{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T14:12:21Z","timestamp":1764079941124,"version":"build-2065373602"},"reference-count":70,"publisher":"MDPI AG","issue":"21","license":[{"start":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T00:00:00Z","timestamp":1698883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Software-Defined Networking (SDN), which is used in Industrial Internet of Things, uses a controller as its \u201cnetwork brain\u201d located at the control plane. This uniquely distinguishes it from the traditional networking paradigms because it provides a global view of the entire network. In SDN, the controller can become a single point of failure, which may cause the whole network service to be compromised. Also, data packet transmission between controllers and switches could be impaired by natural disasters, causing hardware malfunctioning or Distributed Denial of Service (DDoS) attacks. Thus, SDN controllers are vulnerable to both hardware and software failures. To overcome this single point of failure in SDN, this paper proposes an attack-aware logical link assignment (AALLA) mathematical model with the ultimate aim of restoring the SDN network by using logical link assignment from switches to the cluster (backup) controllers. We formulate the AALLA model in integer linear programming (ILP), which restores the disrupted SDN network availability by assigning the logical links to the cluster (backup) controllers. More precisely, given a set of switches that are managed by the controller(s), this model simultaneously determines the optimal cost for controllers, links, and switches.<\/jats:p>","DOI":"10.3390\/s23218922","type":"journal-article","created":{"date-parts":[[2023,11,2]],"date-time":"2023-11-02T09:28:13Z","timestamp":1698917293000},"page":"8922","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["AALLA: Attack-Aware Logical Link Assignment Cost-Minimization Model for Protecting Software-Defined Networks against DDoS Attacks"],"prefix":"10.3390","volume":"23","author":[{"given":"Sameer","family":"Ali","sequence":"first","affiliation":[{"name":"Faculty of Computing & Informatics (FCI), Multimedia University (MMU), Cyberjaya 63100, Malaysia"},{"name":"Department of Information Technology, SZABIST University, Karachi 75600, Pakistan"}]},{"given":"Saw Chin","family":"Tan","sequence":"additional","affiliation":[{"name":"Faculty of Computing & Informatics (FCI), Multimedia University (MMU), Cyberjaya 63100, Malaysia"}]},{"given":"Ching Kwang","family":"Lee","sequence":"additional","affiliation":[{"name":"Faculty of Engineering (FOE), Multimedia University (MMU), Cyberjaya 63100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0764-5007","authenticated-orcid":false,"given":"Zulfadzli","family":"Yusoff","sequence":"additional","affiliation":[{"name":"Faculty of Engineering (FOE), Multimedia University (MMU), Cyberjaya 63100, Malaysia"}]},{"given":"Muhammad Reazul","family":"Haque","sequence":"additional","affiliation":[{"name":"Faculty of Computing & Informatics (FCI), Multimedia University (MMU), Cyberjaya 63100, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8819-5831","authenticated-orcid":false,"given":"Alexios","family":"Mylonas","sequence":"additional","affiliation":[{"name":"School of Physics, Engineering and Computer Science (SPECS), University of Hertfordshire, Hatfield AL10 9AB, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3392-9970","authenticated-orcid":false,"given":"Nikolaos","family":"Pitropakis","sequence":"additional","affiliation":[{"name":"School of Computing, Engineering & the Build Environment, Edinburgh Napier University, Edinburgh EH10 5DT, UK"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,2]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/COMST.2016.2618874","article-title":"Software defined networking architecture, security and energy efficiency: A survey","volume":"19","author":"Rawat","year":"2017","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Shin, S., and Gu, G. (2013, January 16). Attacking software-defined networks: A first feasibility study. Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, Hong Kong, China.","DOI":"10.1145\/2491185.2491220"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"25487","DOI":"10.1109\/ACCESS.2017.2762291","article-title":"Advancing Software-Defined Networks: A Survey","volume":"5","author":"Cox","year":"2017","journal-title":"IEEE Access"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TNSM.2015.2402432","article-title":"Heuristic approaches to the controller placement problem in large scale SDN networks","volume":"12","author":"Lange","year":"2015","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_5","unstructured":"Yeganeh, S., and Ganjali, Y. (2012, January 13). Kandoo: A framework for efficient and scalable offloading of control applications. Proceedings of the ACM SIGCOMM Hot Topics in Software Defined Networking (HotSDN), Helsinki, Finland."},{"key":"ref_6","unstructured":"Casado, M. (2010, January 15). Scalability and reliability of logically centralized controller. Proceedings of the Stanford CIO Summit, Stanford, CA, USA."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1007\/s11036-016-0676-x","article-title":"Security in software-defined networking: Threats and countermeasures","volume":"21","author":"Shu","year":"2016","journal-title":"Mob. Netw. Appl."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Shohani, R.B., and Mostafavi, S.A. (2020, January 22\u201323). Introducing a new linear regression based method for early DDoS attack detection in SDN. Proceedings of the 2020 6th International Conference on Web Research (ICWR), Tehran, Iran.","DOI":"10.1109\/ICWR49608.2020.9122310"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Sufiev, H., and Haddad, Y. (2017, January 8\u201310). DCF: Dynamic cluster flow architecture for SDN control plane. Proceedings of the 2017 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA.","DOI":"10.1109\/ICCE.2017.7889274"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"108852","DOI":"10.1016\/j.comnet.2022.108852","article-title":"Dynamic clustering of software defined network switches and controller placement using deep reinforcement learning","volume":"207","author":"Bouzidi","year":"2022","journal-title":"Comput. Netw."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Macedo, R., de Castro, R., Santos, A., Ghamri-Doudane, Y., and Nogueira, M. (2016, January 4\u20138). Self-Organized SDN Controller Cluster Conformations Against DDoS Attacks Effects. Proceedings of the Global Communications Conference (GLOBECOM), Washington, DC, USA.","DOI":"10.1109\/GLOCOM.2016.7842259"},{"key":"ref_12","unstructured":"Tsai, P.W., Lee, C.W., and Wang, T.W. (2023, January 21\u201323). Design and Development of a Trust Mechanism to Enhance Security Protection on SDN-based IoT Network. Proceedings of the 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), Detroit, MI, USA."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"807","DOI":"10.1007\/978-3-031-27986-7_31","article-title":"Dynamic Data-Driven Approach for Cyber-Resilient and Secure Critical Energy Systems","volume":"Volume 2","author":"Jin","year":"2023","journal-title":"Handbook of Dynamic Data Driven Applications Systems"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"91550","DOI":"10.1109\/ACCESS.2023.3307467","article-title":"On the (in) Security of the Control Plane of SDN Architecture: A Survey","volume":"11","author":"Bhuiyan","year":"2023","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"106733","DOI":"10.1109\/ACCESS.2023.3319214","article-title":"Optimized Artificial Intelligence Model for DDoS Detection in SDN Environment","volume":"11","year":"2023","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"DeLany, R., Smith, A., Li, Y., and Du, L. (2023, January 21\u201323). SDN Dynamic Controller Configuration to Mitigate Compromised Controllers. Proceedings of the 2023 IEEE Transportation Electrification Conference & Expo (ITEC), Detroit, MI, USA.","DOI":"10.1109\/ITEC55900.2023.10186974"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Shaji, N.S., and Muthalagu, R. (2023). Survey on security aspects of distributed software-defined networking controllers in an enterprise SD-WLAN. Digit. Commun. Netw.","DOI":"10.1016\/j.dcan.2023.09.004"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Lemeshko, O., Yeremenko, O., Mersni, A., and Gazda, J. (2022, January 16\u201318). Improvement of Confidential Messages Secure Routing over Paths with Intersection in Cyber Resilient Networks. Proceedings of the 2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT), Sarajevo, Bosnia and Herzegovina.","DOI":"10.1109\/ICAT54566.2022.9811191"},{"key":"ref_19","unstructured":"Lemeshko, O., Yeremenko, O., Yevdokymenko, M., Shapovalova, A., and Baranovskyi, O. (2021). Future Intent-Based Networking: On the QoS Robust and Energy Efficient Heterogeneous Software Defined Networks, Springer International Publishing."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","article-title":"Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: A survey, some research issues, and challenges","volume":"18","author":"Yan","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Mallikarjunan, K.N., Muthupriya, K., and Shalinie, S.M. (2016, January 7\u20138). A survey of distributed denial of service attack. Proceedings of the 2016 10th International Conference on Intelligent Systems and Control (ISCO), Coimbatore, India.","DOI":"10.1109\/ISCO.2016.7727096"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Xu, Y., and Liu, Y. (2016, January 10\u201314). DDoS attack detection under SDN context. Proceedings of the IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA.","DOI":"10.1109\/INFOCOM.2016.7524500"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Wang, T., Liu, F., Guo, J., and Xu, H. (2016, January 10\u201314). Dynamic sdn controller assignment in data center networks: Stable matching with transfers. Proceedings of the IEEE INFOCOM 2016\u2014The 35th Annual IEEE International Conference on Computer Communications, San Francisco, CA, USA.","DOI":"10.1109\/INFOCOM.2016.7524357"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4963","DOI":"10.1007\/s11276-019-02077-5","article-title":"The controller placement problem for wireless SDN","volume":"25","author":"Dvir","year":"2019","journal-title":"Wirel. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"M\u00fcller, L.F., Oliveira, R.R., Luizelli, M.C., Gaspary, L.P., and Barcellos, M.P. (2014, January 8\u201312). Survivor: An enhanced controller placement strategy for improving SDN survivability. Proceedings of the Global Communications Conference (GLOBECOM), Austin, TX, USA.","DOI":"10.1109\/GLOCOM.2014.7037087"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Muqaddas, A.S., Bianco, A., Giaccone, P., and Maier, G. (2016, January 22\u201327). Inter-controller traffic in ONOS clusters for SDN networks. Proceedings of the 2016 IEEE International Conference on Communications (ICC), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICC.2016.7511034"},{"key":"ref_27","unstructured":"Luo, M., Li, Q., Bo, M., Lin, K., Wu, X., Li, C., Lu, S., and Chou, W. (2015, January 21\u201326). Design and implementation of a scalable sdn-of controller cluster. Proceedings of the INFOCOMP 2015, Brussels, Belgium."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/LCOMM.2014.2371014","article-title":"Optimal model for the controller placement problem in software defined networks","volume":"19","author":"Sallahi","year":"2015","journal-title":"IEEE Commun. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"16225","DOI":"10.1109\/ACCESS.2021.3052892","article-title":"SDN Wireless Controller Placement Problem\u2014The 4G LTE-U Case","volume":"9","author":"Zilberman","year":"2021","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/TNSM.2016.2587900","article-title":"Control plane latency with sdn network hypervisors: The cost of virtualization","volume":"13","author":"Blenk","year":"2016","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/j.comnet.2016.11.017","article-title":"A survey: Control plane scalability issues and approaches in Software-Defined Networking (SDN)","volume":"112","author":"Karakus","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/MNET.2017.1600182","article-title":"The controller placement problem in software defined networking: A survey","volume":"31","author":"Wang","year":"2017","journal-title":"IEEE Netw."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.comcom.2020.11.019","article-title":"SD-CPC: SDN Controller Placement Camouflage based on Stochastic Game for Moving-target Defense","volume":"168","author":"Samir","year":"2021","journal-title":"Comput. Commun."},{"key":"ref_34","unstructured":"Hu, Y., Wendong, W., Gong, X., Que, X., and Shiduan, C. (2013, January 27\u201331). Reliability-aware controller placement for software-defined networks. Proceedings of the 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013), Ghent, Belgium."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"4850","DOI":"10.1109\/TMC.2022.3155657","article-title":"Optimized controller provisioning in software-defined LEO satellite networks","volume":"22","author":"Li","year":"2022","journal-title":"IEEE Trans. Mob. Comput."},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Bari, M.F., Roy, A.R., Chowdhury, S.R., Zhang, Q., Zhani, M.F., Ahmed, R., and Boutaba, R. (2013, January 14\u201318). Dynamic controller provisioning in software defined networks. Proceedings of the 2013 9th International Conference on Network and Service Management (CNSM), Zurich, Switzerland.","DOI":"10.1109\/CNSM.2013.6727805"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"2915","DOI":"10.1109\/TNSM.2021.3061261","article-title":"On-Demand Dynamic Controller Placement in Software Defined Satellite-Terrestrial Networking","volume":"18","author":"Han","year":"2021","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/LCOMM.2020.2979072","article-title":"Controller placement for resilient network state synchronization in multi-controller sdn","volume":"24","author":"Das","year":"2020","journal-title":"IEEE Commun. Lett."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Heller, B., Sherwood, R., and McKeown, N. (2012, January 13). The controller placement problem. Proceedings of the First Workshop on Hot Topics in Software Defined Networks, Helsinki, Finland.","DOI":"10.1145\/2342441.2342444"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Wei, L., and Fung, C. (2015, January 8\u201312). FlowRanger: A request prioritizing algorithm for controller DoS attacks in software defined networks. Proceedings of the 2015 IEEE International Conference on Communications (ICC), London, UK.","DOI":"10.1109\/ICC.2015.7249158"},{"key":"ref_41","first-page":"101065","article-title":"A survey on DoS\/DDoS attacks mathematical modelling for traditional, SDN and virtual networks","volume":"31","author":"Balarezo","year":"2022","journal-title":"Eng. Sci. Technol. Int. J."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"100172","DOI":"10.1109\/ACCESS.2020.2997939","article-title":"Artificial Immune Systems and Fuzzy Logic to Detect Flooding Attacks in Software-Defined Networks","volume":"8","author":"Scaranti","year":"2020","journal-title":"IEEE Access"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Ali, T.E., Chong, Y.W., and Manickam, S. (2023). Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review. Appl. Sci., 13.","DOI":"10.3390\/app13053183"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"143985","DOI":"10.1109\/ACCESS.2020.3013998","article-title":"Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller\u2014A Review","volume":"8","author":"Aladaileh","year":"2020","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Kandoi, R., and Antikainen, M. (2015, January 11\u201315). Denial-of-service attacks in OpenFlow SDN networks. Proceedings of the 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada.","DOI":"10.1109\/INM.2015.7140489"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCOM.2015.7081075","article-title":"Distributed denial of service attacks in software-defined networking with cloud computing","volume":"53","author":"Yan","year":"2015","journal-title":"IEEE Commun. Mag."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/CC.2014.6825258","article-title":"A dormant multi-controller model for software defined networking","volume":"11","author":"Yonghong","year":"2014","journal-title":"China Commun."},{"key":"ref_48","unstructured":"Dao, N.N., Park, J., Park, M., and Cho, S. (2015, January 12\u201314). A feasible method to combat against DDoS attack in SDN network. Proceedings of the 2015 International Conference on Information Networking (ICOIN), Siem Reap, Cambodia."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Saxena, U., Sodhi, J.S., and Singh, Y. (2020, January 29\u201331). An Analysis of DDoS Attacks in a Smart Home Networks. Proceedings of the 2020 10th International Conference on Cloud Computing, Data Science & Engineering (Confluence), Noida, India.","DOI":"10.1109\/Confluence47617.2020.9058087"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Erhan, D., Anar\u0131m, E., and Kurt, G.K. (2016, January 16\u201319). DDoS attack detection using matching pursuit algorithm. Proceedings of the 2016 24th Signal Processing and Communication Application Conference (SIU), Zonguldak, Turkey.","DOI":"10.1109\/SIU.2016.7495931"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"42111","DOI":"10.1109\/ACCESS.2020.2977112","article-title":"A low-cost distributed denial-of-service attack architecture","volume":"8","author":"Huang","year":"2020","journal-title":"IEEE Access"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Lim, S., Ha, J., Kim, H., Kim, Y., and Yang, S. (2014, January 8\u201311). A SDN-oriented DDoS blocking scheme for botnet-based attacks. Proceedings of the 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN), Shanghai, China.","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","article-title":"DDoS attack protection in the era of cloud computing and software-defined networking","volume":"81","author":"Wang","year":"2015","journal-title":"Comput. Netw."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Wang, H., Xu, L., and Gu, G. (2015, January 22\u201325). Floodguard: A dos attack prevention extension in software-defined networks. Proceedings of the 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), Rio de Janeiro, Brazil.","DOI":"10.1109\/DSN.2015.27"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"53972","DOI":"10.1109\/ACCESS.2020.2976908","article-title":"A deep cnn ensemble framework for efficient ddos attack detection in software defined networks","volume":"8","author":"Haider","year":"2020","journal-title":"IEEE Access"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","article-title":"A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning","volume":"8","author":"Valdovinos","year":"2020","journal-title":"IEEE Access"},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Abdelaziz, A., Fong, A.T., Gani, A., Garba, U., Khan, S., Akhunzada, A., Talebian, H., and Choo, K.K.R. (2017). Distributed controller clustering in software defined networks. PLoS ONE, 12.","DOI":"10.1371\/journal.pone.0174715"},{"key":"ref_58","first-page":"101176","article-title":"Detecting flooding DDoS attacks in software defined networks using supervised learning techniques","volume":"35","author":"Wang","year":"2022","journal-title":"Eng. Sci. Technol. Int. J."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1016\/j.comcom.2020.02.085","article-title":"New-flow based DDoS attacks in SDN: Taxonomy, rationales, and research challenges","volume":"154","author":"Singh","year":"2020","journal-title":"Comput. Commun."},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Li, J., Tu, T., Li, Y., Qin, S., Shi, Y., and Wen, Q. (2022). DoSGuard: Mitigating denial-of-service attacks in software-defined networks. Sensors, 22.","DOI":"10.3390\/s22031061"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"932","DOI":"10.1007\/s12083-019-00855-8","article-title":"Path optimization of box-covering based routing to minimize average packet delay in software defined network","volume":"13","author":"Gurusamy","year":"2020","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"102468","DOI":"10.1016\/j.jnca.2019.102468","article-title":"Efficient measurement of round-trip link delays in software-defined networks","volume":"150","author":"Wang","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Parashar, M., Poonia, A., and Satish, K. (2019, January 6\u20138). A Survey of Attacks and their Mitigations in Software Defined Networks. Proceedings of the 2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT), Kanpur, India.","DOI":"10.1109\/ICCCNT45670.2019.8944621"},{"key":"ref_64","unstructured":"Goransson, P., Black, C., and Culver, T. (2016). Software Defined Networks: A Comprehensive Approach, Morgan Kaufmann."},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1016\/j.comcom.2015.09.008","article-title":"On reliable controller placements in software-defined networks","volume":"77","author":"Ros","year":"2016","journal-title":"Comput. Commun."},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Rasol, K.A.R., and Domingo-Pascual, J. (2021, January 13\u201316). Joint Latency and Reliability-Aware Controller Placement. Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea.","DOI":"10.1109\/ICOIN50884.2021.9333864"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Hock, D., Hartmann, M., Gebert, S., Jarschel, M., Zinner, T., and Tran-Gia, P. (2013, January 10\u201312). Pareto-optimal resilient controller placement in SDN-based core networks. Proceedings of the 2013 25th International Teletraffic Congress (ITC), Shanghai, China.","DOI":"10.1109\/ITC.2013.6662939"},{"key":"ref_68","unstructured":"Yazici, V., Sunay, M.O., and Ercan, A.O. (2014). Controlling a software-defined network via distributed controllers. arXiv."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2897","DOI":"10.1007\/s00500-019-04070-8","article-title":"A new framework for reliable control placement in software-defined networks based on multi-criteria clustering approach","volume":"24","author":"Jalili","year":"2020","journal-title":"Soft Comput."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/s42452-019-1917-y","article-title":"Load and stress testing for SDN\u2019s northbound API","volume":"2","author":"Latah","year":"2020","journal-title":"SN Appl. Sci."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/21\/8922\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:15:59Z","timestamp":1760130959000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/21\/8922"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,2]]},"references-count":70,"journal-issue":{"issue":"21","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["s23218922"],"URL":"https:\/\/doi.org\/10.3390\/s23218922","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,11,2]]}}}