{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:49:11Z","timestamp":1740098951968,"version":"3.37.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319646527"},{"type":"electronic","value":"9783319646534"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_5","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"127-148","source":"Crossref","is-referenced-by-count":1,"title":["Practical Experience in NFV Security Field: Virtual Home Gateway"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Pastor","sequence":"first","affiliation":[]},{"given":"Jes\u00fas","family":"Folgueira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"issue":"5","key":"5_CR1","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1515\/itit-2015-0028","volume":"57","author":"RC Palancar","year":"2015","unstructured":"Palancar RC, da Silva RAL, Chavarr\u00eda JLF, L\u00f3pez DR, Armengol AJE, Tinoco RG (2015) Virtualization of residential customer premise equipment. Lessons learned in Brazil vCPE trial. it-Infor Technol 57(5):285\u2013294. doi:\n10.1515\/itit-2015-0028","journal-title":"it-Infor Technol"},{"key":"5_CR2","unstructured":"ETSI, G (2013) Network Functions Virtualisation (NFV); Use Cases. V1, 1, 2013\u201310. \nhttp:\/\/www.etsi.org\/deliver\/etsi_gs\/nfv\/001_099\/001\/01.01.01_60\/gs_ nfv001v010101p.pdf"},{"key":"5_CR3","unstructured":"Bernstein, J, Spets, T, Bathrick, G, Pitsoulakis, G (2004) DSL Forum TR-069, CPE WAN Management Protocol. In: Proceedings of DSL forum"},{"key":"5_CR4","unstructured":"ETSI, G (2013) Network Functions Virtualisation (NFV); NFV Security; Problem Statement. V1, 1, 2014\u201310. \nhttp:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/001\/01.01.01_60\/gs_NFV-SEC001v010101p.pdf"},{"key":"5_CR5","unstructured":"ETSI, G (2015) Network Functions Virtualisation (NFV); NFV Security; Report on use cases and technical approaches for multi-layer host administration. V1, 1, 2015\u201312. \nhttp:\/\/www.etsi.org\/deliver\/etsi_gs\/NFV-SEC\/001_099\/009\/01.01.01_60\/gs_nfv-sec009v010101p.pdf"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Czyz, J, Kallitsis, M, Gharaibeh, M, Papadopoulos, C, Bailey, M, Karir, M (2014) Taming the 800 Pound Gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of the 2014 conference on Internet Measurement Conference (IMC\u201914). ACM, New York, pp 435\u2013448","DOI":"10.1145\/2663716.2663717"},{"key":"5_CR7","unstructured":"OpenSSL Software foundation, Inc. (1999). \nhttps:\/\/www.openssl.org\/"},{"key":"5_CR8","unstructured":"Meng, W, Duan, R, Lee, W (2013) DNS Changer remediation study. Talk at M3AAWG 27th"},{"key":"5_CR9","unstructured":"National Institute of Standards and Techonologies, National Checklist Program Repository. \nhttp:\/\/checklists.nist.gov"},{"key":"5_CR10","unstructured":"Ferguson, P, Senie, D (2000) Network ingress filtering: defeating denial of service attacks which employ IP source address spoofing, BCP 38, RFC 2827. \nhttp:\/\/www.rfc-editor.org\/info\/bcp38"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Martini, L, Ed., Rosen, E, El-Aawar, N, Smith, T, Heron, G (2006) Pseudowire setup and maintenance using the Label Distribution Protocol (LDP), RFC 4447, doi:\n10.17487\/RFC4447\n\n. \nhttp:\/\/www.rfc-editor.org\/info\/rfc4447","DOI":"10.17487\/RFC4447"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:36:13Z","timestamp":1510378573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_5","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2017]]}}}