{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:10:54Z","timestamp":1748751054386,"version":"3.41.0"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271606"},{"type":"electronic","value":"9783319271613"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27161-3_68","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T04:38:40Z","timestamp":1447821520000},"page":"746-756","source":"Crossref","is-referenced-by-count":2,"title":["Security Modeling and Analysis of a SDN Based Web Service"],"prefix":"10.1007","author":[{"given":"Taehoon","family":"Eom","sequence":"first","affiliation":[]},{"given":"Jin B.","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Jong Sou","family":"Park","sequence":"additional","affiliation":[]},{"given":"Dong Seong","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"68_CR1","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop Hot Topics on Software Defined Networking - HotSDN 2013, p. 55, August 2013","DOI":"10.1145\/2491185.2491199"},{"key":"68_CR2","unstructured":"Sheyner, O., Haines, J., Jha, S., Lippmann, R., Wing, J.: Automated generation and analysis of attack graphs. Technical report, CMU (2002)"},{"key":"68_CR3","doi-asserted-by":"crossref","unstructured":"Ingols, K., Lippmann, R., Piwowarski, K.: Practical attack graph generation for network defense. In: Proceeding of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 121\u2013130 (2006)","DOI":"10.1109\/ACSAC.2006.39"},{"issue":"12","key":"68_CR4","first-page":"21","volume":"24","author":"B Schneier","year":"1999","unstructured":"Schneier, B.: Modeling security threats. Dr. Dobb\u2019s J. 24(12), 21\u201329 (1999)","journal-title":"Dr. Dobb\u2019s J."},{"issue":"8","key":"68_CR5","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1002\/sec.299","volume":"5","author":"A Roy","year":"2012","unstructured":"Roy, A., Kim, D., Trivedi, K.: Attack countermeasure trees (ACT): towards unifying the constructs of attack and defense trees. Secur. Commun. Netw. 5(8), 929\u2013943 (2012)","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"68_CR6","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.2010.60","volume":"37","author":"P Manadhata","year":"2011","unstructured":"Manadhata, P., Wing, J.: An attack surface metric. IEEE Trans. Softw. Eng. 37(3), 371\u2013386 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"68_CR7","doi-asserted-by":"crossref","unstructured":"Hong, J., Kim, D.: Scalable security models for assessing effectiveness of moving target defenses. In: Proceedings of the the 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN 2014), pp. 515\u2013526, June 2014","DOI":"10.1109\/DSN.2014.54"},{"issue":"7","key":"68_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"S Sezer","year":"2013","unstructured":"Sezer, S., Scott-Hayward, S., Chouhan, P., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., Rao, N.: Are we ready for SDN? implementation challenges for software-defined networks. IEEE Commun. Mag. 51(7), 36\u201343 (2013)","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"68_CR9","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MIC.2012.144","volume":"17","author":"D Drutskoy","year":"2013","unstructured":"Drutskoy, D., Keller, E., Rexford, J.: Scalable network virtualization in software-defined networks. IEEE Internet Comput. 17(2), 20\u201327 (2013)","journal-title":"IEEE Internet Comput."},{"key":"68_CR10","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1016\/j.procs.2014.07.097","volume":"34","author":"R Vaghani","year":"2014","unstructured":"Vaghani, R., Lung, C.H.: A comparison of data forwarding schemes for network resiliency in software defined networking. Procedia Comput. Sci. 34, 680\u2013685 (2014)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"68_CR11","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1587\/transcom.E97.B.2","volume":"E97\u2013B","author":"SS Kuklinski","year":"2014","unstructured":"Kuklinski, S.S., Chemouil, P.: Network management challenges in software-defined networks. IEICE Trans. Commun. E97\u2013B(1), 2\u20139 (2014)","journal-title":"IEICE Trans. Commun."},{"issue":"4","key":"68_CR12","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TCC.2014.2355227","volume":"2","author":"H Li","year":"2014","unstructured":"Li, H., Li, P., Guo, S., Nayak, A.: Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans. Cloud Comput. 2(4), 436\u2013447 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"68_CR13","doi-asserted-by":"crossref","unstructured":"van Adrichem, N.L., van Asten, B.J., Kuipers, F.A.: Fast recovery in software-defined networks. 2014 Third EuropeanWorkshop on Software Defined Networks, pp. 61\u201366. IEEE, September 2014","DOI":"10.1109\/EWSDN.2014.13"},{"key":"68_CR14","doi-asserted-by":"crossref","unstructured":"Yao, G., Bi, J., Guo, L.: On the cascading failures of multi-controllers in Software Defined Networks. In: 2013 21st IEEE International Conference on Network Protocols (ICNP), pp. 1\u20132. IEEE, October 2013","DOI":"10.1109\/ICNP.2013.6733624"},{"key":"68_CR15","doi-asserted-by":"crossref","unstructured":"Gelberger, A., Yemini, N., Giladi, R.: Performance analysis of software-defined networking (SDN). In: 2013 IEEE 21st International Symposium on Modelling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 389\u2013393. IEEE, August 2013","DOI":"10.1109\/MASCOTS.2013.58"},{"key":"68_CR16","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1016\/j.comnet.2015.03.018","volume":"83","author":"F Longo","year":"2015","unstructured":"Longo, F., Distefano, S., Bruneo, D., Scarpa, M.: Dependability modeling of software defined networking. Comput. Netw. 83, 280\u2013296 (2015)","journal-title":"Comput. Netw."},{"key":"68_CR17","unstructured":"Shin, S., Porras, P., Yegneswaran, V., Fong, M., Gu, G., Tyson, M.: FRESCO: Modular composable security services for software-defined networks. In: Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS 2013), February 2013"},{"key":"68_CR18","doi-asserted-by":"crossref","unstructured":"Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Proceedings of 2015 Annual Network and Distributed System Security Symposium (NDSS 2015), February 2015","DOI":"10.14722\/ndss.2015.23283"},{"key":"68_CR19","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Poddar, R., Mahajan, K., Mann, V.: SPHINX: detecting security attacks in software-defined networks. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, 8\u201311 February 2014 (2015)","DOI":"10.14722\/ndss.2015.23064"},{"key":"68_CR20","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., Conti, M., Gaspari, F.D., Poovendran, R.: LineSwitch: Efficiently Managing Switch Flow in Software-Defined Networking while Effectively Tackling DoS Attacks. CoRR abs\/1502.02234 (2015)","DOI":"10.1145\/2714576.2714612"},{"key":"68_CR21","doi-asserted-by":"crossref","unstructured":"Porras, P., Cheung, S., Fong, M., Skinner, K., Yegneswaran, V.: Securing the software-defined network control layer. In: Proceedings of the 2015 Network and Distributed System Security Symposium (NDSS), February 2015","DOI":"10.14722\/ndss.2015.23222"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27161-3_68","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:33:37Z","timestamp":1748694817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27161-3_68"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271606","9783319271613"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27161-3_68","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}