{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T20:32:01Z","timestamp":1742934721657,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_1","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detection and Defense Against DDoS Attack on SDN Controller Based on Spatiotemporal Feature"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7723-8250","authenticated-orcid":false,"given":"Yan","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6376-1657","authenticated-orcid":false,"given":"Jinxing","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"2","key":"1_CR1","doi-asserted-by":"publisher","first-page":"1255","DOI":"10.1109\/COMST.2015.2501026","volume":"18","author":"FA Lopes","year":"2016","unstructured":"Lopes, F.A., et al.: A software engineering perspective on sdn programmability. IEEE Commun. Surveys Tuts. 18(2), 1255\u20131272 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2501026","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"1","key":"1_CR2","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","volume":"18","author":"S Scotthayward","year":"2016","unstructured":"Scotthayward, S., Sriram, N., Sakir, S.: A survey of security in software defined networks. IEEE Commun. Surveys Tuts. 18(1), 623\u2013654 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2453114","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3301614","volume":"52","author":"R Swami","year":"2019","unstructured":"Swami, R., Mayank, D., Virender, R.: Software-defined networking-based ddos defense mechanisms. ACM Comput. Surveys 52(2), 1\u201336 (2019). https:\/\/doi.org\/10.1145\/3301614","journal-title":"ACM Comput. Surveys"},{"issue":"1","key":"1_CR4","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., et al.: Software-defined networking (sdn) and distributed denial of service (ddos) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surveys Tuts. 18(1), 602\u2013622 (2016). https:\/\/doi.org\/10.1109\/COMST.2015.2487361","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1109\/COMST.2018.2870658","volume":"21","author":"A Praseed","year":"2019","unstructured":"Praseed, A., Santhi, T.P.: DDOS attacks at the application layer: challenges and research perspectives for safeguarding web applications. IEEE Commun. Surveys Tuts. 21(1), 661\u2013685 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2870658","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"1_CR6","doi-asserted-by":"publisher","unstructured":"Han, B., et al.: OverWatch: a cross-plane DDOS attack defense framework with collaborative intelligence in SDN. Secur. Commun. Netw. 1\u201315 (2018) https:\/\/doi.org\/10.1155\/2018\/9649643","DOI":"10.1155\/2018\/9649643"},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Wang, Y., et al.: SGS: safe-guard scheme for protecting control plane against ddos attacks in software-defined networking. IEEE Access 34699\u201334710 (2019) https:\/\/doi.org\/10.1109\/ACCESS.2019.2895092","DOI":"10.1109\/ACCESS.2019.2895092"},{"issue":"9","key":"1_CR8","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1109\/MCOM.2017.1600970","volume":"55","author":"K Kalkan","year":"2017","unstructured":"Kalkan, K., Gurkan, G., Fatih, A.: Defense mechanisms against ddos attacks in sdn environment. IEEE Commun. Mag. 55(9), 175\u2013179 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1600970","journal-title":"IEEE Commun. Mag."},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Kumar, K., Joshi, R. C., Singh, K.: A distributed approach using entropy to detect DDoS attacks in ISP domain. In: International Conference on Signal Processing, pp. 331\u2013337. (2007). https:\/\/doi.org\/10.1109\/ICSCN.2007.350758","DOI":"10.1109\/ICSCN.2007.350758"},{"key":"1_CR10","doi-asserted-by":"publisher","unstructured":"Barki, L., et al.: Detection of distributed denial of service attacks in software defined networks. In: Advances in Computing and Communications, pp. 2576\u20132581 (2016). https:\/\/doi.org\/10.1109\/ICACCI.2016.7732445","DOI":"10.1109\/ICACCI.2016.7732445"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Mckeown, Nick, et al. \u201cOpenFlow: enabling innovation in campus networks.\u201d acm special interest group on data communication (2008): 69\u201374. https:\/\/doi.org\/10.1145\/1355734.1355746","DOI":"10.1145\/1355734.1355746"},{"key":"1_CR12","doi-asserted-by":"publisher","unstructured":"Xu, Y., Yong, L.: DDoS attack detection under SDN context. In: IEEE International Conference Computer And Communications, pp. 1\u20139 (2016). https:\/\/doi.org\/10.1109\/INFOCOM.2016.752450","DOI":"10.1109\/INFOCOM.2016.752450"},{"issue":"4","key":"1_CR13","doi-asserted-by":"publisher","first-page":"1545","DOI":"10.1109\/TNSM.2018.2861741","volume":"15","author":"P Kumar","year":"2018","unstructured":"Kumar, P., et al.: SAFETY: early detection and mitigation of TCP SYN flood utilizing entropy in SDN. IEEE Trans. Netw. Service Manag. 15(4), 1545\u20131559 (2018). https:\/\/doi.org\/10.1109\/TNSM.2018.2861741","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"1_CR14","doi-asserted-by":"publisher","unstructured":"Shin, S., et al.: AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. In: Computer and Communications Security, pp. 413\u2013424 (2013) https:\/\/doi.org\/10.1145\/2508859.2516684","DOI":"10.1145\/2508859.2516684"},{"key":"1_CR15","doi-asserted-by":"publisher","unstructured":"Wang, R., Zhiping, J., Lei, J.: An entropy-based distributed ddos detection mechanism in software-defined networking. In: Trust, Security and Privacy in Computing and Communications, pp. 310\u2013317 (2015) https:\/\/doi.org\/10.1109\/Trustcom.2015.389","DOI":"10.1109\/Trustcom.2015.389"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Kalkan, K., Gurkan, G., Fatih, A.: SDNScore: A statistical defense mechanism against DDoS attacks in SDN environment. In: International Symposium on Computers and Communications, pp. 669\u2013675 (2017). https:\/\/doi.org\/10.1109\/ISCC.2017.8024605","DOI":"10.1109\/ISCC.2017.8024605"},{"issue":"1","key":"1_CR17","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1109\/COMST.2018.2866942","volume":"21","author":"J Xie","year":"2019","unstructured":"Xie, J., et al.: A survey of machine learning techniques applied to software defined networking (sdn): research issues and challenges. IEEE Commun. Surveys Tuts. 21(1), 393\u2013430 (2019). https:\/\/doi.org\/10.1109\/COMST.2018.2866942","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"2","key":"1_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1049\/iet-net.2018.5082","volume":"8","author":"M Latah","year":"2019","unstructured":"Latah, M., Levent, T.: Artificial intelligence enabled software-defined networking: a comprehensive overview. IET networks 8(2), 79\u201399 (2019). https:\/\/doi.org\/10.1049\/iet-net.2018.5082","journal-title":"IET networks"},{"issue":"18","key":"1_CR19","doi-asserted-by":"publisher","first-page":"6386","DOI":"10.1002\/sec.1759","volume":"9","author":"N Dayal","year":"2016","unstructured":"Dayal, N., et al.: Research trends in security and ddos in sdn. Secur. Commun. Netw. 9(18), 6386\u20136411 (2016). https:\/\/doi.org\/10.1002\/sec.1759","journal-title":"Secur. Commun. Netw."},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"Deepa, S., Deepa, L.: Detection of ddos attack on sdn control plane using hybrid machine learning techniques. In: International Conference on Smart Systems and Inventive Technology, pp. 299\u2013303 (2018) https:\/\/doi.org\/10.1109\/ICSSIT.2018.8748836","DOI":"10.1109\/ICSSIT.2018.8748836"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jnca.2016.04.005","volume":"68","author":"Y Cui","year":"2016","unstructured":"Cui, Y., et al.: SD-Anti-DDoS: fast and efficient ddos defense in software-defined networks. J. Netw. Comput. Appl. 68, 65\u201379 (2016). https:\/\/doi.org\/10.1016\/j.jnca.2016.04.005","journal-title":"J. Netw. Comput. Appl."},{"key":"1_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1007\/978-3-319-93638-3_37","volume-title":"Information Security and Privacy","author":"J Cui","year":"2018","unstructured":"Cui, J., He, J., Xu, Y., Zhong, H.: TDDAD: time-based detection and defense scheme against ddos attack on sdn controller. In: Susilo, W., Yang, G. (eds.) ACISP 2018. LNCS, vol. 10946, pp. 649\u2013665. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-93638-3_37"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Mao, J., Weijun, D., Fuke, S.: DDoS flooding attack detection based on joint-entropy with multiple traffic features. In: trust security and privacy in computing and communications, pp. 237\u2013243 (2018). https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00045","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00045"},{"key":"1_CR24","doi-asserted-by":"publisher","unstructured":"Kim, Y., et al.: Packetscore: statistics-based overload control against distributed denial-of-service attacks. In: International Conference on Computer Communications, pp. 2594\u20132604 (2004). https:\/\/doi.org\/10.1109\/INFCOM.2004.1354679","DOI":"10.1109\/INFCOM.2004.1354679"},{"issue":"1","key":"1_CR25","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"CE Shannon","year":"1951","unstructured":"Shannon, C.E.: Prediction and entropy of printed English. Bell Syst. Tech. J. 30(1), 50\u201364 (1951). https:\/\/doi.org\/10.1002\/j.1538-7305.1951.tb01366.x","journal-title":"Bell Syst. Tech. J."},{"key":"1_CR26","doi-asserted-by":"publisher","unstructured":"Cui, J., et al.: Comparative study of CNN and RNN for deep learning based intrusion detection system. In: International Conference on Cloud Computing, pp. 159\u2013170 (2018). https:\/\/doi.org\/10.1007\/978-3-030-00018-9_15","DOI":"10.1007\/978-3-030-00018-9_15"},{"key":"1_CR27","unstructured":"Zhai, S., et al.: Deep structured energy based models for anomaly detection. In: International Conference on Machine Learning, pp. 1100\u20131109 (2016)"},{"key":"1_CR28","unstructured":"MITLincolnLaboratory:DARPA 1999 Intrusion Detection Data Set. https:\/\/www.LL.mit.edu\/ideval\/docs\/attackDB.html"},{"key":"1_CR29","unstructured":"Mininet. http:\/\/mininet.org\/"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:20:48Z","timestamp":1619317248000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}