{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:31Z","timestamp":1742912491871,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319672076"},{"type":"electronic","value":"9783319672083"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67208-3_6","type":"book-chapter","created":{"date-parts":[[2017,8,30]],"date-time":"2017-08-30T12:21:00Z","timestamp":1504095660000},"page":"97-110","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Forensic Methodology for Software-Defined Network Switches"],"prefix":"10.1007","author":[{"given":"Tommy","family":"Chin","sequence":"first","affiliation":[]},{"given":"Kaiqi","family":"Xiong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,31]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Akella, A., Xiong, K.: Quality of service (QoS) guaranteed network resource allocation via software-defined networking (SDN). In: Proceedings of the Twelfth International Conference on Dependable, Autonomic and Secure Computing, pp. 7\u201313 (2014)","DOI":"10.1109\/DASC.2014.11"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Bates, A., Butler, K., Haeberlen, A., Sherr, M., Zhou, W.: Let SDN be your eyes: secure forensics in data center networks. In: Proceedings of the Network and Distributed System Security Workshop on Security of Emerging Network Technologies (2014)","DOI":"10.14722\/sent.2014.23002"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.bjp.2013.12.037","volume":"61","author":"M Berman","year":"2014","unstructured":"Berman, M., Chase, J., Landweber, L., Nakao, A., Ott, M., Raychaudhuri, D., Ricci, R., Seskar, I.: GENI: A federated testbed for innovative network experiments. Journal of Computer Networks 61, 5\u201324 (2014)","journal-title":"Journal of Computer Networks"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Chin, T., Mountrouidou, X., Li, X., Xiong, K.: An SDN-supported collaborative approach for DDoS flooding detection and containment. In: Proceedings of the IEEE Military Communications Conference, pp. 659\u2013664 (2015)","DOI":"10.1109\/MILCOM.2015.7357519"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Chin, T., Mountrouidou, X., Li, X., Xiong, K.: Selective packet inspection to detect DoS flooding using software-defined networking. In: Proceedings of the Thirty-Fifth IEEE International Conference on Distributed Computing Systems Workshops, pp. 95\u201399 (2015)","DOI":"10.1109\/ICDCSW.2015.27"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Francois, J., Festor, O: Anomaly traceback using software-defined networking. In: Proceedings of the IEEE International Workshop on Information Forensics and Security, pp. 203\u2013208 (2014)","DOI":"10.1109\/WIFS.2014.7084328"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: Proceedings of the Twenty-Second Annual Network and Distributed System Security Symposium (2015)","DOI":"10.14722\/ndss.2015.23283"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Hu, H., Han, W., Ahn, G., Zhao, Z.: FlowGuard: building robust firewalls for software-defined networks. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 97\u2013102 (2014)","DOI":"10.1145\/2620728.2620749"},{"key":"6_CR9","unstructured":"Kang, M., Lee, S., Gligor, V.: The crossfire attack. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 127\u2013141 (2013)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Khan, S., Gani, A., Wahab, A., Abdelaziz, A., Bagiwa, M.: FML: a novel forensic management layer for software-defined networks. In: Proceedings of the Sixth IEEE International Conference on Cloud System and Big Data Engineering (Confluence), pp. 619\u2013623 (2016)","DOI":"10.1109\/CONFLUENCE.2016.7508193"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software-Defined Networking, pp. 55\u201360 (2013)","DOI":"10.1145\/2491185.2491199"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Liaskos, C., Kotronis, V., Dimitropoulos, X.: A novel framework for modeling and mitigating distributed link flooding attacks. In: Proceedings of the Thirty-Fifth IEEE International Conference on Computer Communications (2016)","DOI":"10.1109\/INFOCOM.2016.7524507"},{"key":"6_CR13","unstructured":"Maynor, D., Mookhey, K., Cervini, J., Roslan, F., Beaver, K.: Metasploit Toolkit for Penetration Testing, Exploit Development and Vulnerability Research, Syngress, Burlington, Massachusetts (2007)"},{"key":"6_CR14","unstructured":"Mininet, Mininet (2017). mininet.org"},{"key":"6_CR15","unstructured":"Open Networking Foundation, OpenFlow Switch Specification, Version 1.5.1 (Protocol Version 0x06), ONF TS-025, Menlo Park, California (2015)"},{"key":"6_CR16","unstructured":"Pfaff, B., Pettit, J., Koponen, T., Jackson, E., Zhou, A., Rajahalme, J., Gross, J., Wang, A., Stringer, J., Shelar, P., Amidon, K., Casado, M.: The design and implementation of Open vSwitch. In: Proceedings of the Twelfth USENIX Symposium on Networked Systems Design and Implementation, pp. 117\u2013130 (2015)"},{"key":"6_CR17","unstructured":"Project Floodlight, Floodlight (2017). www.projectfloodlight.org\/floodlight"},{"key":"6_CR18","unstructured":"Volatility Foundation, Volatility Framework (2017). www.volatilityfoundation.org"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Wang, H., Xu, L., Gu, G.: FloodGuard: a DoS attack prevention extension in software-defined networks. In: Proceedings of the Forty-Fifth IEEE\/IFIP International Conference on Dependable Systems and Networks, pp. 239\u2013250 (2015)","DOI":"10.1109\/DSN.2015.27"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Xiong, K.: Web services performance modeling and analysis. In: Proceedings of the International Symposium on High Capacity Optical Networks and Enabling Technologies (2006)","DOI":"10.1109\/HONET.2006.5338403"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Xiong, K.: Multiple priority customer service guarantees in cluster computing. In: Proceedings of the IEEE International Symposium on Parallel and Distributed Processing (2009)","DOI":"10.1109\/IPDPS.2009.5160987"},{"key":"6_CR22","doi-asserted-by":"publisher","DOI":"10.1002\/9781118898598","volume-title":"Resource Optimization and Security for Cloud Services","author":"K Xiong","year":"2014","unstructured":"Xiong, K.: Resource Optimization and Security for Cloud Services. John Wiley and Sons, Hoboken (2014)"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Zaalouk, A., Khondoker, R., Marx, R., Bayarou, K.: OrchSec: an orchestrator-based architecture for enhancing network security using network monitoring and SDN control functions. In: Proceedings of the Twenty-Sixth Network Operations and Management Symposium (2014)","DOI":"10.1109\/NOMS.2014.6838409"}],"container-title":["IFIP Advances in Information and Communication Technology","Advances in Digital Forensics XIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67208-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T00:05:28Z","timestamp":1630368328000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-67208-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319672076","9783319672083"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67208-3_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"31 August 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DigitalForensics","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Digital Forensics","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 January 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 February 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"digitalforensics2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip119.org\/Conferences\/ConferenceProgram2017.pdf","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}