{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T10:48:31Z","timestamp":1762253311108,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811533792"},{"type":"electronic","value":"9789811533808"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3380-8_17","type":"book-chapter","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T19:04:40Z","timestamp":1583175880000},"page":"192-203","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Industrial Network Protection by SDN-Based IPS with AI"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6595-0419","authenticated-orcid":false,"given":"Filip","family":"Holik","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7359-0764","authenticated-orcid":false,"given":"Petr","family":"Dolezel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"17_CR1","unstructured":"IEC 61850\u20135: Communication networks and systems in substation, Geneva, Switzerland (2003). \nhttps:\/\/webstore.iec.ch\/publication\/6012"},{"key":"17_CR2","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-319-44257-0_12","volume-title":"Information Fusion for Cyber-Security Analytics","author":"IM Alsmadi","year":"2017","unstructured":"Alsmadi, I.M., AlEroud, A.: SDN-based real-time IDS\/IPS alerting system. In: Alsmadi, I.M., Karabatis, G., AlEroud, A. (eds.) Information Fusion for Cyber-Security Analytics. SCI, vol. 691, pp. 297\u2013306. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-44257-0_12"},{"key":"17_CR3","doi-asserted-by":"publisher","unstructured":"Bakhareva, N., Polezhaev, P., Ushakov, Y., Shukhman, A.: SDN-based firewall implementation for large corporate networks (2019). \nhttps:\/\/doi.org\/10.1109\/ICAICT.2017.8687088","DOI":"10.1109\/ICAICT.2017.8687088"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Cheng, Q., Wu, C., Zhou, H., Zhang, Y., Wang, R., Ruan, W.: Guarding the perimeter of cloud-based enterprise networks: an intelligent SDN firewall. In: 2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS), pp. 897\u2013902, June 2018. \nhttps:\/\/doi.org\/10.1109\/HPCC\/SmartCity\/DSS.2018.00149","DOI":"10.1109\/HPCC\/SmartCity\/DSS.2018.00149"},{"key":"17_CR5","doi-asserted-by":"publisher","unstructured":"Fiessler, A., Lorenz, C., Hager, S., Scheuermann, B.: Fireflow - high performance hybrid SDN-firewalls with OpenFlow, October 2018, pp. 267\u2013270 (2019). \nhttps:\/\/doi.org\/10.1109\/LCN.2018.8638090","DOI":"10.1109\/LCN.2018.8638090"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Fortinet: Threat landscape report Q2 2018 (2018). \nhttps:\/\/www.fortinet.com\/demand\/gated\/q2-2018-threat-landscape-report.htmll","DOI":"10.1016\/S1361-3723(18)30050-2"},{"key":"17_CR7","series-title":"Studies in Computational Intelligence","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-14132-5_4","volume-title":"Intelligent Information and Database Systems: Recent Developments","author":"F Holik","year":"2020","unstructured":"Holik, F.: Meeting smart city latency demands with SDN. In: Huk, M., Maleszka, M., Szczerbicki, E. (eds.) ACIIDS 2019. SCI, vol. 830, pp. 43\u201354. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-14132-5_4"},{"key":"17_CR8","unstructured":"IBM Security and Ponemon Institute: 2018 cost of a data breach study. Technical report (2018)"},{"key":"17_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/B978-0-12-420114-9.00002-2","volume-title":"Industrial Network Security","author":"Eric D. Knapp","year":"2015","unstructured":"Knapp, E.D., Langill, J.T.: Chapter 2 - About industrial networks. In: Knapp, E.D., Langill, J.T. (eds.) Industrial Network Security, pp. 9\u201340, 2nd edn. Syngress, Boston (2015). \nhttps:\/\/doi.org\/10.1016\/B978-0-12-420114-9.00002-2"},{"key":"17_CR10","doi-asserted-by":"publisher","unstructured":"Li, H., Wei, F., Hu, H.: Enabling dynamic network access control with anomaly-based IDS and SDN, pp. 13\u201316 (2019). \nhttps:\/\/doi.org\/10.1145\/3309194.3309199","DOI":"10.1145\/3309194.3309199"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1007\/978-3-030-14802-7_3","volume-title":"Intelligent Information and Database Systems","author":"K-S Lin","year":"2019","unstructured":"Lin, K.-S.: A pattern recognition based FMEA for safety-critical SCADA systems. In: Nguyen, N.T., Gaol, F.L., Hong, T.-P., Trawi\u0144ski, B. (eds.) ACIIDS 2019. LNCS (LNAI), vol. 11432, pp. 26\u201339. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-14802-7_3"},{"key":"17_CR12","unstructured":"Lueth, K.L.: State of the IoT 2018: number of IoT devices now at 7B - market accelerating. \nhttps:\/\/iot-analytics.com\/state-of-the-iot-update-q1-q2-2018-number-of-iot-devices-now-7b\/"},{"key":"17_CR13","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/978-3-030-16042-5_28","volume-title":"e-Infrastructure and e-Services for Developing Countries","author":"S Mahamat Charfadine","year":"2019","unstructured":"Mahamat Charfadine, S., Flauzac, O., Nolot, F., Rabat, C., Gonzalez, C.: Secure exchanges activity in function of event detection with the SDN. In: Mendy, G., Ouya, S., Dioum, I., Thiar\u00e9, O. (eds.) AFRICOMM 2018. LNICST, vol. 275, pp. 315\u2013324. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-16042-5_28"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Neu, C.V., Tatsch, C.G., Lunardi, R.C., Michelin, R.A., Orozco, A.M.S., Zorzo, A.F.: Lightweight IPS for port scan in OpenFlow SDN networks. In: NOMS 2018\u20132018 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20136, April 2018). \nhttps:\/\/doi.org\/10.1109\/NOMS.2018.8406313","DOI":"10.1109\/NOMS.2018.8406313"},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-319-75420-8_27","volume-title":"Intelligent Information and Database Systems","author":"DT Nguyen","year":"2018","unstructured":"Nguyen, D.T., Le, M.T.: A new method for establishing and managing group key against network attacks. In: Nguyen, N.T., Hoang, D.H., Hong, T.-P., Pham, H., Trawi\u0144ski, B. (eds.) ACIIDS 2018. LNCS (LNAI), vol. 10752, pp. 287\u2013296. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-75420-8_27"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Stouffer, K.A., Falco, J.A., Scarfone, K.A.: Sp 800\u201382. guide to industrial control systems (ICS) security: Supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and other control system configurations such as programmable logic controllers (PLC). Technical report, Gaithersburg, MD, United States (2011)","DOI":"10.6028\/NIST.SP.800.82"},{"key":"17_CR17","unstructured":"Webroot: Threat report. Technical report (2018). \nhttps:\/\/www-cdn.webroot.com\/9315\/2354\/6488\/2018-Webroot-Threat-Report_US-ONLINE.pdf"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Xing, T., Xiong, Z., Huang, D., Medhi, D.: SDNIPS: Enabling software-defined networking based intrusion prevention system in clouds. In: 10th International Conference on Network and Service Management (CNSM) and Workshop, pp. 308\u2013311, November 2014","DOI":"10.1109\/CNSM.2014.7014181"}],"container-title":["Communications in Computer and Information Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3380-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T19:07:14Z","timestamp":1583176034000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3380-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811533792","9789811533808"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3380-8_17","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}