{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T14:43:30Z","timestamp":1745505810930},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319763538"},{"type":"electronic","value":"9783319763545"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76354-5_29","type":"book-chapter","created":{"date-parts":[[2018,3,9]],"date-time":"2018-03-09T06:43:48Z","timestamp":1520577828000},"page":"318-328","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Scalable and Dynamic Network Intrusion Detection and Prevention System"],"prefix":"10.1007","author":[{"given":"Safaa","family":"Mahrach","sequence":"first","affiliation":[]},{"given":"Oussama","family":"Mjihil","sequence":"additional","affiliation":[]},{"given":"Abdelkrim","family":"Haqiq","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,3,10]]},"reference":[{"key":"29_CR1","unstructured":"P4 language specification. https:\/\/p4lang.github.io\/p4-spec\/ . Accessed 12 Sep 2017"},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Afek, Y., Bremler-Barr, A., Shafir, L.: Network anti-spoofing with SDN data plane. In: IEEE Conference on Computer Communications, IEEE INFOCOM 2017, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057008"},{"key":"29_CR3","doi-asserted-by":"crossref","unstructured":"Benton, K., Camp, L.J., Small, C.: Openflow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 151\u2013152. ACM (2013)","DOI":"10.1145\/2491185.2491222"},{"issue":"2","key":"29_CR4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1145\/2602204.2602211","volume":"44","author":"G Bianchi","year":"2014","unstructured":"Bianchi, G., Bonola, M., Capone, A., Cascone, C.: Openstate: programming platform-independent stateful openflow applications inside the switch. ACM SIGCOMM Comput. Commun. Rev. 44(2), 44\u201351 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"29_CR5","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., et al.: P4: programming protocol-independent packet processors. ACM SIGCOMM Comput. Commun. Rev. 44(3), 87\u201395 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"29_CR6","doi-asserted-by":"crossref","first-page":"1701","DOI":"10.1109\/COMST.2017.2689819","volume":"19","author":"T Dargahi","year":"2017","unstructured":"Dargahi, T., Caponi, A., Ambrosin, M., Bianchi, G., Conti, M.: A survey on the security of stateful SDN data planes. IEEE Commun. Surv. Tutor. 19, 1701\u20131725 (2017)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"29_CR7","unstructured":"Echevarria, J.J., Garaizar, P., Legarda, J.: An experimental study on the applicability of SYN cookies to networked constrained devices. Softw. Pract. Exp."},{"key":"29_CR8","unstructured":"Fontes, S.M., Hind, J.R., Narten, T., Stockton, M.L.: Blended syn cookies, 6 June 2006. US Patent 7,058,718"},{"issue":"2","key":"29_CR9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comp. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comp. Commun. Rev."},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"Moshref, M., Bhargava, A., Gupta, A., Yu, M., Govindan, R.: Flow-level state transition as a new switch primitive for SDN. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 61\u201366. ACM (2014)","DOI":"10.1145\/2620728.2620729"},{"issue":"3","key":"29_CR11","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"29_CR12","doi-asserted-by":"crossref","unstructured":"Scarfone, K., Mell, P.: Guide to intrusion detection and prevention systems (IDPS). NIST special publication 800(2007), 94 (2007)","DOI":"10.6028\/NIST.SP.800-94"},{"key":"29_CR13","doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 165\u2013166. ACM (2013)","DOI":"10.1145\/2491185.2491220"},{"key":"29_CR14","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 413\u2013424. ACM (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"29_CR15","doi-asserted-by":"crossref","unstructured":"Simpson, W.A.: TCP cookie transactions (TCPCT) (2011)","DOI":"10.17487\/rfc6013"},{"key":"29_CR16","doi-asserted-by":"crossref","unstructured":"Sonchack, J., Smith, J.M., Aviv, A.J., Keller, E.: Enabling practical software-defined networking security applications with OFX. In: NDSS, vol. 16, pp. 1\u201315 (2016)","DOI":"10.14722\/ndss.2016.23309"},{"key":"29_CR17","unstructured":"Touitou, D., Pazi, G., Shtein, Y., Tzadikario, R.: Using TCP to authenticate IP source addresses, 12 July 2011. US Patent 7,979,694"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"V\u00f6r\u00f6s, P., Kiss, A.: Security middleware programming using P4. In: International Conference on Human Aspects of Information Security, Privacy, and Trust, pp. 277\u2013287. Springer (2016)","DOI":"10.1007\/978-3-319-39381-0_25"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: Snortflow: a openflow-based intrusion prevention system in cloud environment. In: 2013 Second GENI Research and Educational Experiment Workshop (GREE), pp. 89\u201392. IEEE (2013)","DOI":"10.1109\/GREE.2013.25"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Xing, T., Xiong, Z., Huang, D., Medhi, D.: SDNIPS: enabling software-defined networking based intrusion prevention system in clouds. In: 2014 10th International Conference on Network and Service Management (CNSM), pp. 308\u2013311. IEEE (2014)","DOI":"10.1109\/CNSM.2014.7014181"},{"key":"29_CR21","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/j.comnet.2015.05.005","volume":"85","author":"C Yoon","year":"2015","unstructured":"Yoon, C., Park, T., Lee, S., Kang, H., Shin, S., Zhang, Z.: Enabling security functions with SDN: a feasibility study. Comput. Netw. 85, 19\u201335 (2015)","journal-title":"Comput. Netw."},{"issue":"4","key":"29_CR22","doi-asserted-by":"crossref","first-page":"2046","DOI":"10.1109\/SURV.2013.031413.00127","volume":"15","author":"ST Zargar","year":"2013","unstructured":"Zargar, S.T., Joshi, J., Tipper, D.: A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks. IEEE Commun. Surv. Tutor. 15(4), 2046\u20132069 (2013)","journal-title":"IEEE Commun. Surv. Tutor."}],"container-title":["Advances in Intelligent Systems and Computing","Innovations in Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76354-5_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,12]],"date-time":"2019-10-12T11:36:38Z","timestamp":1570880198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76354-5_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319763538","9783319763545"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76354-5_29","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2018]]}}}