{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T14:34:54Z","timestamp":1767969294069,"version":"3.49.0"},"reference-count":150,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Wireless Inf Networks"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1007\/s10776-022-00561-y","type":"journal-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T19:15:39Z","timestamp":1656011739000},"page":"314-340","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Security &amp; Privacy in Software Defined Networks, Issues, Challenges and Cost of Developed Solutions: A Systematic Literature Review"],"prefix":"10.1007","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4758-8265","authenticated-orcid":false,"given":"Naveed","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Kamalrulnizam Abu","family":"Bakar","sequence":"additional","affiliation":[]},{"given":"Fatima Tul","family":"Zuhra","sequence":"additional","affiliation":[]},{"given":"Tanzila","family":"Kehkashan","sequence":"additional","affiliation":[]},{"given":"Muhammad Akram","family":"Mujahid","sequence":"additional","affiliation":[]},{"given":"Muhammad Siraj","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Dawood","sequence":"additional","affiliation":[]},{"given":"Babangida","family":"Isyaku","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,6,23]]},"reference":[{"key":"561_CR1","doi-asserted-by":"crossref","unstructured":"S Ortiz (2013) Software-defined networking: On the verge of a breakthrough?\u201d Computer (Long. Beach. Calif)","DOI":"10.1109\/MC.2013.249"},{"issue":"4","key":"561_CR2","doi-asserted-by":"publisher","first-page":"e174715","DOI":"10.1371\/journal.pone.0174715","volume":"12","author":"A Abdelaziz","year":"2017","unstructured":"A. Abdelaziz, et al., Distributed controller clustering in software-defined networks, PLoS One, Vol. 12, No. 4, pp. e174715, 2017.","journal-title":"PLoS One"},{"key":"561_CR3","first-page":"11","volume":"2","author":"Open Networking Foundation","year":"2012","unstructured":"Open Networking Foundation, Software-defined networking: the new norm for networks [white paper]\u201d, ONF White Pap, Vol. 2, pp. 11, 2012.","journal-title":"ONF White Pap"},{"issue":"8","key":"561_CR4","doi-asserted-by":"publisher","first-page":"e0160375","DOI":"10.1371\/journal.pone.0160375","volume":"11","author":"NN Dao","year":"2016","unstructured":"N. N. Dao, J. Kim, M. Park and S. Cho, Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks\u201d, PLoS One, Vol. 11, No. 8, pp. e0160375, 2016.","journal-title":"PLoS One"},{"key":"561_CR5","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1016\/j.comcom.2015.09.013","volume":"77","author":"F Pakzad","year":"2016","unstructured":"F. Pakzad, M. Portmann, W. L. Tan and J. Indulska, Efficient topology discovery in OpenFlow-based Software Defined Networks, Comput. Commun., Vol. 77, pp. 52\u201361, 2016.","journal-title":"Comput. Commun."},{"key":"561_CR6","doi-asserted-by":"crossref","unstructured":"A. Al-Najjar, S. Layeghy, and M. Portmann (2016) Pushing SDN to the end- host, network load balancing using OpenFlow,\u201d in 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops","DOI":"10.1109\/PERCOMW.2016.7457129"},{"key":"561_CR7","unstructured":"H. S. Saini, R. Sayal, and S. S. Rawat (2019) Innovations in Computer Science and Engineering, vol. 32. Springer Singapore"},{"key":"561_CR8","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1007\/978-3-319-26362-5_20","volume":"9404","author":"H Bos","year":"2015","unstructured":"H. Bos, F. Monrose and G. Blanc, Research in attacks, intrusions, and defenses\u201d, Lect. Notes Comput. Sci., Vol. 9404, pp. 427\u2013447, 2015.","journal-title":"Lect. Notes Comput. Sci."},{"key":"561_CR9","unstructured":"R. Christian (2016) SDN Malware: problems of current protection systems and potential countermeasures,\u201d pp. 89\u2013100"},{"key":"561_CR10","unstructured":"S. Hogg (2014) SDN Security Attack Vectors and SDN Hardening | Network World,\u201d pp. 1\u20135"},{"issue":"6","key":"561_CR11","doi-asserted-by":"publisher","first-page":"3514","DOI":"10.1109\/TNET.2017.2748159","volume":"25","author":"C Yoon","year":"2017","unstructured":"C. Yoon, et al., Flow wars: systemizing the attack surface and defenses in software-defined networks, IEEE\/ACM Trans. Netw., Vol. 25, No. 6, pp. 3514\u20133530, 2017.","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"561_CR12","doi-asserted-by":"crossref","unstructured":"Z. Zhou and T. A. Benson (2019) Composing SDN Controller Enhancements with Mozart pp. 351\u2013363","DOI":"10.1145\/3357223.3362712"},{"key":"561_CR13","doi-asserted-by":"crossref","unstructured":"N. McKeown et al., (2008) OpenFlow: enabling innovation in campus networks,\u201d ACM SIGCOMM Comput. Commun. Rev.","DOI":"10.1145\/1355734.1355746"},{"key":"561_CR14","unstructured":"T. H. Nguyen and M. Yoo, (2017) Analysis of link discovery service attacks in SDN controller,\u201d Int. Conf. Inf. Netw., pp. 259\u2013261"},{"key":"561_CR15","doi-asserted-by":"crossref","unstructured":"S. Hong, L. Xu, H. Wang, and G. Gu, (2015) Poisoning network visibility in software-defined networks: new attacks and countermeasures","DOI":"10.14722\/ndss.2015.23283"},{"issue":"18","key":"561_CR16","doi-asserted-by":"publisher","first-page":"5803","DOI":"10.1002\/sec.1737","volume":"9","author":"K Benzekki","year":"2016","unstructured":"K. Benzekki, A. El Fergougui and A. Elbelrhiti Elalaoui, Software-defined networking (SDN): a survey\u201d, Secur. Commun. Networks, Vol. 9, No. 18, pp. 5803\u20135833, 2016.","journal-title":"Secur. Commun. Networks"},{"key":"561_CR17","doi-asserted-by":"crossref","unstructured":"Z. Hu, M. Wang, X. Yan, Y. Yin, and Z. Luo (2015) A comprehensive security architecture for SDN,\u201d in 2015 18th International Conference on Intelligence in Next Generation Networks, ICIN 2015","DOI":"10.1109\/ICIN.2015.7073803"},{"key":"561_CR18","doi-asserted-by":"crossref","unstructured":"A Sebbar, M Boulmalf, M Dafir Ech-Cherif El Kettani, and Y Badd (2018) Detection MITM Attack in Multi-SDN Controller,\u201d in Colloquium in Information Science and Technology, CIST","DOI":"10.1109\/CIST.2018.8596479"},{"key":"561_CR19","unstructured":"P. W. Chi, C. T. Kuo, J. W. Guo, and C. L. Lei (2015) How to detect a compromised SDN switch,\u201d in 1st IEEE conference on network softwarization: software-defined infrastructures for networks, clouds, IoT and Services, NETSOFT 2015"},{"issue":"2019","key":"561_CR20","doi-asserted-by":"publisher","first-page":"2581","DOI":"10.1016\/j.procs.2020.04.280","volume":"171","author":"A Pradhan","year":"2020","unstructured":"A. Pradhan and R. Mathew, Solutions to vulnerabilities and threats in software defined networking (SDN), Procedia Comput. Sci., Vol. 171, No. 2019, pp. 2581\u20132589, 2020.","journal-title":"Procedia Comput. Sci."},{"key":"561_CR21","unstructured":"Y. Meng, Z. Huang, S. Wang, G. Shen, and C. Ke (2020) SOM-based DDoS Defense Mechanism using SDN for the Internet of Things,\u201d 1\u201310"},{"issue":"4","key":"561_CR22","doi-asserted-by":"publisher","first-page":"3542","DOI":"10.1109\/COMST.2018.2839348","volume":"20","author":"AR Abdou","year":"2018","unstructured":"A. R. Abdou, P. C. Van Oorschot and T. Wan, Comparative analysis of control plane security of SDN and conventional networks, IEEE Commun. Surv. Tutorials, Vol. 20, No. 4, pp. 3542\u20133559, 2018.","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"561_CR23","doi-asserted-by":"crossref","unstructured":"T. Han et al., (2019) A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers,\u201d Concurr. Comput., pp. 3\u20135","DOI":"10.1002\/cpe.5300"},{"key":"561_CR24","doi-asserted-by":"crossref","unstructured":"H. Zhang, Z. Cai, Q. Liu, Q. Xiao, Y. Li, and C. F. Cheang (2018) A Survey on Security-Aware Measurement in SDN,\u201d Secur. Commun. Networks, 2018","DOI":"10.1155\/2018\/2459154"},{"key":"561_CR25","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"I. Ahmad, S. Namal and M. Ylianttila, Security in software defined networks: a survey, IEEE Communication Surveys & Tutorials, Vol. 17, pp. 4, 2015.","journal-title":"IEEE Communication Surveys & Tutorials"},{"key":"561_CR26","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2016.04.011","volume":"68","author":"Wenjuan Li","year":"2016","unstructured":"Wenjuan Li and Weizhi Meng, Lam For Kwok, A survey on OpenFlow-based software defined networks: security challenges and countermeasures, Journal of Network and Computer Applications, Vol. 68, pp. 126\u2013139, 2016.","journal-title":"Journal of Network and Computer Applications"},{"key":"561_CR27","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1016\/j.jnca.2016.04.011","volume":"68","author":"W Li","year":"2016","unstructured":"W. Li and W. Meng, A survey on OpenFlow-based Software Defined Networks: Security challenges and countermeasures, Journal of Network and Computer Applications, Vol. 68, pp. 126\u2013139, 2016.","journal-title":"Journal of Network and Computer Applications"},{"issue":"9","key":"561_CR28","doi-asserted-by":"publisher","first-page":"88","DOI":"10.3390\/fi10090088","volume":"10","author":"Vasileios Gkioulos","year":"2018","unstructured":"Vasileios Gkioulos, H\u00e5kon. Gunleifsen and Goitom K. Weldehawaryat, A Systematic literature review on military software defined networks, Future Internet, Vol. 10, No. 9, pp. 88, 2018.","journal-title":"Future Internet"},{"key":"561_CR29","first-page":"162","volume":"8","author":"W Hassan","year":"2019","unstructured":"W. Hassan, T. Chou and L. Xiaoming, Latest trends, challenges and solutions in security in the era of cloud computing and software defined networks, International Journal of Informatics and Communication Technology, Vol. 8, pp. 162, 2019.","journal-title":"International Journal of Informatics and Communication Technology"},{"key":"561_CR30","first-page":"16","volume":"32","author":"T Han","year":"2019","unstructured":"T. Han, S. R. U. Jan and T. Zhiyuan, A comprehensive survey of security threats and their mitigation techniques for next-generation SDN controllers, Concurrency Computat Pract Exper, Vol. 32, pp. 16, 2019.","journal-title":"Concurrency Computat Pract Exper"},{"key":"561_CR31","doi-asserted-by":"publisher","first-page":"7545","DOI":"10.1007\/s11227-020-03180-7","volume":"76","author":"A Shirmarz","year":"2020","unstructured":"A. Shirmarz and A. Ghaffari, Performance issues and solutions in SDN-based data center: a survey, J Supercomput, Vol. 76, pp. 7545\u20137593, 2020.","journal-title":"J Supercomput"},{"key":"561_CR32","unstructured":"Camilo, J., Chica, C., and Botero, J.F., Security in SDN: A comprehensive survey, Journal of Network and Computer Applications, 2020"},{"key":"561_CR33","doi-asserted-by":"crossref","unstructured":"Shaghaghi A., Kaafar M.A., Buyya R., Jha S. (2020) Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions. In: Gupta B., Perez G., Agrawal D., Gupta D. (eds) Handbook of Computer Networks and Cyber Security. Springer","DOI":"10.1007\/978-3-030-22277-2_14"},{"key":"561_CR34","doi-asserted-by":"publisher","first-page":"2593","DOI":"10.1007\/s11277-020-07812-2","volume":"116","author":"SK Keshari","year":"2021","unstructured":"S. K. Keshari, V. Kansal and S. Kumar, A Systematic Review of Quality of Services (QoS) in Software Defined Networking (SDN), Wireless Pers Commun, Vol. 116, pp. 2593\u20132614, 2021.","journal-title":"Wireless Pers Commun"},{"key":"561_CR35","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1007\/s10922-020-09575-4","volume":"29","author":"S Ahmad","year":"2021","unstructured":"S. Ahmad and A. H. Mir, Scalability, consistency, reliability and security in SDN controllers: a survey of diverse SDN Controllers, J Netw Syst Manage, Vol. 29, pp. 9, 2021.","journal-title":"J Netw Syst Manage"},{"key":"561_CR36","doi-asserted-by":"crossref","unstructured":"S. Matsumoto, S. Hitz, and A. Perrig (2014) Fleet: Defending SDNs from malicious administrators,\u201d HotSDN 2014 - Proc. ACM SIGCOMM 2014 Work. Hot Top. Softw. Defin. Netw., pp. 103\u2013108,","DOI":"10.1145\/2620728.2620750"},{"key":"561_CR37","unstructured":"S. Scott-Hayward, C. Kane, and S. Sezer, \u201cOperationCheckpoint: SDN application control,\u201d Proc. - Int. Conf. Netw. Protoc. ICNP, pp. 618\u2013623"},{"key":"561_CR38","doi-asserted-by":"crossref","unstructured":"P. Porras, S. Cheung, M. Fong, K. Skinner, and V. Yegneswaran, \u201cSecuring the Software Defined Network Control Layer,\u201d 2015","DOI":"10.14722\/ndss.2015.23222"},{"key":"561_CR39","doi-asserted-by":"crossref","unstructured":"K. Petersen, R. Feldt, S. Mujtaba, and M. Mattsson (2018) Systematic mapping studies in software engineering,\u201d in 12th International Conference on Evaluation and Assessment in Software Engineering, EASE 2008","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"561_CR40","doi-asserted-by":"crossref","unstructured":"A. Fernandez, E. Insfran, and S. Abrah\u00e3o, \u201cUsability evaluation methods for the web: A systematic mapping study,\u201d in Information and Software Technology, 2011","DOI":"10.1016\/j.infsof.2011.02.007"},{"issue":"1","key":"561_CR41","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1049\/cje.2017.12.002","volume":"28","author":"J Xia","year":"2019","unstructured":"J. Xia, Z. Cai, G. Hu and M. Xu, An active defense solution for arp spoofing in open flow network, Chinese J. Electron., Vol. 28, No. 1, pp. 172\u2013178, 2019.","journal-title":"Chinese J. Electron."},{"key":"561_CR42","doi-asserted-by":"publisher","first-page":"22764","DOI":"10.1109\/ACCESS.2017.2785236","volume":"6","author":"C Zhang","year":"2017","unstructured":"C. Zhang, et al., Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack, IEEE Access, Vol. 6, pp. 22764\u201322777, 2017.","journal-title":"IEEE Access"},{"key":"561_CR43","unstructured":"T. Park et al., \u201cDPX\u202f: Data-Plane eXtensions for SDN Security Service Instantiation"},{"issue":"5","key":"561_CR44","doi-asserted-by":"publisher","first-page":"8005","DOI":"10.1109\/JIOT.2019.2904123","volume":"6","author":"A Molina Zarca","year":"2019","unstructured":"A. Molina Zarca, et al., Security management architecture for NFV\/SDN-Aware IoT systems\u201d, IEEE Internet Things J., Vol. 6, No. 5, pp. 8005\u20138020, 2019.","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"561_CR45","doi-asserted-by":"publisher","first-page":"1577","DOI":"10.1109\/TNET.2018.2845463","volume":"26","author":"A Destounis","year":"2018","unstructured":"A. Destounis, et al., Minimum Cost SDN Routing With Reconfiguration Frequency Constraints, IEEE\/ACM Transactions on Networking, Vol. 26, No. 4, pp. 1577\u20131590, 2018.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"561_CR46","first-page":"3309","volume":"25","author":"Z Su","year":"2019","unstructured":"Z. Su and L. Wang, \u201cCFlam\u202f: cost-effective flow latency monitoring system for software defined networks\u201d, 2019 IEEE 20th Int, Conf. High Perform. Switch. Routing, Vol. 25, pp. 3309\u20133322, 2019.","journal-title":"Conf. High Perform. Switch. Routing"},{"issue":"6","key":"561_CR47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TNET.2017.2728642","volume":"25","author":"K Kogan","year":"2017","unstructured":"K. Kogan, S. I. Nikolenko, P. Eugster, A. Shalimov and O. Rottenstreich, \u201cDistributed Platforms, IEEE\/ACM Trans. Networking, Vol. 25, No. 6, pp. 1\u201314, 2017.","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"561_CR48","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.jnca.2016.04.005","volume":"68","author":"Y Cui","year":"2016","unstructured":"Y. Cui, et al., Author \u2019 s Accepted Manuscript SD-Anti-DDoS\u202f: Fast and Efficient DDoS defense in software-defined networks reference, J. Netw. Comput. Appl., Vol. 68, pp. 65\u201379, 2016.","journal-title":"J. Netw. Comput. Appl."},{"issue":"4","key":"561_CR49","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MNET.2018.1700283","volume":"32","author":"S Gao","year":"2018","unstructured":"S. Gao, Z. Li, B. Xiao and G. Wei, Security threats in the data plane of software-defined networks, IEEE Netw., Vol. 32, No. 4, pp. 108\u2013113, 2018.","journal-title":"IEEE Netw."},{"issue":"10","key":"561_CR50","doi-asserted-by":"publisher","first-page":"2358","DOI":"10.1109\/JSAC.2018.2869997","volume":"36","author":"K Kalkan","year":"2018","unstructured":"K. Kalkan, L. Altay, G. G\u00fcr and F. Alag\u00f6z, JESS: joint entropy-based DDoS defense scheme in SDN, IEEE J. Sel. Areas Commun., Vol. 36, No. 10, pp. 2358\u20132372, 2018.","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"561_CR51","doi-asserted-by":"crossref","unstructured":"Y. Park, S. Y. Chang, and L. M. Krishnamurthy, \u201cWatermarking for detecting freeloader misbehavior in software-defined networks,\u201d 2016 Int. Conf. Comput. Netw. Commun. ICNC 2016, 2016","DOI":"10.1109\/ICCNC.2016.7440628"},{"key":"561_CR52","doi-asserted-by":"crossref","unstructured":"S. Midha and K. Triptahi, \u201cExtended TLS security and defensive algorithm in openflow SDN,\u201d Proc. 9th Int. Conf. Cloud Comput. Data Sci. Eng. Conflu. 2019: 141\u2013146, 2019","DOI":"10.1109\/CONFLUENCE.2019.8776607"},{"key":"561_CR53","doi-asserted-by":"crossref","unstructured":"H. Xu, Z. Yu, C. Qian, and X. Li (2017) Minimizing Flow Statistics Collection Cost of SDN Using Wildcard Requests,\u201d pp. 1\u20139","DOI":"10.1109\/INFOCOM.2017.8056992"},{"key":"561_CR54","doi-asserted-by":"crossref","unstructured":"H. Shafiq, R. A. Rehman, and B. S. Kim (2018) Services and Security Threats in SDN Based VANETs: A Survey,\u201d Wirel. Commun. Mob. Comput., 2018","DOI":"10.1155\/2018\/8631851"},{"key":"561_CR55","doi-asserted-by":"crossref","unstructured":"C. Yoon, P. Porras, M. Fong, B. O. Connor, and T. Vachuska A Security-Mode for Carrier-Grade SDN Controllers,\u201d pp. 461\u2013473","DOI":"10.1145\/3134600.3134603"},{"key":"561_CR56","doi-asserted-by":"crossref","unstructured":"M. Suh, S. H. Park, B. Lee, and S. Yang, \u201cBuilding firewall over the software-defined network controller,\u201d Int. Conf. Adv. Commun. Technol. ICACT, pp. 744\u2013748, 2014","DOI":"10.1109\/ICACT.2014.6779061"},{"issue":"1","key":"561_CR57","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","volume":"21","author":"I Farris","year":"2019","unstructured":"I. Farris, T. Taleb, Y. Khettab and J. Song, A survey on emerging SDN and NFV security mechanisms for IoT systems, IEEE Commun. Surv. Tutorials, Vol. 21, No. 1, pp. 812\u2013837, 2019.","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"April","key":"561_CR58","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/j.jnca.2017.04.016","volume":"91","author":"TV Phan","year":"2017","unstructured":"T. V. Phan, N. K. Bao and M. Park, Distributed-SOM: A novel performance bottleneck handler for large-sized software-defined networks under flooding attacks, J. Netw. Comput. Appl., Vol. 91, No. April, pp. 14\u201325, 2017.","journal-title":"J. Netw. Comput. Appl."},{"key":"561_CR59","doi-asserted-by":"publisher","first-page":"116358","DOI":"10.1109\/ACCESS.2019.2924633","volume":"7","author":"LA Trejo","year":"2019","unstructured":"L. A. Trejo, V. Ferman, M. A. Medina-P\u00e9rez, F. M. Arredondo Giacinti, R. Monroy and J. E. Ramirez-Marquez, DNS-ADVP: A machine learning anomaly detection and visual platform to protect top-level domain name servers against DDoS attacks\u201d, IEEE Access, Vol. 7, pp. 116358\u2013116369, 2019.","journal-title":"IEEE Access"},{"issue":"10","key":"561_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/electronics8101095","volume":"8","author":"Z Shah","year":"2019","unstructured":"Z. Shah and S. Cosgrove, Mitigating arp cache poisoning attack in software-defined networking (sdn): A survey, Electron., Vol. 8, No. 10, pp. 1\u201326, 2019.","journal-title":"Electron."},{"key":"561_CR61","doi-asserted-by":"crossref","unstructured":"A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, \u201cOrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions,\u201d IEEE\/IFIP NOMS 2014 - IEEE\/IFIP Netw. Oper. Manag. Symp. Manag. a Softw. Defin. World, no. May, 2014","DOI":"10.1109\/NOMS.2014.6838409"},{"key":"561_CR62","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-981-10-6872-0_23","volume":"563","author":"S Ahmed","year":"2018","unstructured":"S. Ahmed and N. Medhi, A flow marking based anti-spoofing Mechanism (FMAS) using SDN approach, Adv. Intell. Syst. Comput., Vol. 563, pp. 245\u2013255, 2018.","journal-title":"Adv. Intell. Syst. Comput."},{"key":"561_CR63","doi-asserted-by":"crossref","unstructured":"J. Zhou, J. N. B, and Y. Rao (2017) Block-based convolutional neural network. nternational Workshop on Digital Watermarking 1: 65\u201376","DOI":"10.1007\/978-3-319-64185-0_6"},{"key":"561_CR64","doi-asserted-by":"crossref","unstructured":"S. Shin, L. Xu, S. Hong, and G. Gu (2016) Enhancing Network Security through Software Defined Networking (SDN),\u201d 2016 25th Int. Conf. Comput. Commun. Networks, ICCCN 2016","DOI":"10.1109\/ICCCN.2016.7568520"},{"issue":"1","key":"561_CR65","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13640-017-0242-x","volume":"2018","author":"N Noceti","year":"2018","unstructured":"N. Noceti, L. Zini and F. Odone, A multi-camera system for damage and tampering detection in a postal security framework, Eurasip J. Image Video Process., Vol. 2018, No. 1, pp. 1\u201313, 2018.","journal-title":"Eurasip J. Image Video Process."},{"key":"561_CR66","unstructured":"P. Ahmad, S. Jacob, and R. Khondoker, \u201cSecurity Analysis of SDN Applications for Big Data"},{"key":"561_CR67","unstructured":"K. Benton, L. J. Camp, and C. Small, \u201cOpenFlow Vulnerability Assessment Categories and Subject Descriptors,\u201d Proc. Second ACM SIGCOMM Work. Hot Top. Softw. Defin. Netw. - HotSDN \u201913, pp. 151"},{"key":"561_CR68","unstructured":"P. Kazemian, M. Chang, H. Zeng, G. Varghese, N. McKeown, and S. Whyte, \u201cReal time network policy checking using header space analysis,\u201d Proc. 10th USENIX Symp. Networked Syst. Des. Implementation, NSDI 2013, pp. 99\u2013111, 2019"},{"key":"561_CR69","doi-asserted-by":"crossref","unstructured":"S Shin G Gu Attacking software-defined networks: A first feasibility study\u201d, HotSDN 2013 - Proc. 2013 ACM SIGCOMM Work Hot Top. Softw. Defin. Netw. 3 165\u2013166 2013","DOI":"10.1145\/2491185.2491220"},{"key":"561_CR70","doi-asserted-by":"crossref","unstructured":"S. Shin, V. Yegneswaran, P. Porras, and G. Gu, (2013) AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks,\u201d Proc. ACM Conf. Comput. Commun. Secur., 413\u2013424, 2013","DOI":"10.1145\/2508859.2516684"},{"key":"561_CR71","unstructured":"J. Moura and D. Hutchison (2020) Resilient Cyber-Physical Systems: Using NFV Orchestration,\u201d pp. 1\u201313"},{"key":"561_CR72","doi-asserted-by":"crossref","unstructured":"M. Niemiec, P. Jaglarz, M. Jekot, P. Cho\u0142da, and P. Bory\u0142o, \u201cRisk Assessment Approach to Secure Northbound Interface of SDN Networks,\u201d pp. 164\u2013169, 2019","DOI":"10.1109\/ICCNC.2019.8685486"},{"key":"561_CR73","first-page":"701","volume":"2019","author":"Y Tian","year":"2019","unstructured":"Y. Tian, V. Tran and M. Kuerban, \u201cDOS Attack mitigation strategies on SDN controller\u201d, 2019 IEEE 9th Annu, Comput. Commun. Work. Conf. CCWC, Vol. 2019, pp. 701\u2013707, 2019.","journal-title":"Comput. Commun. Work. Conf. CCWC"},{"key":"561_CR74","doi-asserted-by":"crossref","unstructured":"V. Sridharan, K. S. K. Liyanage, and M. Gurusamy, \u201cPrivacy-Aware Switch-Controller Mapping in SDN-Based IoT Networks,\u201d 2020 Int. Conf. Commun. Syst. NETworkS, COMSNETS 2020, pp. 1\u20136","DOI":"10.1109\/COMSNETS48256.2020.9027467"},{"issue":"4","key":"561_CR75","first-page":"1","volume":"2019","author":"MM Alshaer","year":"2019","unstructured":"M. M. Alshaer, M. Al-Akhras and A. Albesher, IEEE World Conf, Complex Syst. WCCS, Vol. 2019, No. 4, pp. 1\u20135, 2019.","journal-title":"Complex Syst. WCCS"},{"key":"561_CR76","first-page":"77","volume":"2015","author":"SM Mousavi","year":"2015","unstructured":"S. M. Mousavi and M. St-Hilaire, \u201cEarly detection of DDoS attacks against SDN controllers\u201d, 2015 Int, Conf. Comput. Netw. Commun. ICNC, Vol. 2015, pp. 77\u201381, 2015.","journal-title":"Conf. Comput. Netw. Commun. ICNC"},{"key":"561_CR77","first-page":"83","volume":"15\u201317","author":"NM Sahri","year":"2016","unstructured":"N. M. Sahri and K. Okamura, Protecting DNS services from IP spoofing-SDN collaborative authentication approach, ACM Int. Conf. Proceeding Ser., Vol. 15\u201317, pp. 83\u201389, 2016.","journal-title":"ACM Int. Conf. Proceeding Ser."},{"key":"561_CR78","first-page":"374","volume":"2018","author":"R Skowyra","year":"2018","unstructured":"R. Skowyra, et al., Effective topology tampering attacks and defenses in Software-Defined networks\u201d, Proc. - 48th Annu. IEEE\/IFIP Int. Conf. Dependable Syst, Networks, DSN, Vol. 2018, pp. 374\u2013385, 2018.","journal-title":"Networks, DSN"},{"key":"561_CR79","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-020-03180-7","volume-title":"Performance issues and solutions in SDN- based data center: a survey","author":"A Shirmarz","year":"2020","unstructured":"A. Shirmarz and A. Ghaffari, Performance issues and solutions in SDN- based data center: a survey, Springer, US, 2020."},{"key":"561_CR80","unstructured":"M. Li, X. Wang, H. Tong, T. Liu, and Y. Tian, \u201cSPARC: Towards a scalable distributed control plane architecture for protocol-oblivious SDN"},{"key":"561_CR81","unstructured":"W. Rankothge (2019) Past before future: a comprehensive review on software defined networks road map 19: 1"},{"key":"561_CR82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101597","volume":"87","author":"H Hu","year":"2019","unstructured":"H. Hu, et al., Towards a reliable firewall for software-defined networks, Comput. Secur., Vol. 87, 101597, 2019.","journal-title":"Comput. Secur."},{"key":"561_CR83","doi-asserted-by":"crossref","unstructured":"R. Beckett, X. K. Zou, S. Zhang, S. Malik, J. Rexford, and D. Walker An assertion language for debugging SDN applications,\u201d HotSDN 2014 - Proc. ACM SIGCOMM 2014 Work. Hot Top. Softw. Defin. Netw., pp. 91\u201396, 2014","DOI":"10.1145\/2620728.2620743"},{"key":"561_CR84","doi-asserted-by":"crossref","unstructured":"A. Al-Alaj, R. Sandhu, and R. Krishnan, \u201cA formal access control model for SE-floodlight controller,\u201d SDN-NFV 2019 - Proc. ACM Int. Work. Secur. Softw. Defin. Networks Netw. Funct","DOI":"10.1145\/3309194.3309195"},{"issue":"126\u2013133","key":"561_CR85","first-page":"2016","volume":"2015","author":"LV Morales","year":"2015","unstructured":"L. V. Morales, A. F. Murillo, S. J. Rueda and \u201cExtending the floodlight controller\u201d, Proc. -, IEEE 14th Int, Symp. Netw. Comput. Appl. NCA, Vol. 2015, No. 126\u2013133, pp. 2016, 2015.","journal-title":"Symp. Netw. Comput. Appl. NCA"},{"key":"561_CR86","doi-asserted-by":"crossref","unstructured":"E. Al-Shaer and S. Al-Haj (2010) FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures,\u201d Proc. ACM Conf. Comput. Commun. Secur., 37\u201344","DOI":"10.1145\/1866898.1866905"},{"key":"561_CR87","doi-asserted-by":"crossref","unstructured":"G. N. Nde and R. Khondoker (2016) SDN testing and debugging tools: A survey,\u201d 2016 5th Int. Conf. Informatics, Electron. Vision, ICIEV 2016, pp. 631\u2013635","DOI":"10.1109\/ICIEV.2016.7760078"},{"key":"561_CR88","first-page":"933","volume":"2015","author":"P Fonseca","year":"2012","unstructured":"P. Fonseca, R. Bennesby, E. Mota and A. Passito, A replication component for resilient OpenFlow-based networking\u201d, Proc. 2012 IEEE Netw, Oper. Manag. Symp. NOMS, Vol. 2015, pp. 933\u2013939, 2012.","journal-title":"Oper. Manag. Symp. NOMS"},{"issue":"2","key":"561_CR89","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1007\/s12083-017-0630-0","volume":"12","author":"N Sultana","year":"2019","unstructured":"N. Sultana, N. Chilamkurti, W. Peng and R. Alhadad, Survey on SDN based network intrusion detection system using machine learning approaches, Peer-to-Peer Netw. Appl., Vol. 12, No. 2, pp. 493\u2013501, 2019.","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"561_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.comcom.2018.10.007","volume":"133","author":"H Maziku","year":"2019","unstructured":"H. Maziku, S. Shetty and D. M. Nicol, Security risk assessment for SDN-enabled smart grids, Comput. Commun., Vol. 133, pp. 1\u201311, 2019.","journal-title":"Comput. Commun."},{"key":"561_CR91","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22277-2_14","volume-title":"Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions\u201d","author":"A Shaghaghi","year":"2020","unstructured":"A. Shaghaghi, M. A. Kaafar, R. Buyya and S. Jha, Software-Defined Network (SDN) Data Plane Security: Issues, Solutions, and Future Directions\u201d, Comput. Networks Cyber Secur, Handb, 2020. https:\/\/doi.org\/10.1007\/978-3-030-22277-2_14."},{"key":"561_CR92","doi-asserted-by":"crossref","unstructured":"S. R. Chowdhury, F. Bari, R. Ahmed, and R. Boutaba (2014) PayLess\u202f: A Low Cost Network Monitoring Framework for Software Defined Networks","DOI":"10.1109\/NOMS.2014.6838227"},{"issue":"4","key":"561_CR93","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/fi11040085","volume":"11","author":"J Yao","year":"2019","unstructured":"J. Yao, Z. Han, M. Sohail and L. Wang, A robust security architecture for SDN-based 5G networks, Futur. Internet, Vol. 11, No. 4, pp. 1\u201314, 2019.","journal-title":"Futur. Internet"},{"issue":"2015","key":"561_CR94","first-page":"19","volume":"85","author":"C Yoon","year":"2016","unstructured":"C. Yoon, T. Park, S. Lee, H. Kang and S. Shin, Enabling security functions with SDN\u202f: A feasibility study, Comput. Networks, Vol. 85, No. 2015, pp. 19\u201335, 2016.","journal-title":"Comput. Networks"},{"key":"561_CR95","doi-asserted-by":"crossref","unstructured":"H. Hu, W. Han, G. Ahn, and Z. Zhao (2014) F LOW G UARD\u202f: Building Robust Firewalls for Software-Defined Networks 97\u2013102","DOI":"10.1145\/2620728.2620749"},{"key":"561_CR96","doi-asserted-by":"crossref","unstructured":"M. Wang, J. Liu, J. Chen, X. Liu, and J. Mao (2016) PERM-GUARD\u202f: Authenticating the validity of flow rules in software defined networking,\u201d J. Signal Process. Syst., 37","DOI":"10.1109\/CSCloud.2015.89"},{"issue":"7","key":"561_CR97","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/s20071882","volume":"20","author":"SN Matheu","year":"2020","unstructured":"S. N. Matheu, et al., Security architecture for defining and enforcing security profiles in DLT\/SDN-based IoT systems, Sensors (Switzerland), Vol. 20, No. 7, pp. 1\u201333, 2020.","journal-title":"Sensors (Switzerland)"},{"key":"561_CR98","doi-asserted-by":"crossref","unstructured":"Z. Zhao, D. Gong, B. Lu, F. Liu, and C. Zhang (2016) SDN-based double hopping communication against sniffer attack","DOI":"10.1155\/2016\/8927169"},{"key":"561_CR99","unstructured":"M. Andreoni, L. Diogo, M. Ferrazani, and O. C. M. B. Duarte (2016) An elastic intrusion detection system for software networks,\u201d Ann. Telecommun"},{"key":"561_CR100","doi-asserted-by":"crossref","unstructured":"X. Chen and S. Yu, (2015) CIPA\u202f: A Collaborative Intrusion Prevention Architecture for Programmable Network and SDN,\u201d Comput. Secur","DOI":"10.1016\/j.cose.2015.11.008"},{"key":"561_CR101","doi-asserted-by":"crossref","unstructured":"J. Sonchack, A. J. Aviv, E. Keller, and J. M. Smith (2015) Poster\u202f: OFX\u202f: Enabling OpenFlow Extensions for Switch-Level Security Applications pp.1678\u20131680","DOI":"10.1145\/2810103.2810120"},{"key":"561_CR102","doi-asserted-by":"crossref","unstructured":"M. Dhawan (2015) S PHINX\u202f: detecting security attacks in software-defined networks,\u201d no. 8\u201311","DOI":"10.14722\/ndss.2015.23064"},{"key":"561_CR103","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1016\/j.comnet.2015.02.026","volume":"81","author":"B Wang","year":"2015","unstructured":"B. Wang, Y. Zheng, W. Lou and Y. T. Hou, DDoS attack protection in the era of cloud computing and software-defined networking, Comput. NETWORKS, Vol. 81, pp. 308\u2013319, 2015.","journal-title":"Comput. NETWORKS"},{"key":"561_CR104","doi-asserted-by":"crossref","unstructured":"S. Fichera, L. Galluccio, S. C. Grancagnolo, G. Morabito, and S.Palazzo (2015) OPERETTA\u202f: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers,\u201d Comput. Networks","DOI":"10.1016\/j.comnet.2015.08.038"},{"key":"561_CR105","doi-asserted-by":"crossref","unstructured":"J. W. Kang, S. H. Park, and J. You (2015) Mynah\u202f: enabling lightweight data plane authentication for SDN controllers","DOI":"10.1109\/ICCCN.2015.7288433"},{"key":"561_CR106","doi-asserted-by":"crossref","unstructured":"M. S. H. Ll, G. A. I. E, J. I. V\u00e9lez, and L. C. O (2016) Distributed Denial of Service (DDoS) Attacks Detection Using Machine Learning Prototype,\u201d pp.33\u201341","DOI":"10.1007\/978-3-319-40162-1_4"},{"key":"561_CR107","doi-asserted-by":"crossref","unstructured":"Kaur S., Kumar K., Aggarwal N. (2021) A Review of Security Threats in Software-Defined Networking. In: Singh B., Coello Coello C.A., Jindal P., Verma P. (eds) Intelligent Computing and Communication Systems. Algorithms for Intelligent Systems. Springer, Singapore","DOI":"10.1007\/978-981-16-1295-4_13"},{"key":"561_CR108","doi-asserted-by":"crossref","unstructured":"K. Phemius, M. Bouet, and J. Leguay, \u201cDISCO: Distributed SDN controllers in a multi-domain environment,\u201d in Proc. IEEE NOMS, May 2014, pp. 1\u20132","DOI":"10.1109\/NOMS.2014.6838273"},{"key":"561_CR109","doi-asserted-by":"crossref","unstructured":"K. Phemius, M. Bouet, and J. Leguay, \u201cDISCO: Distributed multidomain SDN controllers in Proc. IEEE NOMS, May 2014, pp. 1\u20134","DOI":"10.1109\/NOMS.2014.6838330"},{"key":"561_CR110","doi-asserted-by":"crossref","unstructured":"E. Al-Shaer and S. Al-Haj, FlowChecker: Configuration analysis and verification of federated openflow infrastructures in Proc. 3rd ACM Workshop SafeConfig, 2015, pp. 37\u201344","DOI":"10.1145\/1866898.1866905"},{"key":"561_CR111","unstructured":"P. Porras et al., A security enforcement kernel for OpenFlow networks,\u201d in Proc. 1st Workshop HotSDN, 2016, pp. 121\u2013126"},{"key":"561_CR112","doi-asserted-by":"crossref","unstructured":"N. L. van Adrichem, C. Doerr, and F. A. Kuipers, \u201cOpenNetMon: Network monitoring in OpenFlow software-defined networks,\u201d in Proc. IEEE NOMS, May 2014, pp. 1\u20138","DOI":"10.1109\/NOMS.2014.6838228"},{"key":"561_CR113","doi-asserted-by":"crossref","unstructured":"S. R. Chowdhury, M. Bari, R. Ahmed, and R. Boutaba, \u201cPayLess: A low cost network monitoring framework for software defined networks,\u201d in Proc. IEEE NOMS, 2014, pp. 1\u20139","DOI":"10.1109\/NOMS.2014.6838227"},{"key":"561_CR114","doi-asserted-by":"crossref","unstructured":"K. Wang, Y. Qi, B. Yang, Y. Xue, and J. Li, \u201cLiveSec: Towards effective security management in large-scale production networks,\u201d in Proc. ICDCSW, Jun. 2015, pp. 451\u2013460","DOI":"10.1109\/ICDCSW.2012.87"},{"key":"561_CR115","doi-asserted-by":"crossref","unstructured":"X. Liu, H. Xue, X. Feng, and Y. Dai, \u201cDesign of the multi-level security network switch system which restricts covert channel,\u201d in Proc. IEEE 3rd ICCSN, May 2016, pp. 233\u2013237","DOI":"10.1109\/ICCSN.2011.6013582"},{"key":"561_CR116","unstructured":"A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, \u201cOrchSec: An orchestrator-based architecture for enhancing network-security using network monitoring and SDN control functions,\u201d in Proc. IEEE NOMS, May 2017, pp. 1\u20139"},{"key":"561_CR117","doi-asserted-by":"crossref","unstructured":"P. Fonseca, R. Bennesby, E. Mota, and A. Passito, \u201cA replication component for resilient OpenFlow-based networking,\u201d in Proc. IEEE NOMS, Apr. 2016, pp. 933\u2013939","DOI":"10.1109\/NOMS.2012.6212011"},{"key":"561_CR118","doi-asserted-by":"crossref","unstructured":"P. Smith, A. Schaeffer-Filho, D. Hutchison, and A. Mauthe, \u201cManagement patterns: SDN-enabled network resilience management,\u201d in Proc. IEEE NOMS, May 2017, pp. 1\u20139","DOI":"10.1109\/NOMS.2014.6838323"},{"key":"561_CR119","unstructured":"M. Suh, S. H. Park, B. Lee, and S. Yang, \u201cBuilding firewall over the software-defined network controller,\u201d in Proc. 16th ICACT, Feb. 2016, pp. 744\u2013748"},{"key":"561_CR120","doi-asserted-by":"crossref","unstructured":"M. Koerner and O. Kao, \u201cOftables: A distributed packet filter,\u201d in Proc. 6th Int. Conf. COMSNETS, Jan. 2017, pp. 1\u20134","DOI":"10.1109\/COMSNETS.2014.6734922"},{"key":"561_CR121","unstructured":"Hao, T. Lakshman, S. Mukherjee, and H. Song, \u201cSecure cloud computing with a virtualized network infrastructure,\u201d in Proc. 2nd USENIX Conf. Hot Topics Cloud Comput., 2016, 16"},{"key":"561_CR122","unstructured":"H. Hu, W. Han, G.-J. Ahn, and Z. Zhao, \u201cFLOWGUARD: building robust firewalls for software-defined networks,\u201d in Proc. 3rd Workshop Topics Softw. Defined Netw., 2017, 97\u2013102."},{"key":"561_CR123","doi-asserted-by":"crossref","unstructured":"E. Maccherani et al., \u201cExtending the NetServ autonomic management capabilities using OpenFlow,\u201d in Proc. IEEE NOMS, Apr. 2012, pp. 582\u2013585","DOI":"10.1109\/NOMS.2012.6211961"},{"key":"561_CR124","unstructured":"T. Xing, D. Huang, L. Xu, C.-J. Chung, and P. Khatkar (2016) SnortFlow: A openflow-based intrusion prevention system in cloud environment,\u201d in Proc. 2nd GREE, Mar. 89\u201392"},{"key":"561_CR125","unstructured":"S. Shirali-Shahreza and Y. Ganjali (2015) Empowering software defined network controller with packet-level information,\u201d in Proc. IEEE ICC, pp. 1335\u20131339"},{"key":"561_CR126","unstructured":"S. Shirali-Shahreza and Y. Ganjali, (2015) Efficient implementation of security applications in openflow controller with flexam,\u201d in Proc. IEEE 21st Annu. Symp. HOTI, 49\u201354"},{"issue":"4","key":"561_CR127","doi-asserted-by":"publisher","first-page":"2102","DOI":"10.1109\/JIOT.2020.3017354","volume":"8","author":"J Hu","year":"2021","unstructured":"J. Hu, M. Reed, N. Thomos and M. F. AI-Naday and K. Yang, Securing SDN-Controlled IoT Networks Through Edge Blockchain, IEEE Internet of Things Journal, Vol. 8, No. 4, pp. 2102\u20132115, 2021.","journal-title":"IEEE Internet of Things Journal"},{"key":"561_CR128","doi-asserted-by":"crossref","unstructured":"T. Hasan, A. Adnan, T. Giannetsos and J. Malik, \"Orchestrating SDN Control Plane towards Enhanced IoT Security,\" 2020 6th IEEE Conference on Network Softwarization (NetSoft), 2020","DOI":"10.1109\/NetSoft48620.2020.9165424"},{"key":"561_CR129","doi-asserted-by":"publisher","first-page":"918","DOI":"10.3390\/electronics10080918","volume":"10","author":"D Javeed","year":"2021","unstructured":"D. Javeed, T. Gao and M. T. Khan, SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT, Electronics, Vol. 10, pp. 918, 2021.","journal-title":"Electronics"},{"key":"561_CR130","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1016\/j.compeleceng.2020.106738","volume":"86","author":"Marcos V.O. de Assis","year":"2020","unstructured":"Marcos V.O.. de Assis, Luiz F. Carvalho, Joel J.P.C.. Rodrigues, Jaime Lloret and Mario L. Proen\u00e7a Jr, Near real-time security system applied to SDN environments in IoT networks using convolutional neural network, Computers & Electrical Engineering, Vol. 86, pp. 1067, 2020.","journal-title":"Computers & Electrical Engineering"},{"key":"561_CR131","unstructured":"Mevlut Serkan Tok, Mehmet Demirci (2021) Security analysis of SDN controller-based DHCP services and attack mitigation with DHCP guard, Computers & Security"},{"key":"561_CR132","doi-asserted-by":"crossref","unstructured":"I. Akbari, E. Tahoun, M. A. Salahuddin, N. Limam and R. Boutaba (2020) ATMoS: Autonomous Threat Mitigation in SDN using Reinforcement Learning NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium pp. 1\u20139","DOI":"10.1109\/NOMS47738.2020.9110426"},{"key":"561_CR133","doi-asserted-by":"crossref","unstructured":"Revathi, M., Ramalingam, V.V. & Amutha, B. A Machine Learning Based Detection and Mitigation of the DDOS Attack by Using SDN Controller Framework. Wireless Pers Commun (2021)","DOI":"10.1007\/s11277-021-09071-1"},{"issue":"2","key":"561_CR134","doi-asserted-by":"publisher","first-page":"1430","DOI":"10.1109\/TNSM.2021.3050148","volume":"18","author":"AHM Jakaria","year":"2021","unstructured":"A. H. M. Jakaria, M. A. Rahman and A. Gokhale, Resiliency-Aware Deployment of SDN in Smart Grid SCADA: A Formal Synthesis Model in, IEEE Transactions on Network and Service Management, Vol. 18, No. 2, pp. 1430\u20131444, 2021.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"561_CR135","doi-asserted-by":"crossref","unstructured":"H. Jo, J. Nam, and S. Shin (2018) NOSArmor: Building a Secure Network Operating System,\u201d Secure. Commun. Networks 2018","DOI":"10.1155\/2018\/9178425"},{"key":"561_CR136","doi-asserted-by":"crossref","unstructured":"S. ZHANG, X. MENG, and L. WANG (2017) SDNForensics: A Comprehensive Forensics Framework for Software Defined Network,\u201d 54: 92\u201399","DOI":"10.2991\/cnct-16.2017.13"},{"key":"561_CR137","doi-asserted-by":"crossref","unstructured":"S. Lee, C. Yoon, C. Lee, S. Shin, V. Yegneswaran, and P. Porras, \u201cDELTA: A Security Assessment Framework for Software-Defined Networks 2017.","DOI":"10.14722\/ndss.2017.23457"},{"issue":"5","key":"561_CR138","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MSP.2018.3761717","volume":"16","author":"D Kreutz","year":"2018","unstructured":"D. Kreutz, J. Yu, P. Esteves-Verissimo, C. Magalhaes and F. M. V. Ramos, The KISS principle in software-defined networking: A framework for secure communications, IEEE Secure. Priv., Vol. 16, No. 5, pp. 60\u201370, 2018.","journal-title":"IEEE Secure. Priv."},{"key":"561_CR139","doi-asserted-by":"crossref","unstructured":"N. Gray, T. Zinner, and P. Tran-Gia, \u201cEnhancing SDN security by device fingerprinting,\u201d Proc. IM 2017 - 2017 IFIP\/IEEE Int. Symp. Integer. Netw. Serv. Manag., pp. 879\u2013880, 2017","DOI":"10.23919\/INM.2017.7987393"},{"key":"561_CR140","first-page":"1","volume-title":"Leveraging SDN to improve security in industrial networks","author":"M Cheminod","year":"2017","unstructured":"M. Cheminod, L. Durante, L. Seno, F. Valenza, A. Valenzano and C. Zunino, Leveraging SDN to improve security in industrial networks, pp. 1\u20137, IEEE Int. Work. Fact. Commun. Syst. - Proceedings, WFCS, 2017."},{"issue":"1","key":"561_CR141","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/MCOM.2018.1700662","volume":"56","author":"S Hyun","year":"2018","unstructured":"S. Hyun, et al., Interface to network security functions for cloud-based security services, IEEE Commun. Mag., Vol. 56, No. 1, pp. 171\u2013178, 2018.","journal-title":"IEEE Commun. Mag."},{"issue":"2","key":"561_CR142","first-page":"65","volume":"8","author":"W Lee","year":"2017","unstructured":"W. Lee and N. Kim, Security policy scheme for an efficient security architecture in software-defined networking\u201d, Inf., Vol. 8, No. 2, pp. 65, 2017.","journal-title":"Inf."},{"key":"561_CR143","doi-asserted-by":"crossref","unstructured":"L. Gifre, B. Shariati, and L. Velasco (2018) Experimental Demonstration of Active and Passive Optical Networks Telemetry,\u201d pp. 2017\u20132019","DOI":"10.1364\/OFC.2018.M3A.1"},{"key":"561_CR144","doi-asserted-by":"crossref","unstructured":"N. L. M. Van Adrichem, C. Doerr, and F. A. Kuipers, \u201cOpenNetMon: Network monitoring in OpenFlow software-defined networks,\u201d IEEE\/IFIP NOMS 2014 - IEEE\/IFIP Netw. Oper. Manag. Symp. Manag. a Softw. Defin. World, 2014","DOI":"10.1109\/NOMS.2014.6838228"},{"key":"561_CR145","doi-asserted-by":"crossref","unstructured":"M. Koerner and O. Kao, \u201cOftables: A distributed packet filter,\u201d 2014 6th Int. Conf. Commun. Syst. Networks, COMSNETS 2014, pp. 14\u201317, 2014","DOI":"10.1109\/COMSNETS.2014.6734922"},{"issue":"7","key":"561_CR146","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MCOM.2014.6852091","volume":"52","author":"A Schaeffer-Filho","year":"2014","unstructured":"A. Schaeffer-Filho, P. Smith, A. Mauthe and D. Hutchison, Network resilience with reusable management patterns, IEEE Commun. Mag., Vol. 52, No. 7, pp. 108\u2013115, 2014.","journal-title":"IEEE Commun. Mag."},{"key":"561_CR147","doi-asserted-by":"crossref","unstructured":"C. Bouras, P. Ntarzanos, and A. Papazois, \u201cCost Modeling for SDN \/ NFV Based Mobile 5G Networks,\u201d pp. 87\u201392, 2016","DOI":"10.1109\/ICUMT.2016.7765232"},{"key":"561_CR148","doi-asserted-by":"publisher","first-page":"143454","DOI":"10.1109\/ACCESS.2019.2944874","volume":"7","author":"C Zhang","year":"2019","unstructured":"C. Zhang, X. Wang, Y. Zhao, A. Dong, F. Li and M. I. N. Huang, Cost efficient and low-latency network service chain deployment across multiple domains for SDN, IEEE Access, Vol. 7, pp. 143454\u2013143470, 2019.","journal-title":"IEEE Access"},{"key":"561_CR149","first-page":"2015","volume":"2015","author":"D Chourishi","year":"2015","unstructured":"D. Chourishi, A. Miri, M. Milic, S. Ismaeel and \u201cRole-based multiple controllers for load balancing and security in SDN\u201d, IEEE Canada Int, Humanit. Technol. Conf. IHTC, Vol. 2015, pp. 2015, 2015.","journal-title":"Humanit. Technol. Conf. IHTC"},{"key":"561_CR150","first-page":"14","volume":"103","author":"Diego and Ramos","year":"2014","unstructured":"Diego and Ramos, Fernando MV and Verissimo, Paulo Esteves and Rothenberg, Christian Esteve and Azodolmolky, Siamak and Uhlig, Steve Kreutz, \u201cSoftware-defined networking: A comprehensive survey,\u201d Proceedings of the IEEE, Vol. 103, pp. 14\u201376, 2014.","journal-title":"Proceedings of the IEEE"}],"container-title":["International Journal of Wireless Information Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-022-00561-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10776-022-00561-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10776-022-00561-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T17:23:40Z","timestamp":1727457820000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10776-022-00561-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,23]]},"references-count":150,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,9]]}},"alternative-id":["561"],"URL":"https:\/\/doi.org\/10.1007\/s10776-022-00561-y","relation":{},"ISSN":["1068-9605","1572-8129"],"issn-type":[{"value":"1068-9605","type":"print"},{"value":"1572-8129","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,23]]},"assertion":[{"value":"16 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"All authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"Informed consent was obtained from all individual participants included in the study.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}}]}}