{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T22:35:31Z","timestamp":1778798131618,"version":"3.51.4"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319646527","type":"print"},{"value":"9783319646534","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64653-4_9","type":"book-chapter","created":{"date-parts":[[2017,11,11]],"date-time":"2017-11-11T05:33:39Z","timestamp":1510378419000},"page":"229-251","source":"Crossref","is-referenced-by-count":4,"title":["Addressing Industry 4.0 Security by Software-Defined Networking"],"prefix":"10.1007","author":[{"given":"Rahamatullah","family":"Khondoker","sequence":"first","affiliation":[]},{"given":"Pedro","family":"Larbig","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Scheuermann","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Weber","sequence":"additional","affiliation":[]},{"given":"Kpatcha","family":"Bayarou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,12]]},"reference":[{"key":"9_CR1","unstructured":"Zukunftsprojekt Industrie 4.0. https:\/\/www.bmbf.de\/de\/zukunftsprojekt-industrie-4-0-848.html . Online; Accessed 18 Nov 2016"},{"key":"9_CR2","unstructured":"Hermann M et al (2016) Design principles for industrie 4.0 scenarios. In: 2016 49th Hawaii international conference on system sciences, pp 3928\u20133937"},{"key":"9_CR3","unstructured":"Heilmann D et al (2016) Industrie 4.0 im Internationalen Vergleich. Eine Studie des Handelsblatt Research Institute, pp 1\u2013144"},{"key":"9_CR4","unstructured":"Deutsche Bank Research, Taking point industry 4.0: huge potential for value creation waiting to be tapped. Created on 23 May 2014. http:\/\/www.dbresearch.com\/servlet\/reweb2.ReWEB?rwsite=DBR_INTERNET_EN-PROD&rwobj=ReDisplay.Start.class&document=PROD0000000000335628. Accessed 18 Nov 2016"},{"key":"9_CR5","unstructured":"IUNO, Nationales Referenzprojekt, IT-Sicherheit in Industrie 4.0. http:\/\/www.iuno-projekt.de\/ (German national research project, available in German only). Online; Accessed 18 Nov 2016"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"McKeown M, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. SIGCOMM Comput Commun Rev 38(2):69\u201374","DOI":"10.1145\/1355734.1355746"},{"key":"9_CR7","unstructured":"ONF (2014) SDN architecture. ONF Technical Report TR-502, Open Networking Foundation, June 2014"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Khondoker R, Zaalouk A, Marx R, Bayarou K (2014) Feature-based comparison of software defined networking (SDN) controllers. In: ICCSA, pp 1\u20137","DOI":"10.1109\/WCCAIS.2014.6916572"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Zaalouk A, Khondoker R, Marx R, Bayarou K (2014) OrchSec: an orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions. In: NOMS, pp 1\u20139","DOI":"10.1109\/NOMS.2014.6838409"},{"key":"9_CR10","unstructured":"Zaalouk A, Khondoker R, Marx R, Bayarou K (2014) OrchSec demo: demonstrating the capability of an orchestrator-based architecture for network security, academic demo. In: ONS, pp 1\u20132"},{"key":"9_CR11","unstructured":"Khondoker R, Larbig P, Senf D, Bayarou K, Gruschka N (2016) AutoSecSDNSemo: demonstration of automated end-to-end security in software-defined networks, IEEE NetSoft 2016. In: IEEE NetSoft, pp 1\u20132"},{"key":"9_CR12","unstructured":"Batke B, Wiberg J, Dube D (2015) CIP security phase 1, secure transport for EtherNet\/IP. In: 2015 ODVA industry conference"},{"key":"9_CR13","unstructured":"Davis R, The myth of network address translation as security. White paper, F5. https:\/\/f5.com\/Portals\/1\/Cache\/Pdfs\/2421\/the-myth-of-network-address-translation-as-security.pdf . Online; Accessed 02 Dec 2016"},{"key":"9_CR14","unstructured":"Higgins KJ (2014) Windows XP Alive & Well in ICS\/SCADA networks. Information week darkReading, Oct 2014"},{"key":"9_CR15","unstructured":"Poimboeuf J, Jennings S (2014) Introducing kpatch: dynamic kernel patching. Technical report, Red Hat, Feb 2014"},{"key":"9_CR16","unstructured":"Pavl\u00edk V (2014) kGraft \u2013 live patching of the Linux kernel. Technical report, SUSE, Maxfeldstrasse 5 90409 Nuremberg Germany, Mar 2014"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Sommer R, Vallentin M, De Carli L, Paxson V (2014) HILTI: an abstract execution environment for deep, stateful network traffic analysis. In: Proceedings of the 2014 conference on internet measurement conference. ACM, pp 461\u2013474","DOI":"10.1145\/2663716.2663735"},{"key":"9_CR18","unstructured":"Sommer R, Amann J, Hall S, Spicy: a unified deep packet inspection framework dissecting all your data. Technical Report TR-15-004, International Computer Science Institute Berkeley, 1947 Center Street, Suite 600, Berkeley, California, 94704, Nov 2015"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Bosshart P, Daly D, Gibb G, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G et al (2014) P4: programming protocol-independent packet processors. ACM SIGCOMM Comput Commun Rev 44(3):87\u201395","DOI":"10.1145\/2656877.2656890"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Udd R, Asplund M, Nadjm-Tehrani S, Kazemtabrizi M, Ekstedt M (2016) Exploiting bro for intrusion detection in a SCADA system. In: Proceedings of the 2nd ACM international workshop on cyber-physical system security. ACM, pp 44\u201351","DOI":"10.1145\/2899015.2899028"},{"key":"9_CR21","unstructured":"PROFIBUS User Organization, Haid-und-Neu-Str. 7 76131 Karlsruhe Germany. PROFINET design guideline, version 1.04 edition, Nov 2010"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Debar H, Curry D, Feinstein B (2007) The intrusion detection message exchange format (IDMEF). RFC 4765 (Experimental), Mar 2007","DOI":"10.17487\/rfc4765"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Danyliw R, Meijer J, Demchenko Y (2007) The incident object description exchange format. RFC 5070 (Proposed Standard), Dec 2007. Updated by RFC 6685","DOI":"10.17487\/rfc5070"},{"key":"9_CR24","unstructured":"GT\/Coursera SDN Course Travelogue \u2013 Week 5, https:\/\/www.sdnskills.com\/learn\/gtcoursera-sdn-course-travelogue-week-5\/ . Online; Accessed 04 Apr 2017"},{"key":"9_CR25","doi-asserted-by":"crossref","unstructured":"Thompson HA (2004) Wireless and internet communications technologies for monitoring and control. Control Eng Pract 12:781\u2013791","DOI":"10.1016\/j.conengprac.2003.09.002"},{"key":"9_CR26","unstructured":"Distributed Aircraft Maintenance Environment from 2002, http:\/\/www.cs.york.ac.uk\/dame . Online; Accessed 03 Mar 2016"},{"key":"9_CR27","unstructured":"SCADA.web, https:\/\/www.scada-web.net\/default.aspx . Online; Accessed 03 Mar 2016"},{"key":"9_CR28","unstructured":"Wohlwend H, e-Diagnostics guidebook: revision 2.1. http:\/\/www.sematech.org\/docubase\/document\/4153deng.pdf . Online; Accessed 03 Mar 2016"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Richardson T, Levine JR (2011) The remote framebuffer protocol. RFC 6143, Mar 2011. https:\/\/rfc-editor.org\/rfc\/rfc6143.txt","DOI":"10.17487\/rfc6143"},{"key":"9_CR30","unstructured":"Comparison of remote desktop software, https:\/\/en.wikipedia.org\/wiki\/Comparison_of_remote_desktop_software . Online; Accessed 03 Mar 2016"},{"key":"9_CR31","unstructured":"Teradici PCoIP (PC over IP) solution, http:\/\/www.teradici.com\/products-and-solutions\/pcoip-products\/remote-workstation-card . Online; Accessed 03 Mar 2016"},{"key":"9_CR32","unstructured":"Netbiter remote management, http:\/\/www.netbiter.com\/ . Online; Accessed 03 Mar 2016"},{"key":"9_CR33","unstructured":"Genua genubox, https:\/\/www.genua.de\/loesungen\/fernwartungs-appliance-genubox.html . Online; Accessed 03 Mar 2016"},{"key":"9_CR34","unstructured":"Remote Services Security \/ Secure Remote Maintenance, http:\/\/www.phoenixcontact-cybersecurity.com\/en\/solutions\/remote-services-security . Online; Accessed 03 Mar 2016"},{"key":"9_CR35","unstructured":"Siemens Industrial Network Security, http:\/\/www.industry.siemens.com\/topics\/global\/en\/industrial-security\/network-security\/Pages\/Default.aspx . Online; Accessed 03 Mar 2016"},{"key":"9_CR36","unstructured":"Recommendation: IT in the Company. BSI publications on cyber security. Basic rules for protecting remote maintenance accesses. BSI Recommendation, June 2013. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_054E.pdf?__blob=publicationFile&v=4"},{"key":"9_CR37","unstructured":"Recommendation: IT in Production. Industrial Control System Security. Inside threat. BSI Recommendation, May 2013. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_061E.pdf?__blob=publicationFile&v=2 . Online; Accessed 04 June 2016"},{"key":"9_CR38","unstructured":"BSI Empfehlung: in der Produktion, Fernwartung im industriellen Umfeld. BSI Recommendation, Jan 2015. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_108.pdf?__blob=publicationFile&v=3 [available in German only]. Online; Accessed 04 June 2016"},{"key":"9_CR39","unstructured":"BSI recommendation: IT in production, industrial control system security, top 10 threats and countermeasures 2014. BSI recommendation, May 2016. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_005E.pdf?__blob=publicationFile&v=2 . Online; Accessed 04 June 2016"},{"key":"9_CR40","unstructured":"BSI Empfehlung: IT in der Produktion, Fallbeispiel Schwimmbad. BSI Recommendation, Feb 2014. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_095a.pdf?__blob=publicationFile&v=3 (available in German only). Online; Accessed 04 June 2016"},{"key":"9_CR41","unstructured":"BSI Empfehlung: IT in der Produktion, Fallbeispiel Servicetechniker. BSI Recommendation, Mar 2014. https:\/\/www.allianz-fuer-cybersicherheit.de\/ACS\/DE\/_\/downloads\/BSI-CS_095c.pdf?__blob=publicationFile&v=2 (available in German only). Online; Accessed 04 June 2016"},{"key":"9_CR42","volume-title":"Industrial internet the machines are talking","author":"J Bruner","year":"2013","unstructured":"Bruner J (2013) Industrial internet the machines are talking, 1st edn. O\u2019Reilly Media, Sebastopol","edition":"1"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Marx R, Kuntze N, Rudolph C, Bente I, Vieweg J (2012) Trusted service access with dynamic security infrastructure configuration. In: 18th Asia-Pacific conference on communications (APCC). IEEE, 2012","DOI":"10.1109\/APCC.2012.6388291"}],"container-title":["Computer Communications and Networks","Guide to Security in SDN and NFV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64653-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,5]],"date-time":"2019-10-05T21:21:39Z","timestamp":1570310499000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64653-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319646527","9783319646534"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64653-4_9","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"value":"1617-7975","type":"print"},{"value":"2197-8433","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}