{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T08:08:46Z","timestamp":1743149326623,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319398136"},{"type":"electronic","value":"9783319398143"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39814-3_9","type":"book-chapter","created":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T04:24:34Z","timestamp":1464755074000},"page":"84-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis and Evaluation of OpenFlow Message Usage for Security Applications"],"prefix":"10.1007","author":[{"given":"Sebastian","family":"Seeber","sequence":"first","affiliation":[]},{"given":"Gabi Dreo","family":"Rodosek","sequence":"additional","affiliation":[]},{"given":"Ga\u00ebtan","family":"Hurel","sequence":"additional","affiliation":[]},{"given":"R\u00e9mi","family":"Badonnel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,2]]},"reference":[{"key":"9_CR1","unstructured":"Akamai - Q4 2014 State of the Internet - Security Report. \n                      http:\/\/www.stateoftheinternet.com\/resources-web-security-2014-q4-internet-security-report.html\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR2","unstructured":"Arbor Networks - Worldwide Infrastructure Security Report 2014. \n                      http:\/\/pages.arbornetworks.com\/rs\/arbor\/images\/WISR2014.pdf"},{"key":"9_CR3","unstructured":"US-CERT Alert (TA14-017A) UDP-Based Amplification Attacks. \n                      https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-017A\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR4","unstructured":"Open vSwitch Community: Open vswitch. \n                      http:\/\/openvswitch.org\/\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR5","unstructured":"Ryu SDN Framework Community: Ryu sdn controller. \n                      http:\/\/osrg.github.io\/ryu\/\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Braga, R., Mota, E., Passito, A.: Lightweight ddos flooding attack detection using nox\/openflow. In: 2010 IEEE 35th Conference on Local Computer Networks (LCN), pp. 408\u2013415. IEEE (2010)","DOI":"10.1109\/LCN.2010.5735752"},{"key":"9_CR7","unstructured":"DEF CON Communications, Inc.: Defcon pcap traces. \n                      https:\/\/www.defcon.org\/html\/links\/dc-torrent.html\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR8","unstructured":"Defense4All: Defense4all module. \n                      https:\/\/wiki.opendaylight.org\/view\/Project_Proposals:Defense4All\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Feamster, N.: Outsourcing home network security. In: Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, pp. 37\u201342. ACM (2010)","DOI":"10.1145\/1851307.1851317"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois, J., Dolberg, L., Festor, O., Engel, T.: Network security through software defined networking: a survey. In: IIT Real-Time Communications (RTC) Conference-Principles, Systems and Applications of IP Telecommunications (IPTComm). ACM (2014)","DOI":"10.1145\/2670386.2670390"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments. Comput. Netw. 62, 122\u2013136 (2014)","journal-title":"Comput. Netw."},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/j.cose.2004.06.011","volume":"24","author":"S Hansman","year":"2005","unstructured":"Hansman, S., Hunt, R.: A taxonomy of network and computer attacks. Comput. Secur. 24(1), 31\u201343 (2005)","journal-title":"Comput. Secur."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Jafarian, J.H., Al-Shaer, E., Duan, Q.: Openflow random host mutation: transparent moving target defense using software defined networking. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, pp. 127\u2013132. ACM (2012)","DOI":"10.1145\/2342441.2342467"},{"key":"9_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-0977-9","volume-title":"Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats","author":"S Jajodia","year":"2011","unstructured":"Jajodia, S., Ghosh, A.K., Swarup, V., Wang, C., Wang, X.S.: Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, vol. 54. Springer Science & Business Media, New York (2011)"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Kampanakis, P., Perros, H., Beyene, T.: Sdn-based solutions for moving target defense network protection. In: 2014 IEEE 15th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1\u20136, June 2014","DOI":"10.1109\/WoWMoM.2014.6918979"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 55\u201360. ACM (2013)","DOI":"10.1145\/2491185.2491199"},{"issue":"1","key":"9_CR17","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/SURV.2013.081313.00105","volume":"16","author":"A Lara","year":"2014","unstructured":"Lara, A., Kolasani, A., Ramamurthy, B.: Network innovation using openflow: A survey. IEEE Commun. Surv. Tutorials 16(1), 493\u2013512 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"9_CR18","unstructured":"OpenDaylight: Sdn controller opendaylight. \n                      https:\/\/www.opendaylight.org\/\n                      \n                    . Accessed on 04 Feb 2016"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Sahay, R., Blanc, G., Zhang, Z., Debar, H.: Towards autonomic ddos mitigationusing software-defined networking. In: 2015 Network and Distributed SystemSecurity Symposium (NDSS 2015), pp. 1\u20136, February 2015","DOI":"10.14722\/sent.2015.23004"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Schehlmann, L., Abt, S., Baier, H.: Blessing or curse? revisiting security aspects of software-defined networking. In: 2014 10th International Conference on Network and Service Management (CNSM), pp. 382\u2013387. IEEE (2014)","DOI":"10.1109\/CNSM.2014.7014199"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O\u2019Callaghan, G., Sezer, S.: Sdn security: A survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"9_CR22","unstructured":"Shishira, S., Pai, V., Manamohan, K.: Current trends in detection and mitigation of denial of service attacks-a survey. Int. J. Comput. Appl. (2014)"},{"key":"9_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-662-43862-6_15","volume-title":"Monitoring and Securing Virtualized Networks and Services","author":"M Vizv\u00e1ry","year":"2014","unstructured":"Vizv\u00e1ry, M., Vykopal, J.: Future of DDoS attacks mitigation in software defined networks. In: Sperotto, A., Doyen, G., Latr\u00e9, S., Charalambides, M., Stiller, B. (eds.) AIMS 2014. LNCS, vol. 8508, pp. 123\u2013127. Springer, Heidelberg (2014)"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Zaalouk, A., Khondoker, R., Marx, R., Bayarou, K.: Orchsec: An orchestrator-based architecture for enhancing network-security using network monitoring and sdn control functions. In: 2014 IEEE Network Operations and Management Symposium (NOMS), pp. 1\u20139. IEEE (2014)","DOI":"10.1109\/NOMS.2014.6838409"},{"issue":"4","key":"9_CR25","doi-asserted-by":"publisher","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"S Zargar","year":"2013","unstructured":"Zargar, S., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (ddos) flooding attacks. IEEE Commun. Surv. Tutorials 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutorials"}],"container-title":["Lecture Notes in Computer Science","Management and Security in the Age of Hyperconnectivity"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39814-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,6]],"date-time":"2020-06-06T00:04:41Z","timestamp":1591401881000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39814-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319398136","9783319398143"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39814-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"2 June 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}