{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:35:46Z","timestamp":1743064546849,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030900182"},{"type":"electronic","value":"9783030900199"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-90019-9_22","type":"book-chapter","created":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T18:47:48Z","timestamp":1635878868000},"page":"438-455","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CROCUS: An Objective Approach for SDN Controllers Security Assessment"],"prefix":"10.1007","author":[{"given":"Carlos","family":"Silva","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Sousa","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o P.","family":"Vilela","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,3]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Taneja, M., Davy, A.: Resource aware placement of IoT application modules in fog-cloud computing paradigm. In: IFIP\/IEEE IM. IEEE (2017)","key":"22_CR1","DOI":"10.23919\/INM.2017.7987464"},{"unstructured":"Cohen, A., et al.: Bringing network coding into SDN: a case-study for highly meshed heterogeneous communications. CoRR, vol. abs\/2010.00343 (2020)","key":"22_CR2"},{"doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S.: Design and deployment of secure, robust, and resilient SDN controllers. In: IEEE NetSoft (2015)","key":"22_CR3","DOI":"10.1109\/NETSOFT.2015.7258233"},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.comcom.2020.02.085","volume":"154","author":"MP Singh","year":"2020","unstructured":"Singh, M.P., Bhandari, A.: New-flow based DDoS attacks in SDN: taxonomy, rationales, and research challenges. Comput. Comm. 154, 509\u2013527 (2020)","journal-title":"Comput. Comm."},{"doi-asserted-by":"crossref","unstructured":"Abdou, A.R., van Oorschot, C., Wan, T.: A framework and comparative analysis of control plane security of SDN and conventional networks. arXiv (2017)","key":"22_CR5","DOI":"10.1109\/COMST.2018.2839348"},{"doi-asserted-by":"crossref","unstructured":"Yoon, S., et al.: A security-mode for carrier-grade SDN controllers. In: ACM ACSAC. ACM, December 2017","key":"22_CR6","DOI":"10.1145\/3134600.3134603"},{"doi-asserted-by":"crossref","unstructured":"Mamushiane, L., Lysko, A., Dlamini, S.: A comparative evaluation of the performance of popular SDN controllers. IFIP Wireless Days, April 2018","key":"22_CR7","DOI":"10.1109\/WD.2018.8361694"},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1016\/j.comnet.2014.02.026","volume":"65","author":"B Sousa","year":"2014","unstructured":"Sousa, B., Pentikousis, K., Curado, M.: Methodical: towards the next generation of multihomed applications. Comput. Netw. 65, 21\u201340 (2014)","journal-title":"Comput. Netw."},{"issue":"3","key":"22_CR9","first-page":"90","volume":"18","author":"S Baghla","year":"2018","unstructured":"Baghla, S., Bansal, S.: VIKOR MADM based optimization method for vertical handover in heterogeneous networks. Adv. Syst. Sci. Appl. 18(3), 90\u2013110 (2018)","journal-title":"Adv. Syst. Sci. Appl."},{"doi-asserted-by":"crossref","unstructured":"Khondoker, R., Zaalouk, A., Marx, R., Bayarou, K.: Feature-based comparison and selection of software defined networking controllers. In: WCCAIS 2014","key":"22_CR10","DOI":"10.1109\/WCCAIS.2014.6916572"},{"key":"22_CR11","volume-title":"Security Patterns: Integrating Security and Systems Engineering","author":"M Schumacher","year":"2005","unstructured":"Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns: Integrating Security and Systems Engineering. Wiley, Hoboken (2005)"},{"doi-asserted-by":"crossref","unstructured":"Arbettu, R.K., Khondoker, R., Bayarou, K., Weber, F.: Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers. In: 17th Networks Symposium (2016)","key":"22_CR12","DOI":"10.1109\/NETWKS.2016.7751150"},{"doi-asserted-by":"crossref","unstructured":"Microsoft: The STRIDE Threat Model (2009)","key":"22_CR13","DOI":"10.1016\/S1353-4858(09)70008-X"},{"unstructured":"NIST Itl National Vulnerability Database: Common vulnerability scoring system calculator. https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\/v3-calculator","key":"22_CR14"},{"doi-asserted-by":"crossref","unstructured":"Ara\u00fajo, M.C., Sousa, B., Curado, M., Bittencourt, L.F.: CMFog: proactive content migration using markov Chain and MADM in fog computing. In: 2020 IEEE\/ACM UCC (2020)","key":"22_CR15","DOI":"10.1109\/UCC48980.2020.00030"},{"doi-asserted-by":"crossref","unstructured":"Sousa, B., Pentikousis, K., Curado, M.: Optimizing quality of resilience in the cloud. In: 2014 IEEE Global Communications Conference (2014)","key":"22_CR16","DOI":"10.1109\/GLOCOM.2014.7036961"},{"issue":"6","key":"22_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3421764","volume":"53","author":"L Zhu","year":"2020","unstructured":"Zhu, L., et al.: Sdn controllers: a comprehensive analysis and performance evaluation study. ACM Comput. Surv. 53(6), 1\u201340 (2020)","journal-title":"ACM Comput. Surv."},{"doi-asserted-by":"crossref","unstructured":"Schehlmann, L., Abt, S., Baier, H.: Blessing or curse? Revisiting security aspects of software-defined networking. In: CNSM (2014)","key":"22_CR18","DOI":"10.1109\/CNSM.2014.7014199"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., Liu, Y.: DDoS attack detection under SDN context. In: IEEE INFOCOM 2016. IEEE Press (2016)","key":"22_CR19","DOI":"10.1109\/INFOCOM.2016.7524500"},{"unstructured":"O.N.F. (ONF): SDN Architecture 1.0 Overview, November 2014","key":"22_CR20"},{"doi-asserted-by":"crossref","unstructured":"Sanvito, D., Moro, D., Gulli, M., Filippini, I., Capone, A., Campanella, A.: ONOS intent monitor and reroute service: enabling plug&play routing logic. In: 2018 4th IEEE NetSoft. IEEE, June 2018","key":"22_CR21","DOI":"10.1109\/NETSOFT.2018.8460064"},{"unstructured":"FIRST: Common vulnerability scoring system version 3.1: user guide (2021). https:\/\/www.first.org\/cvss\/user-guide,","key":"22_CR22"},{"issue":"3","key":"22_CR23","first-page":"965","volume":"16","author":"B Martini","year":"2019","unstructured":"Martini, B., Gharbaoui, M., Adami, D., Castoldi, P., Giordano, S.: Experimenting SDN and cloud orchestration in virtualized testing facilities: performance results and comparison. IEEE TNSM 16(3), 965\u2013979 (2019)","journal-title":"IEEE TNSM"},{"issue":"8","key":"22_CR24","first-page":"202","volume":"8","author":"S Hamid","year":"2017","unstructured":"Hamid, S., Zakaria, N., Ahmed, J.: ReCSDN: resilient controller for software defined networks. Int. J. Adv. Comput. Sci. Appl. 8(8), 202\u2013208 (2017)","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"2","key":"22_CR25","doi-asserted-by":"publisher","first-page":"1281","DOI":"10.1007\/s10586-019-02996-0","volume":"23","author":"S Badotra","year":"2019","unstructured":"Badotra, S., Panda, S.N.: Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. Cluster Comput. 23(2), 1281\u20131291 (2019). https:\/\/doi.org\/10.1007\/s10586-019-02996-0","journal-title":"Cluster Comput."},{"doi-asserted-by":"crossref","unstructured":"Ujcich. B.E., et al.: Automated discovery of cross-plane event-based vulnerabilities in software-defined networking. In: NDSS Symposium. Internet Society, February 2020","key":"22_CR26","DOI":"10.14722\/ndss.2020.24080"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-90019-9_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T18:59:38Z","timestamp":1635879578000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-90019-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030900182","9783030900199"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-90019-9_22","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 November 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy +","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"143","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"56","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}