{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T22:23:12Z","timestamp":1742941392888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750749"},{"type":"electronic","value":"9783030750756"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75075-6_62","type":"book-chapter","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T07:06:40Z","timestamp":1619420800000},"page":"757-770","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["DoSSec: A Reputation-Based DoS Mitigation Mechanism on SDN"],"prefix":"10.1007","author":[{"given":"Ranyelson N.","family":"Carvalho","sequence":"first","affiliation":[]},{"given":"Lucas R.","family":"Costa","sequence":"additional","affiliation":[]},{"given":"Jacir L.","family":"Bordim","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Alchieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,27]]},"reference":[{"key":"62_CR1","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Gaspari, F.D., Poovendran, R.: LineSwitch: tackling control plane saturation attacks in SDN. IEEE\/ACM Trans. Networking 25 (2017)","DOI":"10.1109\/TNET.2016.2626287"},{"issue":"11","key":"62_CR2","doi-asserted-by":"publisher","first-page":"1312","DOI":"10.1016\/j.comcom.2012.04.008","volume":"35","author":"H Beitollahi","year":"2012","unstructured":"Beitollahi, H., Deconinck, G.: Analyzing well-known countermeasures against distributed denial of service attacks. Comput. Commun. 35(11), 1312\u20131332 (2012)","journal-title":"Comput. Commun."},{"key":"62_CR3","unstructured":"Bera, P., Saha, A., Setua, S.K.: DoS in SDN. In: 5th International CCSNT, pp. 497\u2013501, December 2016"},{"issue":"3","key":"62_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., Walker, D.: P4: programming protocol-independent packet processors. SIGCOMM Rev. 44(3), 87\u201395 (2014)","journal-title":"SIGCOMM Rev."},{"key":"62_CR5","series-title":"pp","first-page":"1355","volume-title":"AINA","author":"RN Carvalho","year":"2020","unstructured":"Carvalho, R.N., Costa, L.R., Bordim, J.L., Alchieri, E.A.P.: New programmable data plane architecture based on P4 OpenFlow agent. In: Barolli, L., Amato, F., Moscato, F., Enokido, T., Takizawa, M. (eds.) AINA. pp, pp. 1355\u20131367. Springer, Cham (2020)"},{"key":"62_CR6","doi-asserted-by":"crossref","unstructured":"Dridi, L., Zhani, M.F.: SDN-guard: DoS attacks mitigation in SDN networks. In: 5th International Conference Cloudnet, pp. 212\u2013217, October 2016","DOI":"10.1109\/CloudNet.2016.9"},{"key":"62_CR7","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.comnet.2015.08.038","volume":"92","author":"S Fichera","year":"2015","unstructured":"Fichera, S., Galluccio, L., Grancagnolo, S.C., Morabito, G.: OPERETTA: an OPEnFlow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers. Comput. Netw. 92, 89\u2013100 (2015)","journal-title":"Comput. Netw."},{"key":"62_CR8","first-page":"09","volume":"92","author":"M Imran","year":"2018","unstructured":"Imran, M., Durad, H., Khan, F., Derhab, A.: Toward an optimal solution against DoS attacks in software defined networks. Future Gener. Comput. Syst. 92, 09 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"62_CR9","doi-asserted-by":"crossref","unstructured":"Kalkan, K., G\u00fcr, G., Alag\u00f6z, F.: SDNScore: a statistical defense mechanism against DDoS attacks in SDN environment. In 2017 ISCC, pp. 669\u2013675 (2017)","DOI":"10.1109\/ISCC.2017.8024605"},{"key":"62_CR10","doi-asserted-by":"crossref","unstructured":"Kuerban, M., Tian, Y., Yang, Q., Jia, Y., Huebert, B.: FlowSec: DoS attack mitigation strategy on SDN controller. In: International CNAS, pp. 1\u20132, August 2016","DOI":"10.1109\/NAS.2016.7549402"},{"key":"62_CR11","doi-asserted-by":"crossref","unstructured":"Kumar, P., Tripathi, M., Nehra, A., Conti, M., Lal, C.: Safety: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Serv. Manag. (2018)","DOI":"10.1109\/TNSM.2018.2861741"},{"key":"62_CR12","unstructured":"Lapolli, A.C., Marques, J.A., Gaspary, L.P.: Offloading real-time DDoS attack detection to programmable data planes. In: IFIP International Symposium on Integrated Network Management (2019)"},{"key":"62_CR13","doi-asserted-by":"crossref","unstructured":"Lau, F., Rubin, S.H., Smith, M.H., Trajkovic, L.: DDoS attacks, vol. 3, pp. 2275\u20132280, February 2000","DOI":"10.1109\/ICSMC.2000.886455"},{"key":"62_CR14","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1109\/TNSM.2017.2701549","volume":"14","author":"R Mohammadi","year":"2017","unstructured":"Mohammadi, R., Javidan, R., Conti, M.: SLICOTS: an SDN-based lightweight countermeasure for SYN flooding attacks. IEEE Trans. Netw. Serv. Manag. 14, 487\u2013497 (2017)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"62_CR15","doi-asserted-by":"crossref","unstructured":"Niemiec, M., Jaglarz, P., Jekot, M., Cho\u0142da, P., Bory\u0142o, P.: Risk assessment approach to secure northbound interface of SDN networks. In: 2019 ICNC, pp. 164\u2013169 (2019)","DOI":"10.1109\/ICCNC.2019.8685486"},{"key":"62_CR16","doi-asserted-by":"crossref","unstructured":"Nugraha, M., Paramita, I., Choi, D., Cho, B.: Utilizing OpenFlow and sFlow to detect and mitigate SYN flooding attack. J. Korea Multimedia Soc. 8(8) (2014)","DOI":"10.9717\/kmms.2014.17.8.988"},{"key":"62_CR17","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: AVANT-GUARD: scalable and vigilant switch flow management in SDN. In: ACM SIGSAC Conference on Computer, pp. 413\u2013424 (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"62_CR18","doi-asserted-by":"crossref","unstructured":"Sviridov, G., Bonola, M., Giaccone, P., Bianchi, G.: LODGE: LOcal Decisions on Global statEs in progrananaable data planes. In: 4th CNSW, pp. 257\u2013261 (2018)","DOI":"10.1109\/NETSOFT.2018.8460115"},{"key":"62_CR19","doi-asserted-by":"crossref","unstructured":"Wang, Y., Liu, Y., Hu, J., Zhang, M., Wang, X.: Reputation and incentive mechanism for SDN applications. In: 14th International CMASN, pp. 152\u2013157 (2018)","DOI":"10.1109\/MSN.2018.000-3"}],"container-title":["Lecture Notes in Networks and Systems","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75075-6_62","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,29]],"date-time":"2024-08-29T11:25:15Z","timestamp":1724930715000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75075-6_62"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750749","9783030750756"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75075-6_62","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"27 April 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}