{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T15:03:09Z","timestamp":1776351789426,"version":"3.51.2"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030389604","type":"print"},{"value":"9783030389611","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-38961-1_42","type":"book-chapter","created":{"date-parts":[[2020,1,22]],"date-time":"2020-01-22T01:34:32Z","timestamp":1579656872000},"page":"482-495","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Adaptive Detection Method for Packet-In Message Injection Attack in SDN"],"prefix":"10.1007","author":[{"given":"Xinyu","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Mingsong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yue","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,22]]},"reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jnca.2016.04.005","volume":"68","author":"Y Cui","year":"2016","unstructured":"Cui, Y., et al.: SD-Anti-DDoS: fast and efficient DDoS defense in software-defined networks. J. Netw. Comput. Appl. 68, 65\u201379 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"42_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2015.7081073","volume":"53","author":"A Akhunzada","year":"2015","unstructured":"Akhunzada, A., Ahmed, E., Gani, A.: Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun. Mag. 53(4), 36\u201344 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"42_CR3","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second Workshop on Hot Topics in Software Defined Networking (HotSDNb12), pp. 55\u201360 (2013)","DOI":"10.1145\/2491185.2491199"},{"issue":"9","key":"42_CR4","doi-asserted-by":"publisher","first-page":"2245","DOI":"10.1109\/TPDS.2013.181","volume":"25","author":"S Yu","year":"2014","unstructured":"Yu, S., Tian, Y., Guo, S., Wu, D.O.: Can we beat DDoS attacks in clouds? IEEE Trans. Parallel Distrib. Syst. 25(9), 2245\u20132254 (2014)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"20","key":"42_CR5","doi-asserted-by":"publisher","first-page":"6797","DOI":"10.1007\/s00500-018-3407-3","volume":"22","author":"D Gao","year":"2018","unstructured":"Gao, D., Liu, Z., Liu, Y., Heng, C., Ting, F., Chao, Z.H.: Defending against Packet-In messages flooding attack under SDN context. Soft. Comput. 22(20), 6797\u20136809 (2018)","journal-title":"Soft. Comput."},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Internet Society (2015)","DOI":"10.14722\/ndss.2015.23283"},{"issue":"3","key":"42_CR7","doi-asserted-by":"publisher","first-page":"695","DOI":"10.1109\/TIFS.2017.2765506","volume":"13","author":"S Deng","year":"2018","unstructured":"Deng, S., Gao, X., Lu, Z., Gao, X.: Packet injection attack and its defense in software-defined networks. IEEE Trans. Inf. Forensics Secur. 13(3), 695\u2013705 (2018)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"You, X., Feng, Y., Sakurai, K.: Packet in message based DDoS attack detection in SDN network using OpenFlow. In: International Symposium on Computing & Networking. IEEE Computer Society (2017)","DOI":"10.1109\/CANDAR.2017.93"},{"issue":"5","key":"42_CR9","first-page":"734","volume":"19","author":"B Sunny","year":"2017","unstructured":"Sunny, B., Krishan, K., Monika, S.: Discriminating flash events from DDoS attacks: a comprehensive review. Int. J. Netw. Secur. 19(5), 734\u2013741 (2017)","journal-title":"Int. J. Netw. Secur."},{"issue":"5","key":"42_CR10","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1109\/TC.2015.2439287","volume":"65","author":"Y Shui","year":"2016","unstructured":"Shui, Y., Zhou, W., Guo, S., Guo, M.: A feasible IP traceback framework through dynamic deterministic packet marking. IEEE Trans. Comput. 65(5), 1418\u20131427 (2016)","journal-title":"IEEE Trans. Comput."},{"key":"42_CR11","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"Kalkan, K., Altay, L., Gur, G., Alagoz, F.: JESS: joint entropy based DDoS defense scheme in SDN. IEEE J. Sel. Areas Commun. 36, 2358\u20132372 (2018)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"42_CR12","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TNSM.2018.2861741","volume":"15","author":"P Kumar","year":"2018","unstructured":"Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: Safety: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15, 1545\u20131559 (2018)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"issue":"3","key":"42_CR13","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1109\/TPDS.2010.97","volume":"22","author":"S Yu","year":"2011","unstructured":"Yu, S., Zhou, W., Doss, R., Jia, W.: Traceback DDoS attacks using entropy variations. IEEE Trans. Parallel Distrib. Syst. 22(3), 412\u2013425 (2011)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"42_CR14","unstructured":"La-Lin, J., Xia, P., Bing, X.: Performance evaluation of SDN controllers based on hybrid queuing model. Computer Engineering Science (2017)"},{"issue":"6","key":"42_CR15","doi-asserted-by":"publisher","first-page":"1073","DOI":"10.1109\/TPDS.2011.262","volume":"23","author":"S Yu","year":"2012","unstructured":"Yu, S., Zhou, W., Jia, W., Guo, S., Xiang, Y., Tang, F.: Discrim-inating DDoS attacks from flash crowds using flow correlation coefficient. IEEE Trans. Parallel Distrib. Syst. 23(6), 1073\u20131080 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE Computer Society (2015)","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Yu, S., Guo, S., Stojmenovic, I.: Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans. Comput. 64(1), 139\u2013151 (2015). (Spotlight paper of the issue)","DOI":"10.1109\/TC.2013.191"},{"issue":"6","key":"42_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MNET.2015.7340429","volume":"29","author":"S Yu","year":"2015","unstructured":"Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Netw. 29(6), 83\u201387 (2015)","journal-title":"IEEE Netw."},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Feng, B., Zhang, H., Zhou, H., Yu, S.: Locator\/identifier split networking: a promising future internet architecture. IEEE Commun. Surv. Tutor. 19(4), 2927\u20132948 (2017). (Impact factor 17.2)","DOI":"10.1109\/COMST.2017.2728478"},{"issue":"4","key":"42_CR20","doi-asserted-by":"publisher","first-page":"919","DOI":"10.1109\/TPDS.2016.2603511","volume":"28","author":"J Chen","year":"2017","unstructured":"Chen, J., et al.: A parallel random forest algorithm for big data in a spark cloud computing environment. IEEE Trans. Parallel Distrib. Syst. 28(4), 919\u2013933 (2017)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Yu, S., Liu, M., Dou, W., Liu, X., Zhou, S.: Networking for big data: a survey. IEEE Commun. Surv. Tutor. 19(1), 531\u2013549 (2017). (Impact factor 17.2)","DOI":"10.1109\/COMST.2016.2610963"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Mousavi, S.-M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications, pp. 77\u201381, (2015)","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"42_CR23","unstructured":"Scapy. http:\/\/www.secdev.org\/projects\/scapy\/. Accessed 2018"},{"key":"42_CR24","unstructured":"Mininet. http:\/\/mininet.org\/. Accessed 2019"},{"key":"42_CR25","unstructured":"Floodlight. http:\/\/www.projectfloodlight.org\/. Accessed 2019"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-38961-1_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T08:10:47Z","timestamp":1657872647000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-38961-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030389604","9783030389611"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-38961-1_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nsclab.org\/ica3pp2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"251","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"73","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}