{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:09:24Z","timestamp":1742926164824,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_4","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"50-64","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Protecting the Data Plane of SDN From Malicious Flow Entries Based on P4"],"prefix":"10.1007","author":[{"given":"Yifang","family":"Zhi","sequence":"first","affiliation":[]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Gaolei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuehong","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., et al.: P4: programming protocol-independent packet processors. Comput. Commun. Rev. 44(3), 87\u201395 (2014)","journal-title":"Comput. Commun. Rev."},{"key":"4_CR2","unstructured":"de Castro, M.O.T.: Practical Byzantine fault tolerance. Ph.D. thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (2000)"},{"key":"4_CR3","volume-title":"Internetworking with TCP\/IP - Principles, Protocols, and Architectures","year":"2000","unstructured":"Comer, D. (ed.): Internetworking with TCP\/IP - Principles, Protocols, and Architectures, 4th edn. Prentice-Hall, Upper Saddle River (2000)","edition":"4"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Defrawy, K.E., Kaczmarek, T.: Byzantine fault tolerant software-defined networking (SDN) controllers. In: 40th IEEE Annual Computer Software and Applications Conference, COMPSAC Workshops 2016, Atlanta, GA, USA, pp. 208\u2013213 (2016)","DOI":"10.1109\/COMPSAC.2016.76"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Hill, J., Aloserij, M., Grosso, P.: Tracking network flows with P4. In: Proceedings of the 5th IEEE\/ACM International Workshop on Innovating the Network for Data-Intensive Science, Dallas, TX, USA, 11 November 2018, pp. 23\u201332 (2018)","DOI":"10.1109\/INDIS.2018.00006"},{"key":"4_CR6","unstructured":"Jin, X., Gossels, J., Rexford, J., Walker, D.: Covisor: a compositional hypervisor for software-defined networks. In: 12th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2015, Oakland, CA, USA, pp. 87\u2013101 (2015)"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Khurshid, A., Zhou, W., Caesar, M., Godfrey, B.: Veriflow: verifying network-wide invariants in real time. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, pp. 49\u201354 (2012)","DOI":"10.1145\/2342441.2342452"},{"issue":"1","key":"4_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M.V., Ver\u00edssimo, P.J.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"issue":"4","key":"4_CR9","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TCC.2014.2355227","volume":"2","author":"H Li","year":"2014","unstructured":"Li, H., Li, P., Guo, S., Nayak, A.: Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans. Cloud Comput. 2(4), 436\u2013447 (2014)","journal-title":"IEEE Trans. Cloud Comput."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Li, H., Li, P., Guo, S., Yu, S.: Byzantine-resilient secure software-defined networks with multiple controllers. In: IEEE International Conference on Communications, ICC 2014, Sydney, Australia, 10\u201314 June 2014, pp. 695\u2013700 (2014)","DOI":"10.1109\/ICC.2014.6883400"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Lin, C., Li, C., Wang, K.: Setting malicious flow entries against SDN operations: attacks and countermeasures. In: IEEE Conference on Dependable and Secure Computing, DSC 2018, Kaohsiung, Taiwan, pp. 1\u20138 (2018)","DOI":"10.1109\/DESEC.2018.8625101"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Porras, P.A., Cheung, S., Fong, M.W., Skinner, K., Yegneswaran, V.: Securing the software defined network control layer. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA (2015)","DOI":"10.14722\/ndss.2015.23222"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Porras, P.A., Shin, S., Yegneswaran, V., Fong, M.W., Tyson, M., Gu, G.: A security enforcement kernel for openflow networks. In: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN@SIGCOMM 2012, Helsinki, Finland, pp. 121\u2013126 (2012)","DOI":"10.1145\/2342441.2342466"},{"key":"4_CR14","unstructured":"The P4 Language Consortium: P4$$_{16}$$ Language Specification. https:\/\/p4.org\/p4-spec\/docs\/P4-16-v1.2.0.html"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Wen, X., Chen, Y., Hu, C., Shi, C., Wang, Y.: Towards a secure controller platform for openflow applications. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, HotSDN 2013, The Chinese University of Hong Kong, Hong Kong, China, pp. 171\u2013172 (2013)","DOI":"10.1145\/2491185.2491212"},{"issue":"1","key":"4_CR16","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1109\/TC.2013.191","volume":"64","author":"S Yu","year":"2015","unstructured":"Yu, S., Guo, S., Stojmenovic, I.: Fool me if you can: mimicking attacks and anti-attacks in cyberspace. IEEE Trans. Comput. 64(1), 139\u2013151 (2015)","journal-title":"IEEE Trans. Comput."},{"issue":"6","key":"4_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MNET.2015.7340429","volume":"29","author":"S Yu","year":"2015","unstructured":"Yu, S., Wang, G., Zhou, W.: Modeling malicious activities in cyber space. IEEE Netw. 29(6), 83\u201387 (2015)","journal-title":"IEEE Netw."},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/978-3-030-37337-5_7","volume-title":"Cyberspace Safety and Security","author":"Y Zhi","year":"2019","unstructured":"Zhi, Y., Yang, L., Yu, S., Ma, J.: BQSV: protecting SDN controller cluster\u2019s network topology view based on byzantine quorum system with verification function. In: Vaidya, J., Zhang, X., Li, J. (eds.) CSS 2019. LNCS, vol. 11982, pp. 73\u201388. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-37337-5_7"}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:23:29Z","timestamp":1619317409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_4","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}