{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:50:56Z","timestamp":1774540256599,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319788128","type":"print"},{"value":"9783319788135","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_18","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T10:03:21Z","timestamp":1523354601000},"page":"356-376","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Disrupting SDN via the Data Plane: A\u00a0Low-Rate Flow Table Overflow Attack"],"prefix":"10.1007","author":[{"given":"Jiahao","family":"Cao","sequence":"first","affiliation":[]},{"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Jain, S., et al.: B4: experience with a globally-deployed software defined WAN. In: SIGCOMM. ACM (2013)","DOI":"10.1145\/2486001.2486019"},{"key":"18_CR2","unstructured":"Microsoft Azure and Software Defined Networking. https:\/\/technet.microsoft.com\/en-us\/windows-server-docs\/networking\/sdn\/azure_and_sdn"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Jia, S., et al.: Competitive analysis for online scheduling in software-defined optical WAN. In: INFOCOM, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056969"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Jang, R.H., et al.: Rflow$$^+$$: an SDN-based WLAN monitoring and management framework. In: INFOCOM, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8056995"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Sonchack, J., et al.: Enabling practical software-defined networking security applications with OFX. In: NDSS (2016)","DOI":"10.14722\/ndss.2016.23309"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Katta, N., et al.: Infinite cacheflow in software-defined networks. In: HotSDN, pp. 175\u2013180. ACM (2014)","DOI":"10.1145\/2620728.2620734"},{"key":"18_CR7","unstructured":"Cisco Plug-in for OpenFlow Configuration Guide 1.3. http:\/\/www.cisco.com\/c\/en\/us\/td\/docs\/switches\/datacenter\/nexus\/openflow\/b_openflow_agent_nxos_1_3.pdf"},{"key":"18_CR8","unstructured":"IBM Networking OS? 7.4 ISCLI-Industry Standard CLI for the RackSwitch G8264. http:\/\/www-01.ibm.com\/support\/docview.wss?uid=isg3T7000580&aid=1"},{"key":"18_CR9","unstructured":"OpenFlow Switch Specification v1.3.4. https:\/\/www.opennetworking.org"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Qian, Y., et al.: Openflow flow table overflow attacks and countermeasures. In: European Conference on Networks and Communications, pp. 205\u2013209. IEEE (2016)","DOI":"10.1109\/EuCNC.2016.7561033"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Dhawan, M., et al.: SPHINX: detecting security attacks in software-defined networks. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23064"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Kl\u00f6ti, R., et al.: OpenFlow: a security analysis. In: ICNP, pp. 1\u20136. IEEE (2013)","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Shang, G., et al.: Flooddefender: protecting data and control plane resources under SDN-aimed DoS attacks. In: INFOCOM, pp. 1\u20139. IEEE (2017)","DOI":"10.1109\/INFOCOM.2017.8057009"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Wang, H., et al.: Floodguard: a DoS attack prevention extension in software-defined networks. In: DSN, pp. 239\u2013250. IEEE (2015)","DOI":"10.1109\/DSN.2015.27"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: HotSDN, pp. 165\u2013166. ACM (2013)","DOI":"10.1145\/2491185.2491220"},{"issue":"2","key":"18_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1214\/ss\/1177013437","volume":"2","author":"JF Box","year":"1987","unstructured":"Box, J.F.: Guinness, Gosset, Fisher, and small samples. Stat. Sci. 2, 45\u201352 (1987)","journal-title":"Stat. Sci."},{"key":"18_CR18","unstructured":"Floodlight SDN Controller. http:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"18_CR19","unstructured":"Floodlight Forwarding Application. https:\/\/github.com\/floodlight\/floodlight\/tree\/master\/src\/main\/java\/net\/floodlightcontroller\/forwarding"},{"key":"18_CR20","unstructured":"AS4610-54T Data Center Switch. http:\/\/www.edge-core.com"},{"key":"18_CR21","unstructured":"hping3. http:\/\/tools.kali.org\/information-gathering\/hping3"},{"key":"18_CR22","unstructured":"iperf. https:\/\/iperf.fr\/"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Qiao, S., et al.: Taming the flow table overflow in OpenFlow switch. In: SIGCOMM, pp. 591\u2013592. ACM (2016)","DOI":"10.1145\/2934872.2959063"},{"key":"18_CR24","unstructured":"Zhu, H., et al.: MDTC: an efficient approach to TCAM-based multidimensional table compression. In: IFIP Networking, 2015, pp. 1\u20139. IEEE (2015)"},{"issue":"10","key":"18_CR25","doi-asserted-by":"publisher","first-page":"2160","DOI":"10.1109\/TIFS.2016.2573756","volume":"11","author":"H Cui","year":"2016","unstructured":"Cui, H., et al.: On the fingerprinting of software-defined networks. IEEE Trans. Inf. Forensics Secur. 11(10), 2160\u20132173 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Achleitner, S., et al.: Adversarial network forensics in software defined networking. In: SIGCOMM SOSR, pp. 1\u201313. ACM (2017)","DOI":"10.1145\/3050220.3050223"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Liu, S., et al.: Flow reconnaissance via timing attacks on SDN switches. In: ICDCS, pp. 1\u201311. IEEE (2017)","DOI":"10.1109\/ICDCS.2017.281"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Sonchack, J., et al.: Timing-based reconnaissance and defense in software-defined networks. In: ACSAC, pp. 89\u2013100. ACM (2016)","DOI":"10.1145\/2991079.2991081"},{"key":"18_CR29","unstructured":"Leng, J., et al.: An inference attack model for flow table capacity and usage: exploiting the vulnerability of flow table overflow in software-defined network. arXiv preprint arXiv:1504.03095 (2015)"},{"key":"18_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/978-3-319-11599-3_14","volume-title":"Secure IT Systems","author":"M Antikainen","year":"2014","unstructured":"Antikainen, M., Aura, T., S\u00e4rel\u00e4, M.: Spook in your network: attacking an SDN with a compromised OpenFlow switch. In: Bernsmed, K., Fischer-H\u00fcbner, S. (eds.) NordSec 2014. LNCS, vol. 8788, pp. 229\u2013244. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11599-3_14"},{"key":"18_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-3-319-26362-5_16","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"C R\u00f6pke","year":"2015","unstructured":"R\u00f6pke, C., Holz, T.: SDN rootkits: subverting network operating systems of software-defined networks. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 339\u2013356. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_16"},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Wen, X., et al.: SDNShield: reconciliating configurable application permissions for SDN app markets. In: DSN, pp. 121\u2013132. IEEE (2016)","DOI":"10.1109\/DSN.2016.20"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Porras, P.A., et al.: Securing the software defined network control layer. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23222"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Porras, P., et al.: A security enforcement kernel for OpenFlow networks. In: HotSDN, pp. 121\u2013126. ACM (2012)","DOI":"10.1145\/2342441.2342466"},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Khurshid, A., et al.: Veriflow: verifying network-wide invariants in real time. In: NSDI 2013, pp.15\u201327 (2013)","DOI":"10.1145\/2342441.2342452"},{"key":"18_CR36","doi-asserted-by":"crossref","unstructured":"Shin, S., et al.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: CCS, pp. 413\u2013424. ACM (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"18_CR37","doi-asserted-by":"crossref","unstructured":"Hong, S., et al.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23283"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T15:10:48Z","timestamp":1751555448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_18","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}