{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:30:18Z","timestamp":1742981418994,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319200330"},{"type":"electronic","value":"9783319200347"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20034-7_14","type":"book-chapter","created":{"date-parts":[[2015,6,3]],"date-time":"2015-06-03T19:25:48Z","timestamp":1433359548000},"page":"134-139","source":"Crossref","is-referenced-by-count":8,"title":["Towards an Adaptive and Effective IDS Using OpenFlow"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Seeber","sequence":"first","affiliation":[]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Akamai - Q4 2014 State of the Internet Security Report, \n                      \n                        http:\/\/www.stateoftheinternet.com\/resources-web-security-2014-q4-internet-security-report.html\n                      \n                      \n                     (last accessed on January 28, 2015)"},{"key":"14_CR2","unstructured":"Arbor Networks - Worldwide Infrastructure Security Report (2014), \n                      \n                        http:\/\/pages.arbornetworks.com\/rs\/arbor\/images\/WISR2014.pdf"},{"key":"14_CR3","unstructured":"Bro Network Security Monitor, \n                      \n                        http:\/\/www.bro.org\/\n                      \n                      \n                     (last accessed on January 28, 2015)"},{"key":"14_CR4","unstructured":"Cloudflare, Inc., \n                      \n                        https:\/\/www.cloudflare.com\/\n                      \n                      \n                     (last accessed on January 28, 2015)"},{"key":"14_CR5","unstructured":"Franklin Morris, Infographic: SMB Cloud Adoption Trends in (2014), \n                      \n                        http:\/\/www.pcworld.com\/article\/2685792\/infographic-smb-cloud-adoption-trends-in-2014.html\n                      \n                      \n                     (last accessed on January 28, 2015)"},{"key":"14_CR6","unstructured":"Snort, \n                      \n                        https:\/\/www.snort.org\/\n                      \n                      \n                     (last accessed on January, 28 2015)"},{"key":"14_CR7","unstructured":"Suricata IDS\/IPS, \n                      \n                        http:\/\/www.suricata-ids.org\/\/\n                      \n                      \n                     (last accessed on January 28, 2015)"},{"key":"14_CR8","unstructured":"AbuHmed, T., Mohaisen, A., Nyang, D.: A survey on deep packet inspection for intrusion detection systems. arXiv preprint arXiv:0803.0037 (2008)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: 2010 IEEE 35th Conference on Local Computer Networks (LCN), pp. 408\u2013415. IEEE (2010)","DOI":"10.1109\/LCN.2010.5735752"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"Feamster, N.: Outsourcing home network security. In: Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, pp. 37\u201342. ACM (2010)","DOI":"10.1145\/1851307.1851317"},{"key":"14_CR11","unstructured":"Fran\u00e7ois, J., Dolberg, L., Festor, O., Engel, T.: Network Security through Software Defined Networking: a Survey. In: IIT Real-Time Communications (RTC) Conference-Principles, Systems and Applications of IP Telecommunications (IPTComm). ACM"},{"key":"14_CR12","unstructured":"Fry, C., Nystrom, M.: Security Monitoring. O\u2019Reilly Media, Inc. (2009)"},{"key":"14_CR13","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K. Giotis","year":"2014","unstructured":"Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Computer Networks\u00a062, 122\u2013136 (2014)","journal-title":"Computer Networks"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in software Defined Networking, pp. 55\u201360. ACM (2013)","DOI":"10.1145\/2491185.2491199"},{"key":"14_CR15","unstructured":"Schehlmann, L., Baier, H.: COFFEE: A Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes. In: GI-Jahrestagung, pp. 2225\u20132239 (2013)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: SDN security: A survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/SURV.2010.032210.00054","volume":"12","author":"A. Sperotto","year":"2010","unstructured":"Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys Tutorials\u00a012(3), 343\u2013356 (2010)","journal-title":"IEEE Communications Surveys Tutorials"}],"container-title":["Lecture Notes in Computer Science","Intelligent Mechanisms for Network Configuration and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20034-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T20:08:59Z","timestamp":1559938139000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20034-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319200330","9783319200347"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20034-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}