{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:53:27Z","timestamp":1761630807506,"version":"3.37.3"},"publisher-location":"Cham","reference-count":70,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_3","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T10:33:39Z","timestamp":1510396419000},"page":"75-101","source":"Crossref","is-referenced-by-count":7,"title":["SDN and NFV Security: Challenges for Integrated Solutions"],"prefix":"10.1007","author":[{"given":"Andr\u00e9s F.","family":"Murillo","sequence":"first","affiliation":[]},{"given":"Sandra Julieta","family":"Rueda","sequence":"additional","affiliation":[]},{"given":"Laura Victoria","family":"Morales","sequence":"additional","affiliation":[]},{"given":"\u00c1lvaro A.","family":"C\u00e1rdenas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/1866898.1866905","volume-title":"Proceedings of the 3rd ACM workshop on assurable and usable security configuration, SafeConfig\u201910","author":"E Al-Shaer","year":"2010","unstructured":"Al-Shaer E, Al-Haj S (2010) FlowChecker: configuration analysis and verification of federated openflow infrastructures. In: Proceedings of the 3rd ACM workshop on assurable and usable security configuration, SafeConfig\u201910. ACM, New York, pp 37\u201344"},{"key":"3_CR2","unstructured":"AT&T: ECOMP (Enhanced control, orchestration, management & policy) architecture white paper. http:\/\/about.att.com\/content\/dam\/snrdocs\/ecomp.pdf"},{"key":"3_CR3","doi-asserted-by":"crossref","first-page":"282","DOI":"10.1145\/2594291.2594317","volume-title":"Proceedings of the 35th ACM SIGPLAN conference on programming language design and implementation, PLDI\u201914","author":"T Ball","year":"2014","unstructured":"Ball T, Bj\u00f8rner N, Gember A, Itzhaky S, Karbyshev A, Sagiv M, Schapira M, Valadarsky A (2014) VeriCon: towards verifying controller programs in software-defined networks. In: Proceedings of the 35th ACM SIGPLAN conference on programming language design and implementation, PLDI\u201914. ACM, New York, pp 282\u2013293"},{"key":"3_CR4","volume-title":"Congress a system for declaring, auditing, and enforcing policy in heterogeneous cloud environments","author":"P Balland","year":"2014","unstructured":"Balland P, Hinrichs T (2014) Congress a system for declaring, auditing, and enforcing policy in heterogeneous cloud environments. In: OpenStack Summit"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bari MF, Chowdhury SR, Ahmed R, Boutaba R (2013) PolicyCop: an autonomic QoS policy enforcement framework for software defined networks. In: 2013 IEEE SDN for future networks and services (SDN4FNS), pp 1\u20137","DOI":"10.1109\/SDN4FNS.2013.6702548"},{"key":"3_CR6","first-page":"1","volume":"99","author":"MF Bari","year":"2016","unstructured":"Bari MF, Chowdhury SR, Ahmed R, Boutaba R, Duarte OCMB (2016) Orchestrating Virtualized Network Functions. IEEE Trans Netw Serv Manag 99:1\u20131","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"3_CR7","doi-asserted-by":"crossref","unstructured":"Ben-Itzhak Y, Barabash K, Cohen R, Levin A, Raichstein E (2015) EnforSDN: network policies enforcement with SDN. In: 2015 IFIP\/IEEE international symposium on integrated network management (IM), pp 80\u201388","DOI":"10.1109\/INM.2015.7140279"},{"key":"3_CR8","first-page":"1","volume-title":"Proceedings of the third workshop on hot topics in software defined networking, HotSDN\u201914","author":"P Berde","year":"2014","unstructured":"Berde P, Gerola M, Hart J, Higuchi Y, Kobayashi M, Koide T, Lantz B, O\u2019Connor B, Radoslavov P, Snow W, Parulkar G (2014) ONOS: towards an open, distributed SDN OS. In: Proceedings of the third workshop on hot topics in software defined networking, HotSDN\u201914. ACM, New York, pp 1\u20136"},{"key":"3_CR9","unstructured":"Bernardo DV, Chua BB (2015) Introduction and analysis of SDN and NFV security architecture (SN-SECA). In: 2015 IEEE 29th international conference on advanced information networking and applications, pp 796\u2013801"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Betg\u00e9-Brezetz S, Kamga GB, Tazi M (2015) Trust support for SDN controllers and virtualized network applications. In: 2015 1st IEEE Conference on Network Softwarization (NetSoft), pp 1\u20135","DOI":"10.1109\/NETSOFT.2015.7116153"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Braga R, Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: IEEE 35th conference on local computer networks (LCN), Denver, pp 408\u2013415","DOI":"10.1109\/LCN.2010.5735752"},{"key":"3_CR12","first-page":"10","volume-title":"Proceedings of the 9th USENIX conference on networked systems design and implementation, NSDI\u201912","author":"M Canini","year":"2012","unstructured":"Canini M, Venzano D, Pere\u0161\u00edni P, Kosti\u0107 D, Rexford J (2012) A NICE way to test openflow applications. In: Proceedings of the 9th USENIX conference on networked systems design and implementation, NSDI\u201912. USENIX Association, Berkeley, pp 10\u201310"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Casado M, Freedman MJ, Pettit J, Luo J, McKeown N, Shenker S (2007) Ethane: taking control of the enterprise. In: Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications, SIGCOMM\u201907, New York, pp 1\u201312","DOI":"10.1145\/1282380.1282382"},{"key":"3_CR14","unstructured":"Chiosi M, Clarke D, Wilis P, Reid A, Feger J, Bugenhagen M, Khan W, Fargano M, Chunfeng C, Hui D, Benitez J, Michel U, Damker H, Ogaki KTM, Fukui M, Shimano K, Delisle D, Loudier Q, Kolias C, Guardini I, Demaria E, Minerva R, Manzalini A, L\u00f3pez D, Salguero F, Ruhl F, Sen P (2012) Network functions virtualisation. In: Proceedings of the 2012 SDN and openflow world congress"},{"key":"3_CR15","unstructured":"European Telecommunications Standard Institute (ETSI). Network functions virtualisation (NFV); Architectural framework. http:\/\/www.etsi.org\/deliver\/etsi_gs\/nfv\/001_099\/002\/01.01.01_60\/gs_nfv002v010101p.pdf . Accessed Aug 2017"},{"key":"3_CR16","doi-asserted-by":"publisher","unstructured":"Mattos DMF, Duarte OCMB (2016) AuthFlow: authentication and access control mechanism for software defined networking. Ann Telecommun 71(11):607\u2013615. ISSN:0003\u20134347. doi: 10.1007\/s12243-016-0505-z . Springer","DOI":"10.1007\/s12243-016-0505-z"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Guerzoni R, Vaishnavi I, Perez Caparros D, Galis A, Tusa F, Monti P, Sganbelluri A, Bicz\u00f3k G, Sonkoly B, Toka L, Ramos A, Meli\u00e1n J, Dugeon O, Cugini F, Martini B, Iovanna P, Giuliani G, Figueiredo R, Contreras-Murillo LM, Bernardos CJ, Santana C, Szabo R (2016) Analysis of end-to-end multi-domain management and orchestration frameworks for software defined infrastructures: an architectural survey. Trans Emerg Telecommun Technol 28(4). Published online","DOI":"10.1002\/ett.3103"},{"issue":"2","key":"3_CR18","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1007\/s10922-014-9319-3","volume":"23","author":"E Haleplidis","year":"2015","unstructured":"Haleplidis E, Hadi Salim J, Denazis S, Koufopavlou O (2015) Towards a network abstraction model for SDN. J Netw Syst Manag 23(2):309\u2013327","journal-title":"J Netw Syst Manag"},{"key":"3_CR19","first-page":"1","volume-title":"Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916","author":"W Han","year":"2016","unstructured":"Han W, Zhao Z, Doup\u00e9 A, Ahn GJ (2016) HoneyMix: toward SDN-based Intelligent Honeynet. In: Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916. ACM, New York, pp 1\u20136"},{"key":"3_CR20","unstructured":"He R, Chawki J, Duval T, Ba A, Compastie M, Lagadec L, Dutta A, Winandy M, Yegani P (2016) Moon project. Technical report. https:\/\/wiki.opnfv.org\/display\/moon\/Moon . Accessed in Apr 2017"},{"key":"3_CR21","first-page":"99","volume-title":"Presented as part of the 10th USENIX symposium on networked systems design and implementation (NSDI 13)","author":"P Kazemian","year":"2013","unstructured":"Kazemian P, Chang M, Zeng H, Varghese G, McKeown N, Whyte S (2013) Real time network policy checking using header space analysis. In: Presented as part of the 10th USENIX symposium on networked systems design and implementation (NSDI 13). USENIX, Lombard, pp 99\u2013111"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Khattak ZK, Awais M, Iqbal A (2014) Performance evaluation of opendaylight SDN controller. In: 2014 20th IEEE international conference on parallel and distributed systems (ICPADS), pp 671\u2013676","DOI":"10.1109\/PADSW.2014.7097868"},{"key":"3_CR23","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/2342441.2342452","volume-title":"Proceedings of the first workshop on hot topics in software defined networks, HotSDN\u201912","author":"A Khurshid","year":"2012","unstructured":"Khurshid A, Zhou W, Caesar M, Godfrey PB (2012) VeriFlow: verifying network-wide invariants in real time. In: Proceedings of the first workshop on hot topics in software defined networks, HotSDN\u201912. ACM, New York, pp 49\u201354"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Kim H, Yoon S, Jeon H, Lee W, Kang S (2016) Service platform and monitoring architecture for network function virtualization (NFV). Clust Comput 19(4):1835\u20131841. Springer","DOI":"10.1007\/s10586-016-0640-3"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Kurmus A, Gupta M, Pletka R, Cachin C, Haas R (2011) A comparison of secure multi-tenancy architectures for filesystem storage clouds. In: Proceedings of the 12th ACM\/IFIP\/USENIX international conference on middleware, Middleware\u201911, pp 471\u2013490","DOI":"10.1007\/978-3-642-25821-3_24"},{"key":"3_CR26","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/2876019.2876026","volume-title":"Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916","author":"C Lee","year":"2016","unstructured":"Lee C, Shin S (2016) SHIELD: an automated framework for static analysis of SDN applications. In: Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916. ACM, New York, pp 29\u201334"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Li X, Qian C (2016) An NFV orchestration framework for interference-free policy enforcement. In: 2016 IEEE 36th international conference on distributed computing systems (ICDCS), pp 649\u2013658","DOI":"10.1109\/ICDCS.2016.24"},{"key":"3_CR28","unstructured":"Lucent A (2014) White paper: the right SDN is right for NFV. Technical report, Alcatel Lucent. https:\/\/resources.alcatel-lucent.com\/asset\/180618 . Accessed Apr 2017"},{"key":"3_CR29","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1145\/2018436.2018470","volume-title":"Proceedings of the ACM SIGCOMM 2011 conference, SIGCOMM\u201911","author":"H Mai","year":"2011","unstructured":"Mai H, Khurshid A, Agarwal R, Caesar M, Godfrey PB, King ST (2011) Debugging the data plane with anteater. In: Proceedings of the ACM SIGCOMM 2011 conference, SIGCOMM\u201911. ACM, New York, pp 290\u2013301"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Majumdar R, Tetali SD, Wang Z (2014) Kuai: a model checker for software-defined networks. In: Proceedings of the 14th conference on formal methods in computer-aided design, FMCAD\u201914. FMCAD Inc, Austin, pp 27:163\u201327:170","DOI":"10.1109\/FMCAD.2014.6987609"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Makaya C, Freimuth D, Wood D, Calo S (2015) Policy-based NFV management and orchestration. In: 2015 IEEE conference on network function virtualization and software defined network (NFV-SDN), pp 128\u2013134","DOI":"10.1109\/NFV-SDN.2015.7387417"},{"issue":"5","key":"3_CR32","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1002\/nem.1943","volume":"26","author":"L Mamatas","year":"2016","unstructured":"Mamatas L, Clayman S, Galis A (2016) A flexible information service for management of virtualized software-defined infrastructures. Int J Netw Manag 26(5):396\u2013418","journal-title":"Int J Netw Manag"},{"issue":"2","key":"3_CR33","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38(2):69\u201374","journal-title":"Commun. Rev."},{"key":"3_CR34","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/2876019.2876021","volume-title":"Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916","author":"L Melis","year":"2016","unstructured":"Melis L, Asghar HJ, De Cristofaro E, Kaafar MA (2016) Private processing of outsourced network functions: feasibility and constructions. In: Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916. ACM, New York, pp 39\u201344"},{"issue":"1","key":"3_CR35","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/COMST.2015.2477041","volume":"18","author":"R Mijumbi","year":"2016","unstructured":"Mijumbi R, Serrat J, Gorricho J, Bouten N, De Turck F, Boutaba R (2016) Network function virtualization: state-of-the-art and research challenges. IEEE Commun Surv Tutorials 18(1):236\u2013262","journal-title":"IEEE Commun Surv Tutorials"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"Morales LV, Murillo AF, Rueda SJ (2015) Extending the floodlight controller. In: 2015 IEEE 14th international symposium on network computing and applications (NCA), pp 126\u2013133","DOI":"10.1109\/NCA.2015.11"},{"key":"3_CR37","volume-title":"(2015) FlowFence: a denial of service defense system for software defined networking","author":"AF Murillo Piedrahita","year":"2015","unstructured":"Murillo Piedrahita AF, Mattos DMF, Duarte OCMB, Rueda Rodriguez S (2015) FlowFence: a denial of service defense system for software defined networking. In: Proceedings IEEE global information infrastructure and networking symposium 2015"},{"key":"3_CR38","volume-title":"Relationship of SDN and NFV","author":"ONF","year":"2015","unstructured":"ONF (2015) Relationship of SDN and NFV, Technical report, Open Networking Foundation"},{"key":"3_CR39","unstructured":"ON.LAB (2017) Security-Mode ONOS, Technical report, https:\/\/wiki.onosproject.org\/display\/ONOS\/Security-Mode+ONOS . Accessed in Apr 2017"},{"key":"3_CR40","unstructured":"Open Network Function Virtualization, ARNO \u2013 technical overview. { https:\/\/www.opnfv.org\/software\/technical-overview }. Accessed Apr 2017"},{"key":"3_CR41","unstructured":"Open Networking Foundation, OpenFlow-enabled SDN and network functions virtualisation. https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/solution-briefs\/sb-sdn-nvf-solution.pdf . Accessed in Apr 2017"},{"key":"3_CR42","unstructured":"OpenDayLight, Group based policy (GBP), https:\/\/wiki.opendaylight.org\/view\/Group_Based_Policy_(GBP) . Accessed in Apr 2017"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Paladi N (2015) Towards secure SDN policy management, In: 2015 IEEE\/ACM 8th international conference on utility and cloud computing (UCC), pp 607\u2013611","DOI":"10.1109\/UCC.2015.106"},{"key":"3_CR44","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/2815400.2815423","volume-title":"Proceedings of the 25th symposium on operating systems principles, SOSP\u201915","author":"S Palkar","year":"2015","unstructured":"Palkar S, Lan C, Han S, Jang K, Panda A, Ratnasamy S, Rizzo L, Shenker S (2015) E2: a framework for NFV applications. In: Proceedings of the 25th symposium on operating systems principles, SOSP\u201915. ACM, New York, pp 121\u2013136"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Pan X, Yegneswaran V, Chen Y, Porras P, Shin S (2016) HogMap: using SDNs to incentivize collaborative security monitoring. In: Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916, New York, pp 7\u201312","DOI":"10.1145\/2876019.2876023"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Paul S, Jain R, Samaka M, Erbad A (2015) Service chaining for NFV and delivery of other applications in a global multi-cloud environment. In: 2015 international conference on advanced computing and communications (ADCOM), pp 61\u201366","DOI":"10.1109\/ADCOM.2015.18"},{"key":"3_CR47","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1145\/2342441.2342466","volume-title":"Proceedings of the first workshop on hot topics in software defined networks","author":"P Porras","year":"2012","unstructured":"Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G (2012) A security enforcement kernel for openflow networks. In: Proceedings of the first workshop on hot topics in software defined networks. ACM, New York, pp 121\u2013126"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"Porras PA, Cheung S, Fong MW, Skinner K, Yegneswaran V (2015) Securing the software defined network control layer. In: Proceedings of the network and distributed system security (NDSS) symposium","DOI":"10.14722\/ndss.2015.23222"},{"key":"3_CR49","unstructured":"Price C, Rivera S, Peled A, Wolping M, Brockners F, Chinnakannan P, Sardella A, Hou P, Young M, Mehta P, Nguyenphu T, Neary D. An open platform to accelerate NFV. Linux Foundation. Published online: https:\/\/networkbuilders.intel.com\/docs\/OPNFV_WhitePaper_Final.pdf . Accessed Aug 2017"},{"key":"3_CR50","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/978-3-319-26362-5_16","volume-title":"Research in attacks, intrusions, and defenses","author":"C R\u00f6pke","year":"2015","unstructured":"R\u00f6pke C, Holz T (2015) SDN rootkits: subverting network operating systems of software-defined networks. In: Research in attacks, intrusions, and defenses. Springer, Cham, pp 339\u2013356"},{"issue":"1","key":"3_CR51","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1002\/nem.1918","volume":"26","author":"C R\u00f6pke","year":"2016","unstructured":"R\u00f6pke C, Holz T (2016) On network operating system security. Int J Netw Manag 26(1):6\u201324","journal-title":"Int J Netw Manag"},{"key":"3_CR52","unstructured":"Santos N, Rodrigues R, Gummadi KP, Saroiu S (2012) Policy-sealed data: a new abstraction for building trusted cloud services. In: Presented as part of the 21st USENIX security symposium (USENIX Security 12), Bellevue, pp 175\u2013188"},{"issue":"4","key":"3_CR53","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/2740070.2626304","volume":"44","author":"C Scott","year":"2014","unstructured":"Scott C, Wundsam A, Raghavan B, Panda A, Or A, Lai J, Huang E, Liu Z, El-Hassany A, Whitlock S, Acharya H, Zarifis K, Shenker S (2014) Troubleshooting blackbox SDN control software with minimal causal sequences. SIGCOMM Comput Commun Rev 44(4):395\u2013406","journal-title":"SIGCOMM Comput Commun Rev"},{"key":"3_CR54","unstructured":"Sherwood R, Gibb G, Yap KK, Appenzeller G, Casado M, McKeown N, Parulkar G (2010) Can the production network be the testbed? In: Proceedings of the 9th USENIX conference on operating systems design and implementation. USENIX Association, pp 1\u20136"},{"key":"3_CR55","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/2876019.2876032","volume-title":"Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916","author":"MW Shih","year":"2016","unstructured":"Shih MW, Kumar M, Kim T, Gavrilovska A (2016) S-NFV: securing NFV states by using SGX. In: Proceedings of the 2016 ACM international workshop on security in software defined networks & network function virtualization, SDN-NFV security\u201916. ACM, New York, pp 45\u201348"},{"key":"3_CR56","first-page":"78","volume-title":"ACM SIGSAC conference on computer and communications security, CCS\u201914","author":"Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: a robust, secure, and high-performance network operating system. In: Proceedings of the","year":"2014","unstructured":"Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, Yegneswaran V, Noh J, Kang BB (2014) Rosemary: a robust, secure, and high-performance network operating system. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, CCS\u201914. ACM, New York, pp 78\u201389"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Skowyra R, Lapets A, Bestavros A, Kfoury A (2014) A verification platform for SDN-enabled applications. In: 2014 IEEE international conference on cloud engineering (IC2E), pp 337\u2013342","DOI":"10.1109\/IC2E.2014.72"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Skowyra RW, Lapets A, Bestavros A, Kfoury A (2013) Verifiably-safe software-defined networks for CPS. In: Proceedings of the 2nd ACM international conference on high confidence networked systems, HiCoNS\u201913, New York, pp 101\u2013110","DOI":"10.1145\/2461446.2461461"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Son S, Shin S, Yegneswaran V, Porras P, Gu G (2013) Model checking invariant security properties in openflow. In: 2013 IEEE international conference on communications (ICC), pp 1974\u20131979","DOI":"10.1109\/ICC.2013.6654813"},{"key":"3_CR60","unstructured":"The Linux Foundation (2017) Open network automation platform (ONAP) project releases code, expands membership and announces board positions. Technical report. https:\/\/www.onap.org\/ . Accessed in Apr 2017"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"Tkachova O, Salim MJ, Yahya AR (2015) An analysis of SDN-OpenStack integration. In: Problems of Infocommunications Science and Technology (PIC S T), 2015 Second International Scientific-Practical Conference, pp 60\u201362","DOI":"10.1109\/INFOCOMMST.2015.7357269"},{"key":"3_CR62","doi-asserted-by":"crossref","unstructured":"Wang R, Jia Z, Ju L (2015) An entropy-based distributed DDoS detection mechanism in software-defined networking. In: Trustcom\/BigDataSE\/ISPA, 2015, vol 1. IEEE, pp 310\u2013317","DOI":"10.1109\/Trustcom.2015.389"},{"issue":"2","key":"3_CR63","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1145\/2408776.2408792","volume":"56","author":"RNM Watson","year":"2013","unstructured":"Watson RNM (2013) A decade of OS access-control extensibility. Commun ACM 56(2):52\u201363","journal-title":"Commun ACM"},{"key":"3_CR64","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1145\/2491185.2491212","volume-title":"Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking, HotSDN\u201913","author":"X Wen","year":"2013","unstructured":"Wen X, Chen Y, Hu C, Shi C, Wang Y (2013) Towards a secure controller platform for openflow applications. In: Proceedings of the second ACM SIGCOMM workshop on hot topics in software defined networking, HotSDN\u201913. ACM, New York, pp 171\u2013172"},{"key":"3_CR65","doi-asserted-by":"crossref","unstructured":"Wen X, Yang B, Chen Y, Hu C, Wang Y, Liu B, Chen X (2016) Sdnshield: reconciliating configurable application permissions for sdn app markets. In: 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN), pp 121\u2013132","DOI":"10.1109\/DSN.2016.20"},{"key":"3_CR66","first-page":"29","volume-title":"USENIX conference on USENIX annual technical conference, USENIXATC\u201911","author":"Wundsam A, Levin D, Seetharaman S, Feldmann A (2011) OFRewind: enabling record and replay troubleshooting for networks. In: Proceedings of the","year":"2011","unstructured":"Wundsam A, Levin D, Seetharaman S, Feldmann A (2011) OFRewind: enabling record and replay troubleshooting for networks. In: Proceedings of the 2011 USENIX conference on USENIX annual technical conference, USENIXATC\u201911. USENIX Association, Berkeley, pp 29\u201329"},{"issue":"4","key":"3_CR67","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MCOM.2015.7081075","volume":"53","author":"Q Yan","year":"2015","unstructured":"Yan Q, Yu F (2015) Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4):52\u201359","journal-title":"IEEE Commun. Mag."},{"issue":"16","key":"3_CR68","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","volume":"9","author":"Z Yan","year":"2016","unstructured":"Yan Z, Zhang P, Vasilakos AV (2016) A security and trust framework for virtualized networks and software-defined networking. Security Commun. Netw. 9(16):3059\u20133069","journal-title":"Security Commun. Netw."},{"key":"3_CR69","doi-asserted-by":"crossref","unstructured":"Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: 2010 proceedings IEEE INFOCOM, pp 1\u20139","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Zhang Q, Wang X, Kim I, Palacharla P, Ikeuchi T (2016) Vertex-centric computation of service function chains in multi-domain networks. In: 2016 IEEE netsoft conference and workshops (NetSoft), pp 211\u2013218","DOI":"10.1109\/NETSOFT.2016.7502415"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,7]],"date-time":"2022-08-07T02:33:35Z","timestamp":1659839615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":70,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_3","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}