{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:09:52Z","timestamp":1766268592558},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s10586-020-03133-y","type":"journal-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T21:11:43Z","timestamp":1590786703000},"page":"501-513","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":128,"title":["SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking"],"prefix":"10.1007","volume":"24","author":[{"given":"Sumit","family":"Badotra","sequence":"first","affiliation":[]},{"given":"Surya Narayan","family":"Panda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"issue":"1","key":"3133_CR1","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","volume":"17","author":"W Xia","year":"2015","unstructured":"Xia, W., Wen, Y., Foh, C.H., Niyato, D., Xie, H.: A survey on software-defined networking. IEEE Commun. Surveys Tutor. 17(1), 27\u201351 (2015)","journal-title":"IEEE Commun. Surveys Tutor."},{"key":"3133_CR2","doi-asserted-by":"crossref","unstructured":"Lantz, B., Heller, B., & McKeown, N.: A network in a laptop: rapid prototyping for software-defined networks. In Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, p. 19. ACM (2010)","DOI":"10.1145\/1868447.1868466"},{"issue":"2","key":"3133_CR3","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2602204.2602219","volume":"44","author":"N Feamster","year":"2014","unstructured":"Feamster, N., Rexford, J., Zegura, E.: The road to SDN: an intellectual history of programmable networks. ACM SIGCOMM Comput. Commun. Rev. 44(2), 87\u201398 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"3133_CR4","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"3133_CR5","first-page":"1","volume":"20","author":"S Shenker","year":"2011","unstructured":"Shenker, S., Casado, M., Koponen, T., McKeown, N.: The future of networking, and the past of protocols. Open Netw. Summit 20, 1\u201330 (2011)","journal-title":"Open Netw. Summit"},{"issue":"2","key":"3133_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Turner, J.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"3133_CR7","doi-asserted-by":"crossref","unstructured":"Fernandez, M.P.: Comparing OpenFlow controller paradigms scalability: reactive and proactive. In: 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), pp. 1009\u20131016. IEEE (2013)","DOI":"10.1109\/AINA.2013.113"},{"issue":"1","key":"3133_CR8","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"key":"3133_CR9","unstructured":"https:\/\/www.globenewswire.com\/newsrelease\/2019\/04\/04\/1797303\/0\/en\/Software-Defined-Networking-SDN-Market-Size-USD-59-Billion-by-202Growing-at-Massive-CAGR-of-42-41.html. Accessed 01 Oct 2019"},{"key":"3133_CR10","unstructured":"https:\/\/www.transformingnetworkinfrastructure.com\/news\/2019\/03\/22\/8923883.htm. Accessed 15 Oct 2019"},{"key":"3133_CR11","unstructured":"https:\/\/www.networkworld.com\/article\/3209131\/what-sdn-is-and-where-its-going.html. Accessed 30 Oct 2019"},{"key":"3133_CR12","volume-title":"Handbook of Research on Cloud Computing and Big Data Applications in IoT","year":"2019","unstructured":"Gupta, B.B., Agrawal, D.P. (eds.): Handbook of Research on Cloud Computing and Big Data Applications in IoT. IGI Global, Pennsylvania (2019)"},{"key":"3133_CR13","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.comnet.2014.07.004","volume":"72","author":"M Jammal","year":"2014","unstructured":"Jammal, M., Singh, T., Shami, A., Asal, R., Li, Y.: Software defined networking: state of the art and research challenges. Comput. Netw. 72, 74\u201398 (2014)","journal-title":"Comput. Netw."},{"issue":"3","key":"3133_CR14","first-page":"2","volume":"8","author":"S Badotra","year":"2017","unstructured":"Badotra, S., Singh, J.: A review paper on software defined networking. Int. J. Adv. Res. Comput. Sci. 8(3), 2 (2017)","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"issue":"2","key":"3133_CR15","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s12083-018-0710-9","volume":"12","author":"AE Kamal","year":"2019","unstructured":"Kamal, A.E., Han, L., Lu, L., Jabbar, S.: Guest editorial: Special issue on software defined networking: trends, challenges, and prospective smart solutions. Peer-to-Peer Netw. Appl. 12(2), 291\u2013294 (2019)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"3133_CR16","doi-asserted-by":"crossref","unstructured":"Nayyer, A., Sharma, A.K., Awasthi, L.K.: Issues in software-defined networking. In: Proceedings of 2nd International Conference on Communication, Computing and Networking, pp. 989\u2013997. Springer, Singapore (2019)","DOI":"10.1007\/978-981-13-1217-5_97"},{"issue":"5","key":"3133_CR17","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1007\/s12652-018-0800-9","volume":"10","author":"K Bhushan","year":"2019","unstructured":"Bhushan, K., Gupta, B.B.: Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment. J. Amb. Intell. Hum. Comput. 10(5), 1985\u20131997 (2019)","journal-title":"J. Amb. Intell. Hum. Comput."},{"key":"3133_CR18","doi-asserted-by":"crossref","unstructured":"Scott-Hayward, S., O'Callaghan, G., Sezer, S.: SDN security: A survey. In 2013 IEEE SDN For Future Networks and Services (SDN4FNS), pp. 1\u20137. IEEE (2013)","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"3133_CR19","unstructured":"Badotra, S., & Panda, S.N. Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. Cluster Computing, pp. 1\u201311"},{"issue":"3","key":"3133_CR20","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s11235-018-0475-8","volume":"70","author":"G Fernandes","year":"2019","unstructured":"Fernandes, G., Rodrigues, J.J., Carvalho, L.F., Al-Muhtadi, J.F., Proen\u00e7a, M.L.: A comprehensive survey on network anomaly detection. Telecommun. Syst. 70(3), 447\u2013489 (2019)","journal-title":"Telecommun. Syst."},{"issue":"12","key":"3133_CR21","doi-asserted-by":"publisher","first-page":"3655","DOI":"10.1007\/s00521-016-2317-5","volume":"28","author":"BB Gupta","year":"2017","unstructured":"Gupta, B.B., Badve, O.P.: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment. Neural Comput. Appl. 28(12), 3655\u20133682 (2017)","journal-title":"Neural Comput. Appl."},{"key":"3133_CR22","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 413\u2013424. ACM (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"3133_CR23","doi-asserted-by":"crossref","unstructured":"Piedrahita, A.F.M., Rueda, S., Mattos, D.M., & Duarte, O.C.M.: FlowFence: a denial of service defense system for software defined networking. In: 2015 Global Information Infrastructure and Networking Symposium (GIIS), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/GIIS.2015.7347185"},{"key":"3133_CR24","doi-asserted-by":"crossref","unstructured":"Ombase, P.M., Kulkarni, N.P., Bagade, S.T., Mhaisgawali, A.V.: DoS attack mitigation using rule based and anomaly based techniques in software defined networking. In: 2017 International Conference on Inventive Computing and Informatics (ICICI), pp. 469\u2013475. IEEE (2017)","DOI":"10.1109\/ICICI.2017.8365396"},{"key":"3133_CR25","doi-asserted-by":"crossref","unstructured":"You, X., Feng, Y., Sakurai, K.: Packet In message based DDoS attack detection in SDN network using OpenFlow. In: 2017 Fifth International Symposium on Computing and Networking (CANDAR), pp. 522\u2013528. IEEE (2017)","DOI":"10.1109\/CANDAR.2017.93"},{"key":"3133_CR26","unstructured":"Kia, M. (2015). Early Detection and Mitigation of DDoS Attacks in Software Defined Networks (Doctoral dissertation, Master\u2019s Thesis, Ryerson University, Toronto, ON, Canada)."},{"key":"3133_CR27","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., & St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications (ICNC), pp. 77\u201381. IEEE (2015)","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"3133_CR28","doi-asserted-by":"crossref","unstructured":"Xing, T., Huang, D., Xu, L., Chung, C.J., Khatkar, P.: Snortflow: Aopenflow-based intrusion prevention system in cloud environment. In: 2013 second GENI research and educational experiment workshop, pp. 89\u201392. IEEE (2013)","DOI":"10.1109\/GREE.2013.25"},{"key":"3133_CR29","doi-asserted-by":"crossref","unstructured":"Sahay, R., Blanc, G., Zhang, Z., Debar, H.: Towards autonomic DDoS mitigation using software defined networking (2015)","DOI":"10.14722\/sent.2015.23004"},{"key":"3133_CR30","doi-asserted-by":"crossref","unstructured":"Chowdhary, A., Pisharody, S., Alshamrani, A., Huang, D.: Dynamic game based security framework in SDN-enabled cloud networking environments. In: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, pp. 53\u201358. ACM (2017)","DOI":"10.1145\/3040992.3040998"},{"key":"3133_CR31","doi-asserted-by":"crossref","unstructured":"Jevtic, S., Lotfalizadeh, H., Kim, D.S.: Toward network-based ddos detection in software-defined networks. In: Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication, p. 40. ACM (2018)","DOI":"10.1145\/3164541.3164562"},{"key":"3133_CR32","unstructured":"Choi, Y.: Implementation of content-oriented networking architecture (CONA): a focus on DDoS countermeasure. In: Proceedings of European NetFPGA developers workshop (2010)"},{"key":"3133_CR33","doi-asserted-by":"crossref","unstructured":"Wang, R., Jia, Z., Ju, L.: An entropy-based distributed DDoS detection mechanism in software-defined networking. In: 2015 IEEE Trustcom\/BigDataSE\/ISPA, Vol. 1, pp. 310\u2013317. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.389"},{"issue":"3","key":"3133_CR34","doi-asserted-by":"publisher","first-page":"106","DOI":"10.3390\/info10030106","volume":"10","author":"P Manso","year":"2019","unstructured":"Manso, P., Moura, J., Serr\u00e3o, C.: SDN-based intrusion detection system for early detection and mitigation of DDoS attacks. Information 10(3), 106 (2019)","journal-title":"Information"},{"key":"3133_CR35","doi-asserted-by":"crossref","unstructured":"Ahalawat, A., Dash, S.S., Panda, A., Babu, K.S.: Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN. In: 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/ViTECoN.2019.8899721"},{"key":"3133_CR36","unstructured":"www.mininet.org. Accessed 02 Dec 2019"},{"issue":"5","key":"3133_CR37","first-page":"1105","volume":"8","author":"S Badotra","year":"2017","unstructured":"Badotra, S., Singh, J.: Open daylight as a controller for software defined networking. Int. J. Adv. Res. Comput. Sci. 8(5), 1105\u20131111 (2017)","journal-title":"Int. J. Adv. Res. Comput. Sci."},{"key":"3133_CR38","unstructured":"https:\/\/snort.org\/. Accessed 28 Dec 2019"},{"issue":"1","key":"3133_CR39","first-page":"229","volume":"99","author":"M Roesch","year":"1999","unstructured":"Roesch, M.: Snort: lightweight intrusion detection for networks. Lisa 99(1), 229\u2013238 (1999)","journal-title":"Lisa"},{"key":"3133_CR40","doi-asserted-by":"crossref","unstructured":"Gupta, A., Sharma, L.S.: Performance evaluation of snort and suricata intrusion detection systems on ubuntu server. In: Proceedings of ICRIC 2019, pp. 811\u2013821. Springer, Cham (2020)","DOI":"10.1007\/978-3-030-29407-6_58"},{"key":"3133_CR41","doi-asserted-by":"crossref","unstructured":"Shorey, T., Subbaiah, D., Goyal, A., Sakxena, A., Mishra, A. K.: Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 318\u2013322. IEEE (2018)","DOI":"10.1109\/ICACCI.2018.8554590"},{"issue":"3","key":"3133_CR42","first-page":"383","volume":"19","author":"S Behal","year":"2017","unstructured":"Behal, S., Kumar, K.: Characterization and comparison of DDoS attack tools and traffic generators: a review. IJ Netw. Security 19(3), 383\u2013393 (2017)","journal-title":"IJ Netw. Security"},{"key":"3133_CR43","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.jnca.2013.08.001","volume":"40","author":"N Hoque","year":"2014","unstructured":"Hoque, N., Bhuyan, M.H., Baishya, R.C., Bhattacharyya, D.K., Kalita, J.K.: Network attacks: taxonomy, tools and systems. J. Netw. Comput. Appl. 40, 307\u2013324 (2014)","journal-title":"J. Netw. Comput. Appl."},{"key":"3133_CR44","unstructured":"Guozi, S.U.N., Jiang, W., Yu, G.U., Danni, R.E.N., Huakang, L.I.: DDoS attacks and flash event detection based on flow characteristics in SDN. In: 2018 15th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS), pp. 1\u20136 (2018)"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03133-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-020-03133-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-020-03133-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,29]],"date-time":"2021-05-29T00:34:52Z","timestamp":1622248492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-020-03133-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,29]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3133"],"URL":"https:\/\/doi.org\/10.1007\/s10586-020-03133-y","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,29]]},"assertion":[{"value":"23 December 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2020","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}