{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T03:20:03Z","timestamp":1725852003177},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319315492"},{"type":"electronic","value":"9783319315508"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31550-8_1","type":"book-chapter","created":{"date-parts":[[2016,3,22]],"date-time":"2016-03-22T14:26:20Z","timestamp":1458656780000},"page":"3-16","source":"Crossref","is-referenced-by-count":0,"title":["Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks"],"prefix":"10.1007","author":[{"given":"Huishan","family":"Bian","sequence":"first","affiliation":[]},{"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Meng","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Mingzhong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qiongyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,16]]},"reference":[{"key":"1_CR1","unstructured":"Koponen, T., Casado, M., Gude, N., et al.: Onix: a distributed control platform for large-scale production networks. In: OSDI, pp. 1\u20136 (2010)"},{"key":"1_CR2","unstructured":"Phaal, P.: sFlow Specification Version 5, July 2004"},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., et al.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38, 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis, K., Argyropoulos, C., Androulidakis, G., et al.: Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62, 122\u2013136 (2014)","journal-title":"Comput. Netw."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: IEEE 35th Conference on Local Computer Networks (LCN), pp. 408\u2013415. IEEE (2010)","DOI":"10.1109\/LCN.2010.5735752"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","volume":"81","author":"B Wang","year":"2015","unstructured":"Wang, B., et al.: DDoS attack protection in the era of cloud computing and Software-Defined Networking. Comput. Netw. 81, 308\u2013319 (2015)","journal-title":"Comput. Netw."},{"key":"1_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/978-3-540-71617-4_3","volume-title":"Passive and Active Network Measurement","author":"A Soule","year":"2007","unstructured":"Soule, A., Ringberg, H., Silveira, F., Rexford, J., Diot, C.: Detectability of traffic anomalies in two adjacent networks. In: Uhlig, S., Papagiannaki, K., Bonaventure, O. (eds.) PAM 2007. LNCS, vol. 4427, pp. 22\u201331. Springer, Heidelberg (2007)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Lin, P., Bi, J., Chen, Z., et al.: WE-bridge: West-East Bridge for SDN inter-domain network peering. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 111\u2013112. IEEE (2014)","DOI":"10.1109\/INFCOMW.2014.6849180"},{"key":"1_CR9","first-page":"37","volume":"1","author":"SRM Oliveira","year":"2010","unstructured":"Oliveira, S.R.M., Zaiane, O.R.: Privacy preserving clustering by data transformation. J. Inf. Data Manag. 1, 37 (2010)","journal-title":"J. Inf. Data Manag."},{"issue":"12","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1764","DOI":"10.1109\/TPDS.2009.26","volume":"20","author":"K Chen","year":"2009","unstructured":"Chen, K., Liu, L.: Privacy-preserving multiparty collaborative mining with geometric data perturbation. IEEE Trans. Parallel Distrib. Syst. 20(12), 1764\u20131776 (2009)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/978-3-319-06608-0_48","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"SM Erfani","year":"2014","unstructured":"Erfani, S.M., Law, Y.W., Karunasekera, S., Leckie, C.A., Palaniswami, M.: Privacy-preserving collaborative anomaly detection for participatory sensing. In: Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y., Tseng, V.S. (eds.) PAKDD 2014, Part I. LNCS, vol. 8443, pp. 581\u2013593. Springer, Heidelberg (2014)"},{"key":"1_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-642-22263-4_3","volume-title":"Privacy Enhancing Technologies","author":"S Nagaraja","year":"2011","unstructured":"Nagaraja, S., Jalaparti, V., Caesar, M., Borisov, N.: P3CA: private anomaly detection across ISP networks. In: Fischer-H\u00fcbner, S., Hopper, N. (eds.) PETS 2011. LNCS, vol. 6794, pp. 38\u201356. Springer, Heidelberg (2011)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, P., Huang, X., Sun, X., et al.: Privacy-preserving anomaly detection across multi-domain networks. In: 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), pp. 1066\u20131070. IEEE (2012)","DOI":"10.1109\/FSKD.2012.6234272"},{"key":"1_CR14","doi-asserted-by":"publisher","first-page":"6010","DOI":"10.1109\/TSP.2013.2282911","volume":"61","author":"HX Nguyen","year":"2013","unstructured":"Nguyen, H.X., Roughan, M.: Multi-observer privacy-preserving hidden Markov models. IEEE Trans. Signal Process. 61, 6010\u20136019 (2013)","journal-title":"IEEE Trans. Signal Process."},{"key":"1_CR15","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.datak.2012.10.004","volume":"83","author":"CR Giannella","year":"2013","unstructured":"Giannella, C.R., Liu, K., Kargupta, H.: Breaching Euclidean distance-preserving data perturbation using few known inputs. Data Knowl. Eng. 83, 93\u2013110 (2013)","journal-title":"Data Knowl. Eng."},{"key":"1_CR16","first-page":"59","volume":"1","author":"Y Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Priv. Confidentiality 1, 59\u201398 (2009)","journal-title":"J. Priv. Confidentiality"},{"key":"1_CR17","unstructured":"Lo, Z.P., Fujita, M., Bavarian, B.: Analysis of neighborhood interaction in Kohonen neural networks. In: 6th International Parallel Processing Symposium, CA, Los Alamitos (1991)"},{"key":"1_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-642-23644-0_9","volume-title":"Recent Advances in Intrusion Detection","author":"SA Mehdi","year":"2011","unstructured":"Mehdi, S.A., Khalid, J., Khayam, S.A.: Revisiting traffic anomaly detection using software defined networking. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 161\u2013180. Springer, Heidelberg (2011)"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Giotis, K., Androulidakis, G., Aglaris, V.: Leveraging SDN for efficient anomaly detection and mitigation on legacy networks. In: Third European Workshop on Software Defined Networks (EWSDN), pp. 85\u201390. IEEE (2014)","DOI":"10.1109\/EWSDN.2014.24"},{"issue":"4","key":"1_CR20","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1109\/TDSC.2013.8","volume":"10","author":"Chun-Jen Chung","year":"2013","unstructured":"Chung, C.-J., Nice, et al.: Network intrusion detection and countermeasure selection in virtual network systems. IEEE Transactions on Dependable and Secure Computing, pp. 198\u2013211 (2013)","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"1_CR21","unstructured":"IEEE SDN For. 2013, 1\u20137 (2013)"},{"key":"1_CR22","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp. 55\u201360 (2013)","DOI":"10.1145\/2491185.2491199"},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Zhan, J.: Privacy-preserving collaborative data mining, Computational Intelligence Magazine, pp. 31\u201341. IEEE (2008)","DOI":"10.1109\/MCI.2008.919071"},{"key":"1_CR24","series-title":"Advances in Database Systems","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-0-387-70992-5_2","volume-title":"A General Survey of Privacy-Preserving Data Mining Models and Algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C.C., Philip, S.Y.: A general survey of privacy-preserving data mining models and algorithms. In: Aggarwal, C.C., Philip, S.Y. (eds.) A General Survey of Privacy-Preserving Data Mining Models and Algorithms. Advances in Database Systems, vol. 34, pp. 11\u201352. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Trusted Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31550-8_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:07:58Z","timestamp":1559423278000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31550-8_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319315492","9783319315508"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31550-8_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}