{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T04:49:33Z","timestamp":1749271773061},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030220372"},{"type":"electronic","value":"9783030220389"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22038-9_20","type":"book-chapter","created":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T23:02:31Z","timestamp":1560121351000},"page":"415-437","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["DPX: Data-Plane eXtensions for SDN Security Service Instantiation"],"prefix":"10.1007","author":[{"given":"Taejune","family":"Park","sequence":"first","affiliation":[]},{"given":"Yeonkeun","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[]},{"given":"Zhaoyan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"KyoungSoo","family":"Park","sequence":"additional","affiliation":[]},{"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"issue":"4","key":"20_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1145\/1851275.1851206","volume":"40","author":"Muhammad Bilal Anwer","year":"2010","unstructured":"Anwer, M.B., Motiwala, M., bin Tariq, M., Feamster, N.: Switchblade: a platform for rapid deployment of network protocols on programmable hardware. ACM SIGCOMM Comput. Commun. Rev. 40(4), 183 (2010)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Berde, P., et al.: ONOS: towards an open, distributed SDN OS. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 1\u20136. ACM (2014)","DOI":"10.1145\/2620728.2620744"},{"key":"20_CR3","unstructured":"Fayaz, S.K., Tobioka, Y., Sekar, V., Bailey, M.: Bohatei: flexible and elastic DDoS defense. In: 24th USENIX Security Symposium (USENIX Security 15), pp. 817\u2013832. USENIX Association, Washington, D.C., August 2015. \n                      https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/fayaz"},{"key":"20_CR4","unstructured":"Firestone, D., et al.: Azure accelerated networking: smartnics in the public cloud. In: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2018), Renton, WA (2018)"},{"issue":"4","key":"20_CR5","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1145\/2043164.2018477","volume":"41","author":"Phillipa Gill","year":"2011","unstructured":"Gill, P., Jain, N., Nagappan, N.: Understanding network failures in data centers: measurement, analysis, and implications. ACM SIGCOMM Comput. Commun. Rev. 41, 350\u2013361 (2011)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comnet.2018.01.028","volume":"133","author":"A Gupta","year":"2018","unstructured":"Gupta, A., Habib, M.F., Mandal, U., Chowdhury, P., Tornatore, M., Mukherjee, B.: On service-chaining strategies using virtual network functions in operator networks. Comput. Netw. 133, 1\u201316 (2018)","journal-title":"Comput. Netw."},{"key":"20_CR7","doi-asserted-by":"publisher","unstructured":"Honda, M., Huici, F., Lettieri, G., Rizzo, L.: mSwitch: a highly-scalable, modular software switch. In: Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research, pp. 1:1\u20131:13. SOSR 2015. ACM, New York (2015). \n                      https:\/\/doi.org\/10.1145\/2774993.2775065\n                      \n                    . \n                      http:\/\/doi.acm.org\/10.1145\/2774993.2775065","DOI":"10.1145\/2774993.2775065"},{"key":"20_CR8","unstructured":"hping3: A network tool able to send custom TCP\/IP packets and to display target replies. \n                      http:\/\/www.hping.org\/hping3.html"},{"key":"20_CR9","unstructured":"Hwang, J., Ramakrishnan, K.K., Wood, T.: NetVM: high performance and flexible networking using virtualization on commodity platforms. In: 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2014), pp. 445\u2013458. USENIX Association, Seattle, April 2014. \n                      https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/hwang"},{"key":"20_CR10","unstructured":"Intel: Intel DPDK: Data Plane Development Kit. \n                      http:\/\/dpdk.org"},{"issue":"2","key":"20_CR11","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/MCOM.2013.6461195","volume":"51","author":"H Kim","year":"2013","unstructured":"Kim, H., Feamster, N.: Improving network management with software defined networking. IEEE Commun. Magaz. 51(2), 114\u2013119 (2013)","journal-title":"IEEE Commun. Magaz."},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Lantz, B., Heller, B., McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In: Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19. ACM (2010)","DOI":"10.1145\/1868447.1868466"},{"key":"20_CR13","unstructured":"Martins, J., et al.: ClickOS and the art of network function virtualization. In: 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2014), pp. 459\u2013473. USENIX Association, Seattle, April 2014. \n                      https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/martins"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Medved, J., Varga, R., Tkacik, A., Gray, K.: OpenDaylight: towards a model-driven SDN controller architecture. In: 2014 IEEE 15th International Symposium on \u201cA World of Wireless, Mobile and Multimedia Networks (WoWMoM)\u201d, pp. 1\u20136. IEEE (2014)","DOI":"10.1109\/WoWMoM.2014.6918985"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Mekky, H., Hao, F., Mukherjee, S., Lakshman, T., Zhang, Z.L.: Network function virtualization enablement within SDN data plane. In: IEEE INFOCOM, pp. 1\u20139 (2017)","DOI":"10.1109\/INFOCOM.2017.8057138"},{"key":"20_CR16","unstructured":"Metasploit: Penetration Testing Software. \n                      https:\/\/www.metasploit.com\/"},{"key":"20_CR17","unstructured":"NetFPGA: NetFPGA-SUME board. \n                      https:\/\/netfpga.org\/site\/#\/systems\/1netfpga-sume\/details\/"},{"key":"20_CR18","unstructured":"nmap: Network Mapper - Security Scanner. \n                      https:\/\/nmap.org\/"},{"key":"20_CR19","unstructured":"Nping: An Open source network packet generation. \n                      https:\/\/nmap.org\/nping\/"},{"key":"20_CR20","unstructured":"Open vSwitch: An Open Virtual Switch. \n                      http:\/\/openvswitch.org\/"},{"key":"20_CR21","unstructured":"OpenFlow: Open network foundation. \n                      https:\/\/www.opennetworking.org\/sdn-resources\/openflow"},{"key":"20_CR22","unstructured":"NetFPGA Organization: NetFPGA 10G openflow switch (2012). \n                      https:\/\/github.com\/NetFPGA\/NetFPGA-public\/wiki\/NetFPGA-10G-OpenFlow-Switch"},{"key":"20_CR23","doi-asserted-by":"crossref","unstructured":"Park, T., Kim, Y., Park, J., Suh, H., Hong, B., Shin, S.: QoSE: quality of security a network security framework with distributed NFV. In: 2016 IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7510777"},{"key":"20_CR24","unstructured":"Pfaff, B., et al.: The design and implementation of open vSwitch. In: 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2015), pp. 117\u2013130. USENIX Association, Oakland, May 2015. \n                      https:\/\/www.usenix.org\/conference\/nsdi15\/technical-sessions\/presentation\/pfaff"},{"key":"20_CR25","unstructured":"POX: Python Network Controller. \n                      http:\/\/www.noxrepo.org\/pox\/about-pox\/"},{"key":"20_CR26","doi-asserted-by":"publisher","unstructured":"Qazi, Z.A., Tu, C.C., Chiang, L., Miao, R., Sekar, V., Yu, M.: SIMPLE-fying middlebox policy enforcement using SDN. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, SIGCOMM 2013, pp. 27\u201338. ACM, New York (2013). \n                      https:\/\/doi.org\/10.1145\/2486001.2486022\n                      \n                    . \n                      http:\/\/doi.acm.org\/10.1145\/2486001.2486022","DOI":"10.1145\/2486001.2486022"},{"key":"20_CR27","unstructured":"Roy, A., Zeng, H., Bagga, J., Snoeren, A.C.: Passive realtime datacenter fault detection and localization. In: NSDI, pp. 595\u2013612 (2017)"},{"key":"20_CR28","unstructured":"Sekar, V., Egi, N., Ratnasamy, S., Reiter, M.K., Shi, G.: Design and implementation of a consolidated middlebox architecture. In: Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2012), pp. 323\u2013336. USENIX, San Jose (2012). \n                      https:\/\/www.usenix.org\/conference\/nsdi12\/technical-sessions\/presentation\/sekar"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Shahbaz, M., et al.: Pisces: a programmable, protocol-independent software switch. In: Proceedings of the 2016 ACM SIGCOMM Conference (2016)","DOI":"10.1145\/2934872.2934886"},{"key":"20_CR30","unstructured":"Shin, S., Gu, G.: CloudWatcher: network security monitoring using OpenFlow in dynamic cloud networks (or: how to provide security monitoring as a service in clouds?). In: 2012 20th IEEE International Conference on Network Protocols (ICNP), pp. 1\u20136. IEEE (2012)"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS 2013), November 2013","DOI":"10.1145\/2508859.2516684"},{"key":"20_CR32","unstructured":"Snort: Network Intrusion Detection System. \n                      https:\/\/www.snort.org\/"},{"key":"20_CR33","doi-asserted-by":"crossref","unstructured":"Sonchack, J., Aviv, A.J., Keller, E., Smith, J.M.: Enabling practical software-defined networking security applications with OFX (2016)","DOI":"10.14722\/ndss.2016.23309"},{"key":"20_CR34","unstructured":"Suricata: An open source-based intrusion detection system (IDS). \n                      https:\/\/suricata-ids.org\/"},{"key":"20_CR35","unstructured":"Tammana, P., Agarwal, R., Lee, M.: Simplifying datacenter network debugging with pathdump (2016)"},{"key":"20_CR36","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.comnet.2015.05.005","volume":"85","author":"C Yoon","year":"2015","unstructured":"Yoon, C., Park, T., Lee, S., Kang, H., Shin, S., Zhang, Z.: Enabling security functions with SDN: a feasibility study. Comput. Netw. 85, 19\u201335 (2015)","journal-title":"Comput. Netw."},{"key":"20_CR37","unstructured":"Zeng, H., et al.: Libra: divide and conquer to verify forwarding tables in huge networks. In: 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2014), pp. 87\u201399. USENIX Association, Seattle, April 2014. \n                      https:\/\/www.usenix.org\/conference\/nsdi14\/technical-sessions\/presentation\/zeng"},{"issue":"5","key":"20_CR38","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MM.2014.61","volume":"34","author":"N Zilberman","year":"2014","unstructured":"Zilberman, N., Audzevich, Y., Covington, G.A., Moore, A.W.: NetFPGA SUME: toward 100 Gbps as research commodity. IEEE Micro 34(5), 32\u201341 (2014)","journal-title":"IEEE Micro"}],"container-title":["Lecture Notes in Computer Science","Detection of Intrusions and Malware, and Vulnerability Assessment"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22038-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,9]],"date-time":"2019-06-09T23:11:35Z","timestamp":1560121895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22038-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030220372","9783030220389"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22038-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"6 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DIMVA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dimva2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.dimva2019.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"dimca2019.hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}