{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:40:05Z","timestamp":1743086405158,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030415785"},{"type":"electronic","value":"9783030415792"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-41579-2_29","type":"book-chapter","created":{"date-parts":[[2020,2,17]],"date-time":"2020-02-17T16:09:09Z","timestamp":1581955749000},"page":"503-520","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["DTGuard: A Lightweight Defence Mechanism Against a New DoS Attack on SDN"],"prefix":"10.1007","author":[{"given":"Jianwei","family":"Hou","sequence":"first","affiliation":[]},{"given":"Ziqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wenchang","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Bin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,18]]},"reference":[{"unstructured":"Mininet. http:\/\/mininet.org\/","key":"29_CR1"},{"unstructured":"Scapy. http:\/\/www.secdev.org\/projects\/scapy\/","key":"29_CR2"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"909","DOI":"10.1109\/SURV.2012.090512.00043","volume":"15","author":"MF Bari","year":"2013","unstructured":"Bari, M.F., et al.: Data center network virtualization: a survey. IEEE Commun. Surv. Tutor. 15(2), 909\u2013928 (2013)","journal-title":"IEEE Commun. Surv. Tutor."},{"doi-asserted-by":"crossref","unstructured":"Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., Cho, K.: Seven years and one day: sketching the evolution of internet traffic. In: 28th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2009), 19\u201325 April 2009, Rio de Janeiro, Brazil, pp. 711\u2013719 (2009)","key":"29_CR4","DOI":"10.1109\/INFCOM.2009.5061979"},{"doi-asserted-by":"crossref","unstructured":"Braga, R., de Souza Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: Proceedings of the 35th Annual IEEE Conference on Local Computer Networks (LCN 2010), 10\u201314 October 2010, Denver, Colorado, USA, pp. 408\u2013415 (2010)","key":"29_CR5","DOI":"10.1109\/LCN.2010.5735752"},{"unstructured":"Gao, S., Peng, Z., Xiao, B., Hu, A., Ren, K.: FloodDefender: protecting data and control plane resources under SDN-aimed DoS attacks. In: 2017 IEEE Conference on Computer Communications (INFOCOM 2017), 1\u20134 May 2017, Atlanta, GA, USA, pp. 1\u20139 (2017)","key":"29_CR6"},{"issue":"3","key":"29_CR7","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1145\/1384609.1384625","volume":"38","author":"N Gude","year":"2008","unstructured":"Gude, N., et al.: NOX: towards an operating system for networks. ACM SIGCOMM Comput. Commun. Rev. 38(3), 105\u2013110 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"7","key":"29_CR8","doi-asserted-by":"publisher","first-page":"600","DOI":"10.4236\/ijcns.2009.27067","volume":"2","author":"R Guo","year":"2009","unstructured":"Guo, R., Yin, H., Wang, D., Zhang, B.: Research on the active DDoS filtering algorithm based on IP flow. IJCNS 2(7), 600\u2013607 (2009)","journal-title":"IJCNS"},{"unstructured":"Ho, T.K.: Random decision forests. In: Proceedings of 3rd International Conference on Document Analysis and Recognition, vol. 1, pp. 278\u2013282. IEEE (1995)","key":"29_CR9"},{"doi-asserted-by":"crossref","unstructured":"Hu, D., Hong, P., Chen, Y.: FADM: DDoS flooding attack detection and mitigation system in software-defined networking. In: 2017 IEEE Global Communications Conference (GLOBECOM 2017), 4\u20138 December 2017, Singapore, pp. 1\u20137 (2017)","key":"29_CR10","DOI":"10.1109\/GLOCOM.2017.8254023"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1016\/j.future.2018.09.022","volume":"92","author":"M Imran","year":"2019","unstructured":"Imran, M., Durad, M.H., Khan, F.A., Derhab, A.: Toward an optimal solution against denial of service attacks in software defined networks. Future Gener. Comp. Syst. 92, 444\u2013453 (2019)","journal-title":"Future Gener. Comp. Syst."},{"doi-asserted-by":"crossref","unstructured":"Kotani, D., Okabe, Y.: A packet-in message filtering mechanism for protection of control plane in OpenFlow networks. In: Proceedings of the Tenth ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS 2014), 20\u201321 October 2014, Los Angeles, CA, USA, pp. 29\u201340 (2014)","key":"29_CR12","DOI":"10.1145\/2658260.2658276"},{"issue":"2","key":"29_CR13","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"Comput. Commun. Rev."},{"doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: International Conference on Computing, Networking and Communications (ICNC 2015), 16\u201319 February 2015, Garden Grove, CA, USA, pp. 77\u201381 (2015)","key":"29_CR14","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"27809","DOI":"10.1109\/ACCESS.2018.2839684","volume":"6","author":"H Peng","year":"2018","unstructured":"Peng, H., Sun, Z., Zhao, X., Tan, S., Sun, Z.: A detection method for anomaly flow in software defined network. IEEE Access 6, 27809\u201327817 (2018)","journal-title":"IEEE Access"},{"doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2013), The Chinese University of Hong Kong, Hong Kong, China, Friday, 16 August 2013, pp. 165\u2013166 (2013)","key":"29_CR16","DOI":"10.1145\/2491185.2491220"},{"doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P.A., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: 2013 ACM SIGSAC Conference on Computer and Communications Security (CCS 2013), 4\u20138 November 2013, Berlin, Germany, pp. 413\u2013424 (2013)","key":"29_CR17","DOI":"10.1145\/2508859.2516684"},{"doi-asserted-by":"crossref","unstructured":"Wang, H., Xu, L., Gu, G.: FloodGuard: a DoS attack prevention extension in software-defined networks. In: 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2015), 22\u201325 June 2015, Rio de Janeiro, Brazil, pp. 239\u2013250 (2015)","key":"29_CR18","DOI":"10.1109\/DSN.2015.27"},{"doi-asserted-by":"crossref","unstructured":"Zhang, M., Hou, J., Zhang, Z., Shi, W., Qin, B., Liang, B.: Fine-grained fingerprinting threats to software-defined networks. In: 2017 IEEE Trustcom\/BigDataSE\/ICESS, 1\u20134 August 2017, Sydney, Australia, pp. 128\u2013135 (2017)","key":"29_CR19","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.229"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-41579-2_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,15]],"date-time":"2022-10-15T20:03:20Z","timestamp":1665864200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-41579-2_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030415785","9783030415792"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-41579-2_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easy Chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"199","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}