{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:05:21Z","timestamp":1742925921157,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031578694"},{"type":"electronic","value":"9783031578700"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57870-0_32","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:01:52Z","timestamp":1712635312000},"page":"362-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["FEVER: Intelligent Behavioral Fingerprinting for\u00a0Anomaly Detection in\u00a0P4-Based Programmable Networks"],"prefix":"10.1007","author":[{"given":"Matheus","family":"Saueressig","sequence":"first","affiliation":[]},{"given":"Muriel Figueredo","family":"Franco","sequence":"additional","affiliation":[]},{"given":"Eder J.","family":"Scheid","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Huertas","sequence":"additional","affiliation":[]},{"given":"Gerome","family":"Bovet","sequence":"additional","affiliation":[]},{"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[]},{"given":"Lisandro Z.","family":"Granville","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-030-22277-2_13","volume-title":"Handbook of Computer Networks and Cyber Security: Principles and Paradigms","author":"S Badotra","year":"2020","unstructured":"Badotra, S., Panda, S.N.: Software-defined networking: a novel approach to networks. In: Gupta, B., Perez, G., Agrawal, D., Gupta, D. (eds.) Handbook of Computer Networks and Cyber Security: Principles and Paradigms, pp. 313\u2013339. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22277-2_13"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Bai, S., Kim, H., Rexford, J.: Passive OS fingerprinting on commodity switches. In: IEEE 8th International Conference on Network Softwarization (NetSoft), pp. 264\u2013268 (2022)","DOI":"10.1109\/NetSoft54395.2022.9844109"},{"issue":"1","key":"32_CR3","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MCOM.2018.1800507","volume":"57","author":"L Bondan","year":"2019","unstructured":"Bondan, L., et al.: FENDE: marketplace-based distribution, execution, and life cycle management of VNFs. IEEE Commun. Mag. 57(1), 13\u201319 (2019)","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"32_CR4","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., et al.: P4: programming protocol-independent packet processors. SIGCOMM Comput. Commun. Rev. 44(3), 87\u201395 (2014)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"issue":"6","key":"32_CR5","doi-asserted-by":"publisher","first-page":"4019","DOI":"10.1109\/TDSC.2021.3116345","volume":"19","author":"D Ding","year":"2021","unstructured":"Ding, D., Savi, M., Siracusa, D.: Tracking normalized network traffic entropy to detect DDoS attacks in P4. Trans. Dependable Secure Comput. 19(6), 4019\u20134031 (2021)","journal-title":"Trans. Dependable Secure Comput."},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Dumitrescu, D., Stoenescu, R., Negreanu, L., Raiciu, C.: BF4: towards bug-free P4 programs. In: SIGCOMM 2020, Virtually, USA, pp. 571\u2013585 (2020)","DOI":"10.1145\/3387514.3405888"},{"key":"32_CR7","doi-asserted-by":"publisher","first-page":"54373","DOI":"10.1109\/ACCESS.2023.3275756","volume":"11","author":"B Goswami","year":"2023","unstructured":"Goswami, B., Kulkarni, M., Paulose, J.: A survey on P4 challenges in software defined networks: P4 programming. IEEE Access 11, 54373\u201354387 (2023)","journal-title":"IEEE Access"},{"key":"32_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103561","volume":"212","author":"F Hauser","year":"2023","unstructured":"Hauser, F., et al.: A survey on data plane programming with P4: fundamentals, advances, and applied research. J. Netw. Comput. Appl. 212, 103561 (2023)","journal-title":"J. Netw. Comput. Appl."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Li, G., et al.: NETHCF: enabling line-rate and adaptive spoofed IP traffic filtering. In: IEEE 27th International Conference on Network Protocols (ICNP 2019), Chicago, USA, pp. 1\u201312 (2019)","DOI":"10.1109\/ICNP.2019.8888057"},{"key":"32_CR10","unstructured":"Saueressig, M., Franco, M.F.: FEVER-P4 repository (2024). https:\/\/github.com\/ComputerNetworks-UFRGS\/FEVER-P4"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Saueressig, M., Franco, M.F., Scheid, E.J., Granville, L.Z.: An approach for behavioral fingerprinting of P4 programmable switches. In: XX Escola Regional de Redes de Computadores (ERRC 2023), Porto Alegre, Brazil, pp. 22\u201360 (2023)","DOI":"10.5753\/errc.2023.915"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Musumeci, F., Ionata, V., Paolucci, F., Cugini, F., Tornatore, M.: Machine-learning-assisted DDoS attack detection with P4 language. In: IEEE International Conference on Communications (ICC 2020), Virtually, pp. 1\u20136 (2020)","DOI":"10.1109\/ICC40277.2020.9149043"},{"issue":"3","key":"32_CR13","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"32_CR14","unstructured":"Open Networking Foundation: P4Language (2023). https:\/\/github.com\/p4lang"},{"issue":"2","key":"32_CR15","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1109\/COMST.2021.3064259","volume":"23","author":"PMS S\u00e1nchez","year":"2021","unstructured":"S\u00e1nchez, P.M.S., Valero, J.M.J., Celdr\u00e1n, A.H., Bovet, G., P\u00e9rez, M.G., P\u00e9rez, G.M.: A survey on device behavior fingerprinting: data sources, techniques, application scenarios, and datasets. IEEE Commun. Surv. Tutor. 23(2), 1048\u20131077 (2021)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"32_CR16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107763","volume":"186","author":"L Tan","year":"2021","unstructured":"Tan, L., et al.: In-band network telemetry: a survey. Comput. Netw. 186, 107763 (2021)","journal-title":"Comput. Netw."},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Teng, L., Hung, C.H., Wen, C.H.P.: P4SF: a high-performance stateful firewall on commodity P4-programmable switch. In: IEEE\/IFIP Network Operations and Management Symposium (NOMS 2022), Budapest, Hungary, pp. 1\u20135 (2022)","DOI":"10.1109\/NOMS54207.2022.9789778"},{"key":"32_CR18","doi-asserted-by":"publisher","first-page":"65579","DOI":"10.1109\/ACCESS.2019.2916648","volume":"7","author":"M Usama","year":"2019","unstructured":"Usama, M., et al.: Unsupervised machine learning for networking: techniques, applications and research challenges. IEEE Access 7, 65579\u201365615 (2019)","journal-title":"IEEE Access"},{"key":"32_CR19","unstructured":"Wang, Q., Pan, M., Wang, S., Doenges, R., Beringer, L., Appel, A.W.: Foundational verification of stateful P4 packet processing. In: 14th International Conference on Interactive Theorem Proving (ITP 2023). Schloss-Dagstuhl-Leibniz Zentrum f\u00fcr Informatik, pp. 1\u201332 (2023)"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57870-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T04:11:59Z","timestamp":1712635919000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57870-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578694","9783031578700"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57870-0_32","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kitakyushu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}