{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:38:47Z","timestamp":1743097127706,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319673790"},{"type":"electronic","value":"9783319673806"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67380-6_22","type":"book-chapter","created":{"date-parts":[[2017,9,11]],"date-time":"2017-09-11T21:13:35Z","timestamp":1505164415000},"page":"235-246","source":"Crossref","is-referenced-by-count":1,"title":["On Detection of Network-Based Co-residence Verification Attacks in SDN-Driven Clouds"],"prefix":"10.1007","author":[{"given":"Mikhail","family":"Zolotukhin","sequence":"first","affiliation":[]},{"given":"Elena","family":"Ivannikova","sequence":"additional","affiliation":[]},{"given":"Timo","family":"H\u00e4m\u00e4l\u00e4inen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"22_CR1","doi-asserted-by":"crossref","unstructured":"Ristenpart, T., Tromer, E., Shacham, H., Savage, S.: Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds. In: Proceedings of the 16th ACM conference on Computer and Communications Security, pp. 199\u2013212 (2009)","DOI":"10.1145\/1653662.1653687"},{"key":"22_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-642-30436-1_32","volume-title":"Information Security and Privacy Research","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Li, M., Bai, K., Yu, M., Zang, W.: Incentive compatible moving target defense against VM-colocation attacks in clouds. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 388\u2013399. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-30436-1_32"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Wu, J., Ding, L., Lin, Y., Min-Allah, N., Wang, Y.: XenPump: a new method to mitigate timing channel in cloud computing. In: Proceedings of the 5th IEEE International Conference on Cloud Computing, pp. 678\u2013685 (2012)","DOI":"10.1109\/CLOUD.2012.28"},{"issue":"1","key":"22_CR4","first-page":"95","volume":"14","author":"Y Han","year":"2017","unstructured":"Han, Y., Chan, J., Alpcan, T., Leckie, C.: Using virtual machine allocation policies to defend against co-resident attacks in cloud computing. IEEE Trans. Dependable Secure Comput. 14(1), 95\u2013108 (2017)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Shulman, H., Ullrich, J., Weippl, E.: Cloudoscopy: services discovery and topology mapping. In: Proceedings of the ACM Workshop on Cloud Computing Security Workshop, pp. 113\u2013122 (2013)","DOI":"10.1145\/2517488.2517491"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Bates, A., Mood, B., Pletcher, J., Pruse, H., Valafar, M., Butler, K.: Detecting co-residency with active traffic analysis techniques. In: Proceedings of the ACM Workshop on Cloud Computing Security Workshop, pp. 1\u201312 (2012)","DOI":"10.1145\/2381913.2381915"},{"issue":"4","key":"22_CR7","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad, I., Namal, S., Ylianttila, M., Gurtov, A.: Security in software defined networks: a survey. IEEE Commun. Surv. Tutor. 17(4), 2317\u20132346 (2015)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"22_CR8","unstructured":"Hao, F., Lakshman, T., Mukherjee, S., Song, H.: Secure cloud computing with a virtualized network infrastructure. In: Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing, pp. 16\u201316 (2010)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Ma, H., Ding, H., Yang, Y., Mi, Z., Zhang, M.: SDN-based ARP attack detection for cloud centers. In: Proceedings of IEEE 12th International Conference on Ubiquitous Intelligence and Computing, IEEE 12th International Conference on Autonomic and Trusted Computing, IEEE 15th International Conference on Scalable Computing and Communications and its Associated Workshops, pp. 1049\u20131054 (2015)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP.2015.195"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Buragohain, C., Medhi, N.: FlowTrApp: an SDN based architecture for DDoS attack detection and mitigation in data centers. In: Proceedings of the 3rd International Conference on Signal Processing and Integrated Networks, pp. 519\u2013524 (2016)","DOI":"10.1109\/SPIN.2016.7566750"},{"key":"22_CR11","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhao, G., Xie, G., Yu, S.: Detection on application layer DDoS using random walk model. In: Proceedings of IEEE International Conference on Communications (ICC), pp. 707\u2013712 (2014)","DOI":"10.1109\/ICC.2014.6883402"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Zolotukhin, M., H\u00e4m\u00e4l\u00e4inen, T., Kokkonen, T., Siltanen, J.: Increasing web service availability by detecting application-layer DDoS attacks in encrypted traffic. In: Proceedings of 23rd International Conference on Telecommunications (ICT), pp. 1\u20136 (2016)","DOI":"10.1109\/ICT.2016.7500408"},{"key":"22_CR13","doi-asserted-by":"crossref","unstructured":"Akiyama, M., Kawamoto, T., Shimamura, M., Yokoyama, T., Kadobayashi, Y., Yamaguchi, S.: A proposal of metrics for botnet detection based on its cooperative behavior. In: Proceedings of International Symposium on Applications and the Internet Workshops, pp. 82\u201385 (2007)","DOI":"10.1109\/SAINT-W.2007.14"},{"issue":"4","key":"22_CR14","first-page":"287","volume":"5","author":"J Herlocker","year":"2002","unstructured":"Herlocker, J., Konstan, J., Riedl, J.: An empirical analysis of design choices in neighborhood-based collaborative filtering algorithms. ACM Trans. Inf. Syst. 5(4), 287\u2013310 (2002)","journal-title":"ACM Trans. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67380-6_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:22:41Z","timestamp":1570083761000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67380-6_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319673790","9783319673806"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67380-6_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}