{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:18:06Z","timestamp":1772835486344,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030409067","type":"print"},{"value":"9783030409074","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-40907-4_23","type":"book-chapter","created":{"date-parts":[[2020,2,12]],"date-time":"2020-02-12T15:02:54Z","timestamp":1581519774000},"page":"211-220","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["SDN-GAN: Generative Adversarial Deep NNs for Synthesizing Cyber Attacks on Software Defined Networks"],"prefix":"10.1007","author":[{"given":"Ahmed","family":"AlEroud","sequence":"first","affiliation":[]},{"given":"George","family":"Karabatis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,12]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.cose.2015.05.006","volume":"53","author":"I Alsmadi","year":"2015","unstructured":"Alsmadi, I., Xu, D.: Security of software defined networks: a survey. Comput. Secur. 53, 79\u2013108 (2015)","journal-title":"Comput. Secur."},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"AlEroud, A., Alsmadi, I.: Identifying DoS attacks on software defined networks: a relation context approach. In: NOMS 2016\u20132016 IEEE\/IFIP Network Operations and Management Symposium, pp. 853\u2013857 (2016)","DOI":"10.1109\/NOMS.2016.7502914"},{"issue":"3","key":"23_CR3","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/2187671.2187677","volume":"44","author":"G Cugola","year":"2012","unstructured":"Cugola, G., Margara, A.: Processing flows of information: from data stream to complex event processing. ACM Comput. Surv. (CSUR) 44(3), 15 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"4","key":"23_CR4","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"CJ Chung","year":"2013","unstructured":"Chung, C.J., Khatkar, P., Xing, T., Lee, J., Huang, D.: NICE: network intrusion detection and countermeasure selection in virtual network systems. IEEE Trans. Dependable Secur. Comput. 10(4), 198\u2013211 (2013)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"23_CR5","doi-asserted-by":"crossref","unstructured":"Chung, C.J., Cui, J., Khatkar, P., Huang, D.: Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. In: 2013 9th International Conference on Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), October 2013, pp. 21\u201330. IEEE (2013)","DOI":"10.4108\/icst.collaboratecom.2013.254107"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, S., Ganjali, Y.: Efficient implementation of security applications in openflow controller with flexam. In: 2013 IEEE 21st Annual Symposium on High Performance Interconnects (HOTI), August 2013, pp. 49\u201354. IEEE (2013)","DOI":"10.1109\/HOTI.2013.17"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Jeong, C., Ha, T., Narantuya, J., Lim, H., Kim, J.: Scalable network intrusion detection on virtual SDN environment. In: 2014 IEEE 3rd International Conference on Cloud Networking (CloudNet), October 2014, pp. 264\u2013265. IEEE (2014)","DOI":"10.1109\/CloudNet.2014.6969003"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Lopez, M.E.A., Duarte, O.C.M.B.: Providing elasticity to intrusion detection systems in virtualized software defined networks. In: IEEE ICC (2015)","DOI":"10.1109\/ICC.2015.7249462"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1504\/IJHPCN.2016.077820","volume":"9","author":"I Alsmadi","year":"2016","unstructured":"Alsmadi, I.: The integration of access control levels based on SDN. Int. J. High Perform. Comput. Netw. 9, 281\u2013290 (2016)","journal-title":"Int. J. High Perform. Comput. Netw."},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"AlEroud, A., Alsmadi, I.: Identifying DoS attacks on software defined networks: a relation context approach. In: NOMS (2016)","DOI":"10.1109\/NOMS.2016.7502914"},{"key":"23_CR11","unstructured":"Kerner, S.M.: OpenFlow can provide security too. \nhttp:\/\/www.enterprisenetworkingplanet.com\/datacenter\/openflowcan-provide-security-too.html\n\n. 14 May 2012"},{"key":"23_CR12","unstructured":"Hogg, S.: Using SDN to create a packet monitoring system, packet-level monitoring use case with cisco XNC and monitor manager, network world, technical article, December 2013. \nhttp:\/\/www.networkworld.com\/article\/2226003\/cisco-subnet\/using-sdn-to-create-a-packet-monitoring-system.html"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Skowyra, R., Bahargam, S., Bestavros, A.: Software-defined ids for securing embedded mobile devices. In: High Performance Extreme Computing Conference (HPEC) 2013, pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/HPEC.2013.6670325"},{"key":"23_CR14","unstructured":"MIT: DARPA intrusion detection evaluation, ed (2012)"},{"key":"23_CR15","unstructured":"Stolfo, S.J., Fan, W., Lee, W., Prodromidis, A., Chan, P.K.: Cost-based modeling for fraud and intrusion detection: results from the JAM project. In: Proceedings of the DARPA Information Survivability Conference and Exposition 2000, DISCEX 2000, pp. 130\u2013144 (2000)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.-A.: A detailed analysis of the KDD CUP 99 dataset. In: Proceedings of the Second IEEE Symposium on Computational Intelligence for Security and Defense Applications 2009 (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Ding, T., AlEroud, A., Karabatis, G.: Multi-granular aggregation of network flows for security analysis. In: IEEE International Conference on Intelligence and Security Informatics (ISI) 2015, pp. 173\u2013175 (2015)","DOI":"10.1109\/ISI.2015.7165965"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.bjp.2013.12.037","volume":"61","author":"M Berman","year":"2014","unstructured":"Berman, M., Chase, J.S., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., et al.: GENI: a federated testbed for innovative network experiments. Comput. Netw. 61, 5\u201323 (2014)","journal-title":"Comput. Netw."},{"key":"23_CR19","unstructured":"The CAIDA \u201cDDoS Attack 2007\u201d dataset. \nhttp:\/\/www.caida.org"},{"key":"23_CR20","unstructured":"Mirza, F., Khayam, S.A.: Network-embedded security using in-network packet marking. \nhttp:\/\/wisnet.seecs.nust.edu.pk\/projects\/nes\/implementation.html"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey, no. 2014. arXiv preprint \narXiv:1406.0440","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"23_CR22","unstructured":"Zilong, L., Shi, Y., Xue, Z.: IDSGAN: generative adversarial networks for attack gene ration against intrusion detection. arXiv preprint \narXiv:1809.02077\n\n (2018)"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems: OTM 2019 Workshops"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-40907-4_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,13]],"date-time":"2020-02-13T01:47:58Z","timestamp":1581558478000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-40907-4_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030409067","9783030409074"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-40907-4_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"12 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"OTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"OTM Confederated International Conferences \"On the Move to Meaningful Internet Systems\"","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rhodes","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"otm2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.otmconferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}