{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:54Z","timestamp":1763468274820},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319263618"},{"type":"electronic","value":"9783319263625"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26362-5_7","type":"book-chapter","created":{"date-parts":[[2015,10,26]],"date-time":"2015-10-26T14:10:45Z","timestamp":1445868645000},"page":"133-152","source":"Crossref","is-referenced-by-count":13,"title":["Providing Dynamic Control to Passive Network Security Monitoring"],"prefix":"10.1007","author":[{"given":"Johanna","family":"Amann","sequence":"first","affiliation":[]},{"given":"Robin","family":"Sommer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"key":"7_CR1","unstructured":"ACL blocker notes. \n                      http:\/\/www-nrg.ee.lbl.gov\/leres\/acl2.html"},{"key":"7_CR2","unstructured":"Allcock, W., Bester, J., Bresnahan, J., Chervenak, A., Liming, L., Tuecke, S.: GridFTP: Protocol Extensions for the Grid. Grid ForumGFD-R-P.020 (2003)"},{"key":"7_CR3","unstructured":"Ballard, J.R., Rae, I., Akella, A.: Extensible and scalable network monitoring using OpenSAFE. In: INM\/WREN (2010)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: LCN (2010)","DOI":"10.1109\/LCN.2010.5735752"},{"key":"7_CR5","unstructured":"Bro Network Monitoring System. \n                      https:\/\/www.bro.org"},{"key":"7_CR6","unstructured":"Broker: Bro\u2019s Messaging Library. \n                      https:\/\/github.com\/bro\/broker"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Campbell, S., Lee, J.: Prototyping a 100g monitoring system. In: PDP (2012)","DOI":"10.1109\/PDP.2012.95"},{"key":"7_CR8","unstructured":"Presentation slides\u2013Anonymized for submission (2014)"},{"key":"7_CR9","unstructured":"ESnet: Science DMZ Security - Firewalls vs. Router ACLs. \n                      https:\/\/fasterdata.es.net\/science-dmz\/science-dmz-security\/"},{"key":"7_CR10","unstructured":"GlobalNOC: SciPass: IDS Load Balancer & Science DMZ. \n                      http:\/\/globalnoc.iu.edu\/sdn\/scipass.html"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Gonzalez, J., Paxson, V., Weaver, N.: Shunting: a hardware\/software architecture for flexible, high-performance network intrusion prevention. In: ACM Communications and Computer Security (CCS) Conference, Washington, D.C (2007)","DOI":"10.1145\/1315245.1315264"},{"key":"7_CR12","unstructured":"Maier, G., Sommer, R., Dreger, H., Feldmann, A., Paxson, V., Schneider, F.: Enriching network security analysis with time travel. In: Proceedings of the ACM SIGCOMM (2008). \n                      http:\/\/www.icir.org\/robin\/papers\/sigcomm08-tm.pdf"},{"issue":"2","key":"7_CR13","first-page":"69","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: OpenFlow: enabling innovation in campus networks. CCR 38(2), 69\u201374 (2008)","journal-title":"CCR"},{"key":"7_CR14","unstructured":"Network Control framework and utility code. \n                      http:\/\/icir.org\/johanna\/netcontrol"},{"key":"7_CR15","unstructured":"OSCARS: On-Demand Secure Circuits and Advance Reservation System. \n                      http:\/\/www.es.net\/engineering-services\/oscars\/"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Papadogiannakis, A., Polychronakis, M., Markatos, E.P.: Improving the accuracy of network intrusion detection systems under load using selective packet discarding. In: EUROSEC (2010)","DOI":"10.1145\/1752046.1752049"},{"issue":"23\u201324","key":"7_CR17","doi-asserted-by":"publisher","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson, V.: Bro: a system for detecting network intruders in real-time. Comput. Netw. 31(23\u201324), 2435\u20132463 (1999)","journal-title":"Comput. Netw."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Porras, P., Cheung, S., Fong, M., Skinner, K., Yegneswaran, V.: Securing the software-defined network control layer. In: Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), February 2015","DOI":"10.14722\/ndss.2015.23222"},{"key":"7_CR19","unstructured":"Ryu SDN Framework. \n                      http:\/\/osrg.github.io\/ryu\/"},{"key":"7_CR20","unstructured":"Science DMZ - A Scalable Network Design Model for Optimizing Science Data Transfers. \n                      https:\/\/fasterdata.es.net\/science-dmz"},{"key":"7_CR21","unstructured":"Security and NAT Gateway for the Munich Scientific Network (MWN). \n                      https:\/\/www.lrz.de\/services\/netzdienste\/secomat_en\/"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Shirali-Shahreza, S., Ganjali, Y.: FleXam: flexible sampling extension for monitoring and security applications in openflow. In: HotSDN (2013)","DOI":"10.1145\/2491185.2491215"},{"key":"7_CR23","unstructured":"Snortsam - A Firewall Blocking Agent for Snort. \n                      https:\/\/www.snortsam.net"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Van Adrichem, N., Doerr, C., Kuipers, F.: OpenNetMon: network monitoring in OpenFlow software-defined networks. In: NOMS (2014)","DOI":"10.1109\/NOMS.2014.6838228"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: SnortFlow: a OpenFlow-based intrusion prevention system in cloud environment. In: GREE (2013)","DOI":"10.1109\/GREE.2013.25"}],"container-title":["Lecture Notes in Computer Science","Research in Attacks, Intrusions, and Defenses"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26362-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T09:34:58Z","timestamp":1559295298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26362-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319263618","9783319263625"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26362-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}