{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:12:53Z","timestamp":1758845573222,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":26,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811358258"},{"type":"electronic","value":"9789811358265"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5826-5_7","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:07:57Z","timestamp":1548306477000},"page":"88-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Managing Network Functions in Stateful Application Aware SDN"],"prefix":"10.1007","author":[{"given":"Prabhakar","family":"Krishnan","sequence":"first","affiliation":[]},{"given":"Krishnashree","family":"Achuthan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Shin, S., Gu, G.: Attacking software-defined networks: a first feasibility study. In: Proceedings of HotSDN 2013, pp. 165\u2013166 (2013)","DOI":"10.1145\/2491185.2491220"},{"issue":"8","key":"7_CR2","first-page":"93","volume":"115","author":"P Krishnan","year":"2017","unstructured":"Krishnan, P., Najeem, J.S.: A review of security threats and mitigation solutions for SDN stack. Int. J. Pure Appl. Math. 115(8), 93\u201399 (2017)","journal-title":"Int. J. Pure Appl. Math."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Qazi, Z.A., et al.: SIMPLE-fying middlebox policy enforcement using SDN. In: SIGCOMM (2013)","DOI":"10.1145\/2486001.2486022"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Fayazbakhsh, S.K., et al.: Enforcing network-wide policies in presence of dynamic middlebox actions using flowtags. In: NSDI (2014)","DOI":"10.1145\/2491185.2491203"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Gember, A., Prabhu, P., Ghadiyali, Z., Akella, A.: Toward software-defined middlebox networking. In: Proceedings of HotNets-XI (2012)","DOI":"10.1145\/2390231.2390233"},{"key":"7_CR6","unstructured":"Dixon, C., et al.: ETTM: a scalable fault tolerant network manager. In: Proceedings Of NSDI (2011)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Gember-Jacobson, A., et al.: OpenNF: enabling innovation in network function control. In: Proceedings Of SIGCOMM, Chicago, IL, August 2014","DOI":"10.1145\/2619239.2626313"},{"issue":"2","key":"7_CR8","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2602204.2602211","volume":"44","author":"G Bianchi","year":"2014","unstructured":"Bianchi, G., et al.: OpenState: programming platform-independent stateful OpenFlow applications inside the switch. ACM SIGCOMM Comput. Common. Rev. 44(2), 44\u201351 (2014)","journal-title":"ACM SIGCOMM Comput. Common. Rev."},{"key":"7_CR9","unstructured":"Bianchi, G., et al.: Open packet processor: a programmable architecture for wire speed platform-independent stateful in-network processing. CoRR, vol. abs\/1605.01977"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Moshref, M., et al.: FAST: flowlevel state transition as a new switch primitive for SDN. In: HotSDN, Chicago, IL, USA, pp. 61\u201366 (2014)","DOI":"10.1145\/2620728.2620729"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, S., Bi, J., Sun, C., Wu, C., Hu, H.: SDPA: enhancing stateful forwarding for software-defined networking. In: Proceedings of 23rd International Conference on Network Protocols (ICNP), San Francisco, CA, USA, pp. 10\u201313 (2015)","DOI":"10.1109\/ICNP.2015.45"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Sonchack, J., et al.: Enabling practical software-defined networking security applications with OFX. In: NDSS 2016 (2016)","DOI":"10.14722\/ndss.2016.23309"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Mekky, H., et al.: Application-aware data plane processing in SDN. In: Proceedings of ACM SIGCOMM HotSDN 2014 (2014)","DOI":"10.1145\/2620728.2620735"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Mekky, H., et al.: Network function virtualization enablement within SDN data plane. In: IEEE INFOCOM 2017 (2017)","DOI":"10.1109\/INFOCOM.2017.8057138"},{"key":"7_CR15","unstructured":"Jackson, E.J., et al.: SoftFlow: a middlebox architecture for Open vSwitch. In: Proceedings of USENIX ATC (2016)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Chaignon, P., et al.: Oko: extending open vSwitch with stateful filters. In: Symposium on SDN Research, SOSR 2018 (2018)","DOI":"10.1145\/3185467.3185496"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: scalable and vigilant switch flow management in software defined networks. In: Proceedings of CCS 2013, pp. 413\u2013424 (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Ambrosin, M., et al.: Lineswitch: efficiently managing switch flow in SDN while effectively tackling DoS attacks. In: ACM Symposium on Information, Computer and Communications Security, pp. 639\u2013644 (2015)","DOI":"10.1145\/2714576.2714612"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Wang, A., et al.: UMON: flexible and fine-grained traffic monitoring in open vSwitch, In: Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies, CoNEXT 2015 (2015)","DOI":"10.1145\/2716281.2836100"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Wang, H., Xu, L., Gu, G.: Floodguard: a DoS attack prevention extension in SDN. In: Dependable Systems and Networks (DSN), pp. 239\u2013250. IEEE (2015)","DOI":"10.1109\/DSN.2015.27"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Thimmaraju, K., et al.: Taking control of SDN-based cloud systems via the data plane. In: Proceedings of the Symposium on SDN Research, p. 1. ACM (2018)","DOI":"10.1145\/3185467.3185468"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Zha, Z., et al.: Instrumenting open vSwitch with monitoring capabilities: designs and challenges. In: SOSR 2018, Los Angeles, CA, USA, 28\u201329 March 2018 (2018)","DOI":"10.1145\/3185467.3185478"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Boite, J., et al.: StateSec: stateful monitoring for DDoS protection in software defined networks. In: Proceedings of IEEE NetSoft 2017, Italy (2017)","DOI":"10.1109\/NETSOFT.2017.8004113"},{"key":"7_CR24","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-319-73423-1_11","volume-title":"Ubiquitous Communications and Network Computing","author":"P Krishnan","year":"2018","unstructured":"Krishnan, P., Najeem, Jisha S., Achuthan, K.: SDN framework for securing IoT networks. In: Kumar, N., Thakre, A. (eds.) UBICNET 2017. LNICST, vol. 218, pp. 116\u2013129. Springer, Cham (2018). \n                  https:\/\/doi.org\/10.1007\/978-3-319-73423-1_11"},{"key":"7_CR25","unstructured":"Alizadeh, M., et al.: DCTCP: efficient packet transport for the commoditized data center. In: SIGCOMM (2010)"},{"key":"7_CR26","first-page":"1112","volume":"8","author":"AA Acharya","year":"2016","unstructured":"Acharya, A.A., et al.: An intrusion detection system against UDP flood attack and ping of death attack (DDOS) in MANET. Int. J. Eng. Technol. 8, 1112\u20131115 (2016)","journal-title":"Int. J. Eng. Technol."}],"container-title":["Communications in Computer and Information Science","Security in Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5826-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:49:16Z","timestamp":1558396156000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5826-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811358258","9789811358265"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5826-5_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SSCC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Security in Computing and Communication","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bangalore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sscc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.acn-conference.org\/sscc2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}