"e_1_3_3_1_6_2","unstructured":"CAIDA. 2024. The CAIDA anonymized internet traces dataset - 2016. https:\/\/data.caida.org\/datasets\/passive-2016.."},{"key":"e_1_3_3_1_7_2","unstructured":"CAIDA. 2024. The CAIDA anonymized internet traces dataset - 2019. https:\/\/data.caida.org\/datasets\/passive-2019.."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Graham Cormode and Shan Muthukrishnan. 2005. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 55 1 (2005) 58\u201375.","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCS52626.2021.9449202"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"crossref","unstructured":"MD\u00a0Samiul Islam Mohammed Al-Mukhtar MD\u00a0Rahat\u00a0Kader Khan and Mojammel Hossain. 2023. A Survey on SDN and SDCN Traffic Measurement: Existing Approaches and Research Challenges. Eng 4 2 (2023) 1071\u20131115.","DOI":"10.3390\/eng4020063"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Sukhveer Kaur Krishan Kumar and Naveen Aggarwal. 2021. A review on P4-Programmable data planes: Architecture research efforts and future directions. Computer Communications 170 (2021) 109\u2013129.","DOI":"10.1016\/j.comcom.2021.01.027"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"crossref","unstructured":"Anukool Lakhina Mark Crovella and Christophe Diot. 2004. Diagnosing network-wide traffic anomalies. ACM SIGCOMM computer communication review 34 4 (2004) 219\u2013230.","DOI":"10.1145\/1030194.1015492"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"crossref","unstructured":"He Li Kaoru Ota and Mianxiong Dong. 2019. LS-SDV: Virtual network management in large-scale software-defined IoT. IEEE Journal on Selected Areas in Communications 37 8 (2019) 1783\u20131793.","DOI":"10.1109\/JSAC.2019.2927099"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"crossref","unstructured":"Lei Liu Tong Ding Hui Feng Zhongmin Yan and Xudong Lu. 2022. Tree sketch: An accurate and memory-efficient sketch for network-wide measurement. Computer Communications 194 (2022) 148\u2013155.","DOI":"10.1016\/j.comcom.2022.07.009"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"e_1_3_3_1_19_2","first-page":"398","volume-title":"International conference on database theory","author":"Metwally Ahmed","year":"2005","unstructured":"Ahmed Metwally, Divyakant Agrawal, and Amr El\u00a0Abbadi. 2005. Efficient computation of frequent and top-k elements in data streams. In International conference on database theory. Springer, 398\u2013412."},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.5555\/2790265.2790281"},{"key":"e_1_3_3_1_21_2","unstructured":"P4 Language Consortium. 2023. P4 Switch Behavioral Model. https:\/\/github.com\/p4lang\/behavioral-model."},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"crossref","unstructured":"Dengyu Ran Xiao Chen and Lei Song. 2024. ComPipe: A Novel Flow Placement and Measurement Algorithm for Programmable Composite Pipelines. Electronics 13 6 (2024) 1022.","DOI":"10.3390\/electronics13061022"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Qilong Shi Yuchen Xu Jiuhua Qi Wenjun Li Tong Yang Yang Xu and Yi Wang. 2023. Cuckoo counter: Adaptive structure of counters for accurate frequency and top-k estimation. IEEE\/ACM Transactions on Networking 31 4 (2023) 1854\u20131869.","DOI":"10.1109\/TNET.2022.3232098"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_3_1_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155541"},{"key":"e_1_3_3_1_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Tong Yang Haowei Zhang Jinyang Li Junzhi Gong Steve Uhlig Shigang Chen and Xiaoming Li. 2019. HeavyKeeper: an accurate algorithm for finding Top-k elephant flows. IEEE\/ACM Transactions on Networking 27 5 (2019) 1845\u20131858.","DOI":"10.1109\/TNET.2019.2933868"},{"key":"e_1_3_3_1_29_2","doi-asserted-by":"crossref","unstructured":"Tong Yang Yang Zhou Hao Jin Shigang Chen and Xiaoming Li. 2017. Pyramid sketch: A sketch framework for frequency estimation of data streams. Proceedings of the VLDB Endowment 10 11 (2017) 1442\u20131453.","DOI":"10.14778\/3137628.3137652"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Xiaoyu Zhang Degang Wang Kaoru Ota Mianxiong Dong and Hongxing Li. 2020. Exponential stability of mixed time-delay neural networks based on switching approaches. IEEE Transactions on Cybernetics 52 2 (2020) 1125\u20131137.","DOI":"10.1109\/TCYB.2020.2985777"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"crossref","unstructured":"Zheng Zhang Jie Lu Quan Ren Ziyong Li Yuxiang Hu and Hongchang Chen. 2024. An Accurate and Invertible Sketch for Super Spread Detection. Electronics 13 1 (2024) 222.","DOI":"10.3390\/electronics13010222"},{"key":"e_1_3_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183726"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","location":"Hyderabad India","acronym":"ICDCN 2025"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3700853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3700853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3700853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":31,"alternative-id":["10.1145\/3700838.3700853","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3700853","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}