{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:48:32Z","timestamp":1761648512666,"version":"3.37.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_12","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"299-321","source":"Crossref","is-referenced-by-count":5,"title":["An SDN and NFV Use Case: NDN Implementation and Security Monitoring"],"prefix":"10.1007","author":[{"given":"Th\u00e9o","family":"Combe","sequence":"first","affiliation":[]},{"given":"Wissam","family":"Mallouli","sequence":"additional","affiliation":[]},{"given":"Thibault","family":"Cholez","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Doyen","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Mathieu","sequence":"additional","affiliation":[]},{"given":"Edgardo","family":"Montes de Oca","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"12_CR1","unstructured":"Montimage website. Available: http:\/\/www.montimage.com\/products.html"},{"key":"12_CR2","unstructured":"NDN. Available: https:\/\/named-data.net"},{"key":"12_CR3","unstructured":"CNSS, National Information Assurance Glossary. Available: http:\/\/www.ncsc.gov\/nittf\/docs\/ CNSSI-4009_National_Information_Assurance.pdf"},{"key":"12_CR4","unstructured":"MulVAL Project at Kansas University. Available: http:\/\/people.cs.ksu.edu\/~xou\/mulval\/"},{"key":"12_CR5","unstructured":"ETSI-ISG-NFV, Network Functions Virtualisation (NFV); NFV Security; Problem Statement, 2014. Available: http:\/\/www.etsi.org\/deliver\/etsi_gs\/NFVSEC\/001_099\/001\/01.01.01_60\/ gs_NFVSEC001v010101p.pdf"},{"key":"12_CR6","unstructured":"Wojtczuk R (2014) Poacher turned gamekeeper: lessons learned from eight years of breaking hypervisors. In: Black Hat USA, 2014"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Riddle ARCASM (2015) A survey on the security of hypervisors in cloud computing. In: IEEE 35th International conference on distributed computing systems workshops, 2015","DOI":"10.1109\/ICDCSW.2015.28"},{"key":"12_CR8","unstructured":"Wang G, Estrada ZJ, Pham C, Kalbarczyk Z, Iyer ARK (2015) Hypervisor introspection: a technique for evading passive virtual machine monitoring. In: WOOT, 2015"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Kreutz D, Ramos FMV, Verissimo AP (2013) Towards secure and dependable software-defined networks. In: HotSDN, 2013","DOI":"10.1145\/2491185.2491199"},{"key":"12_CR10","unstructured":"Floodlight OpenFlow Controller. Available: http:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"12_CR11","unstructured":"The OpenDaylight Platform. Available: https:\/\/www.opendaylight.org\/"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Shin S (2014) Rosemary: a robust, secure, and high-performance network operating system. In: CCS, 2014","DOI":"10.1145\/2660267.2660353"},{"key":"12_CR13","unstructured":"National Vulnerability Database. Available: https:\/\/nvd.nist.gov\/download.cfm"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Gasti P et al (2013) DoS and DDoS in named data networking. In: Conference on Computer Communications and Networks (ICCCN). IEEE, 2013, pp 1\u20137","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"12_CR15","unstructured":"Dai H et al (2013) Mitigate DDoD attacks in NDN by Interest traceback. In: Proceedings of IEEE INFOCOM NOMEN Workshop, 2013"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Compagno A et al (2013) Poseidon: mitigating interest flooding DDoS attacks in named data networking. In: International conference on Local Computer Networks (LCN). IEEE, 2013, pp 630\u2013638","DOI":"10.1109\/LCN.2013.6761300"},{"key":"12_CR17","unstructured":"Afanasyev A et al (2013) Interest flooding attack and countermeasures in named data networking. In: IFIP networking conference. IEEE. 2013, pp 1\u20139"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Nguyen T, Cogranne R, Doyen G (2015) An optimal statistical test for robust detection against Interest flooding attacks in CCN. In: FIP\/IEEE international symposium on Integrated Network Management (IM), I. 2015, pp 252\u2013260","DOI":"10.1109\/INM.2015.7140299"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Nguyen TN et al. (2015) Detection of Interest flooding attacks in named data networking using hypothesis testing. In: IEEE international Workshop on Information Forensics and Security (WIFS), . 2015, pp 1\u20136","DOI":"10.1109\/WIFS.2015.7368571"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Virgilio M., Marchetto G., Sisto R (2013) PIT overload analysis in content centric networks. In: Proceedings of 3rd ACM SIGCOMM workshop on Information-centric networking. ACM. 2013, pp 67\u201372","DOI":"10.1145\/2491224.2491225"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Vahlenkamp M, Schneider F, Kutscher D, Seedorf J (2013) Enabling information centric networking in IP networks using SDN. In: IEEE SDN for Future Networks and Services (SDN4FNS), 2013, Trento, pp 1\u20136","DOI":"10.1109\/SDN4FNS.2013.6702539"},{"key":"12_CR22","unstructured":"Salsano S., Blefari-Melazzi N., Detti A., Morabito G., Veltri L. (2013) In: Information centric networking over SDN and OpenFlow: Architectural aspects and experiments on the OFELIA testbed, Computer Networks, 57(16), 13 Nov 2013, pp 3207\u2013.3221, ISSN 1389-1286"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"van Adrichem NLM, Kuipers FA (2015) NDNFlow: software-defined named data networking. In: 2015 1st IEEE conference on Network Softwarization (NetSoft), London, 2015, pp 1\u20135","DOI":"10.1109\/NETSOFT.2015.7116131"},{"key":"12_CR24","unstructured":"Nguyen XN, Saucez D, Turletti T (2013) Efficient caching in content-centric networks using OpenFlow. INFOCOM, Proceedings IEEE, Turin, 2013, pp 1\u20132"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"TalebiFard P, Ravindran R, Chakraborti A, Pan J, Mercian A, Wang G, Leung VCM (2015) An information centric networking approach towards contextualized edge service. In: 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, 2015, pp 250\u2013255","DOI":"10.1109\/CCNC.2015.7157985"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Mai HL , Nguyen NT, Doyen G, Ploix A, Cogranne R (2016) On the readiness of NDN for a secure deployment: the case of pending interest table. In: proceedings of the 10th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2016. pp 98\u2013110. Lecture Notes in Computer Science 9701. Springer International Publishing, 2016","DOI":"10.1007\/978-3-319-39814-3_10"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T21:21:22Z","timestamp":1570310482000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_12","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}