{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T08:10:01Z","timestamp":1751098201499,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319723884"},{"type":"electronic","value":"9783319723891"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-72389-1_12","type":"book-chapter","created":{"date-parts":[[2017,12,6]],"date-time":"2017-12-06T14:53:21Z","timestamp":1512572001000},"page":"131-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Motivation of DDOS Attack-Aware Link Assignment between Switches to SDN Controllers"],"prefix":"10.1007","author":[{"given":"Sameer","family":"Ali","sequence":"first","affiliation":[]},{"given":"Saw Chin","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Lee Ching","family":"Kwang","sequence":"additional","affiliation":[]},{"given":"Zulfadzli","family":"Yusoff","sequence":"additional","affiliation":[]},{"given":"Reazul","family":"Haque","sequence":"additional","affiliation":[]},{"given":"Ir. Rizaludin","family":"Kaspin","sequence":"additional","affiliation":[]},{"given":"Salvatore Renato","family":"Ziri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,7]]},"reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"key":"12_CR2","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.comnet.2014.07.004","volume":"72","author":"M Jammal","year":"2014","unstructured":"Jammal, M., Singh, T., Shami, A., Asal, R., Li, Y.: Software defined networking: state of the art and research challenges. Comput. Netw. 72, 74\u201398 (2014). Elsevier","journal-title":"Comput. Netw."},{"issue":"1","key":"12_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","volume":"17","author":"W Xia","year":"2015","unstructured":"Xia, W., Wen, Y., Foh, C.H., Niyato, D., Xie, H.: A survey on software-defined networking. IEEE Commun. Surv. Tutorials 17(1), 27\u201351 (2015)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Bakhshi, T.: State of the art and recent research advances in software defined networking. Wirel. Commun. Mob. Comput. (2017)","DOI":"10.1155\/2017\/7191647"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Heller, B., Sherwood, R., McKeown, N.: The controller placement problem. In: Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks, pp. 7\u201312. ACM, August 2012","DOI":"10.1145\/2342441.2342444"},{"issue":"1","key":"12_CR6","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., Yu, F.R., Gong, Q., Li, J.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutorials 18(1), 602\u2013622 (2016)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Mallikarjunan, K.N., Muthupriya, K., Shalinie, S.M.: A survey of distributed denial of service attack. In: 2016 10th International Conference on Intelligent Systems and Control (ISCO), pp. 1\u20136. IEEE, January 2016","DOI":"10.1109\/ISCO.2016.7727096"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Dao, N.N., Park, J., Park, M., Cho, S.: A feasible method to combat against DDoS attack in SDN network. In: 2015 International Conference on Information Networking (ICOIN), pp. 309\u2013311. IEEE, January 2015","DOI":"10.1109\/ICOIN.2015.7057902"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Xu, Y., Liu, Y.: DDoS attack detection under SDN context. In: IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, pp. 1\u20139. IEEE, April 2016","DOI":"10.1109\/INFOCOM.2016.7524500"},{"issue":"4","key":"12_CR10","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1109\/MCOM.2015.7081075","volume":"53","author":"Q Yan","year":"2015","unstructured":"Yan, Q., Yu, F.R.: Distributed denial of service attacks in software-defined networking with cloud computing. IEEE Commun. Mag. 53(4), 52\u201359 (2015)","journal-title":"IEEE Commun. Mag."},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","volume":"81","author":"B Wang","year":"2015","unstructured":"Wang, B., Zheng, Y., Lou, W., Hou, Y.T.: DDoS attack protection in the era of cloud computing and software-defined networking. Comput. Netw. 81, 308\u2013319 (2015)","journal-title":"Comput. Netw."},{"key":"12_CR12","unstructured":"Yan-nan, H., Wen-dong, W., Xiang-yang, G., Xi-rong, Q., Shi-duan, C"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Xiao, P., Qu, W., Qi, H., Li, Z., Xu, Y.: The SDN controller placement problem for WAN. In: 2014 IEEE\/CIC International Conference on Communications in China (ICCC), pp. 220\u2013224. IEEE, October 2014","DOI":"10.1109\/ICCChina.2014.7008275"},{"key":"12_CR14","first-page":"273","volume":"2015","author":"E Borcoci","year":"2015","unstructured":"Borcoci, E., Badea, R., Obreja, S.G., Vochin, M.: On multi-controller placement optimization in software defined networking-based wans. ICN 2015, 273 (2015)","journal-title":"ICN"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Cheng, T.Y., Wang, M., Jia, X.: QoS-guaranteed controller placement in SDN. In: 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136. IEEE, December 2015","DOI":"10.1109\/GLOCOM.2015.7416960"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Blial, O., Ben Mamoun, M., Benaini, R.: An overview on SDN architectures with multiple controllers. J. Comput. Netw. Commun. (2016)","DOI":"10.1155\/2016\/9396525"},{"key":"12_CR17","first-page":"120","volume":"2016","author":"H Aoki","year":"2016","unstructured":"Aoki, H., Shinomiya, N.: Controller placement problem to enhance performance in multi-domain SDN networks. ICN 2016, 120 (2016)","journal-title":"ICN"},{"key":"12_CR18","unstructured":"Manzano, M., Fagertun, A.M., Ruepp, S., Calle, E., Scoglio, C., Sydney, A., de la Oliva, A., Mu\u00f1oz, A.: Unveiling Potential Failure Propagation Scenarios in Core Transport Networks (2014). arXiv preprint arXiv:1402.2680"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-72389-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T07:30:52Z","timestamp":1751095852000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-72389-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319723884","9783319723891"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-72389-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"7 December 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}