{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T14:30:50Z","timestamp":1770561050281,"version":"3.49.0"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319666242","type":"print"},{"value":"9783319666259","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,10,1]],"date-time":"2017-10-01T00:00:00Z","timestamp":1506816000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-66625-9_17","type":"book-chapter","created":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T07:34:10Z","timestamp":1506756850000},"page":"169-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["An Entropy-Based DDoS Defense Mechanism in Software Defined Networks"],"prefix":"10.1007","author":[{"given":"Yajie","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Xiaoning","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zijing","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,1]]},"reference":[{"key":"17_CR1","unstructured":"Vizv\u00e1ry, M.: Mitigation of DDoS attacks in software defined networks"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: 2010 IEEE 35th Conference on. IEEE Local Computer Networks (LCN) (2010)","DOI":"10.1109\/LCN.2010.5735752"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Van Trung, P., Huong, T.T, Van Tuyen, D., et al.: A multi-criteria-based DDoS-attack prevention solution using software defined networking. In: International Conference on Advanced Technologies for Communications (ATC), pp. 308\u2013313. IEEE (2015)","DOI":"10.1109\/ATC.2015.7388340"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Lim, S., et al.: A SDN-oriented DDoS blocking scheme for botnet-based attacks. In: 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE (2014)","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"17_CR5","unstructured":"Garc\u00eda de la Villa, A.: Distributed denial of service attacks defenses and OpenFlow: implementing denial-of-service defense mechanisms with software defined networking (2014)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dong, P., Du, X., Zhang, H., et al.: A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows. In: IEEE International Conference on Communications (ICC), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ICC.2016.7510992"},{"issue":"9","key":"17_CR7","first-page":"2015217","volume":"31","author":"W Mingxin","year":"2015","unstructured":"Mingxin, W., Huachun, Z., Jia, C., et al.: An entropy based anomaly traffic detection approach in SDN. Telecommun. Sci. 31(9), 2015217 (2015)","journal-title":"Telecommun. Sci."},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE (2015)","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"17_CR9","first-page":"75","volume":"5","author":"Y Shu","year":"2016","unstructured":"Shu, Y., Mei, M., Huang, H.: Research on DDoS attack detection based on conditional entropy in SDN environment. Wirel. Internet Technol. 5, 75\u201376 (2016)","journal-title":"Wirel. Internet Technol."},{"key":"17_CR10","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.procs.2016.05.072","volume":"86","author":"S Jantila","year":"2016","unstructured":"Jantila, S., Chaipah, K.: A security analysis of a hybrid mechanism to defend DDoS attacks in SDN. Proc. Comput. Sci. 86, 437\u2013440 (2016)","journal-title":"Proc. Comput. Sci."},{"key":"17_CR11","volume-title":"SDN Core Principles and Application Practice, 36\u201337","author":"T Hwang","year":"2014","unstructured":"Hwang, T., Liu, J., Wei, L.: SDN Core Principles and Application Practice, 36\u201337. Post & Telecom Press, Beijing (2014)"},{"key":"17_CR12","unstructured":"Information Entropy. https:\/\/en.wikipedia.org\/wiki\/Entropy_(information_theory)"},{"key":"17_CR13","first-page":"313","volume":"11A","author":"K Luo","year":"2015","unstructured":"Luo, K., Luo, J., Yi, M.: Survey on distinction between flash crowd and DDoS attacks. Comput. Sci. 11A, 313\u2013316 (2015)","journal-title":"Comput. Sci."},{"key":"17_CR14","unstructured":"Floodlight. http:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"17_CR15","unstructured":"Mininet Study Guide. http:\/\/www.sdnlab.com\/11495.html"},{"key":"17_CR16","unstructured":"sFlow Overview Documents. http:\/\/www.sflow.org\/about\/index.php"},{"key":"17_CR17","unstructured":"About Wireshark. https:\/\/www.wireshark.org\/#learnWS"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Communications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66625-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,20]],"date-time":"2021-02-20T17:45:32Z","timestamp":1613843132000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66625-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,1]]},"ISBN":["9783319666242","9783319666259"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66625-9_17","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,1]]},"assertion":[{"value":"1 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ChinaCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Communications and Networking in China","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chongqing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"chinacom2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/chinacom.org\/2016\/show\/home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}