{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:47:21Z","timestamp":1774021641597,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s11390-022-1495-0","type":"journal-article","created":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T02:02:45Z","timestamp":1660356165000},"page":"839-851","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["An Efficient Scheme to Defend Data-to-Control-Plane Saturation Attacks in Software-Defined Networking"],"prefix":"10.1007","volume":"37","author":[{"given":"Xuan-Bo","family":"Huang","sequence":"first","affiliation":[]},{"given":"Kai-Ping","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yi-Tao","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Ding-Wen","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Ruidong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qi-Bin","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,30]]},"reference":[{"key":"1495_CR1","doi-asserted-by":"publisher","unstructured":"Kreutz D, Ramos F, V P et al. Software-defined networking: A comprehensive survey. Proc. IEEE, 2015, 103(1): 14-76. DOI: https:\/\/doi.org\/10.1109\/JPROC.2014.2371999.","DOI":"10.1109\/JPROC.2014.2371999"},{"issue":"2","key":"1495_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H et al. Open-Flow: Enabling innovation in campus networks. ACM SIG-COMM Computer Communication Review, 2008, 38(2): 69-74. DOI: https:\/\/doi.org\/10.1145\/1355734.1355746.","journal-title":"ACM SIG-COMM Computer Communication Review"},{"key":"1495_CR3","doi-asserted-by":"publisher","unstructured":"Shin S, Yegneswaran V, Porras P, Gu G. AVANT-GUARD: Scalable and vigilant switch flow management in software-defined networks. In Proc. the ACM Conference on Computer and Communications Security, November 2013, pp.413-424. DOI: https:\/\/doi.org\/10.1145\/2508859.2516684.","DOI":"10.1145\/2508859.2516684"},{"key":"1495_CR4","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/j.comnet.2015.08.038","volume":"92","author":"S Fichera","year":"2015","unstructured":"Fichera S, Galluccio L, Grancagnolo S et al. OPERETTA: An OPEnflow-based remedy to mitigate TCP SYNFLOOD attacks against web servers. Computer Networks, 2015, 92: 89-100. DOI: https:\/\/doi.org\/10.1016\/j.comnet.2015.08.038.","journal-title":"Computer Networks"},{"issue":"2","key":"1495_CR5","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1109\/TNSM.2017.2701549","volume":"14","author":"R Mohammadi","year":"2017","unstructured":"Mohammadi R, Javidan R, Conti M. SLICOTS: An SDN-based lightweight countermeasure for TCP SYN flooding attacks. IEEE Transactions on Network and Service Management, 2017, 14(2): 487-497. DOI: https:\/\/doi.org\/10.1109\/TNSM.2017.2701549.","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"1","key":"1495_CR6","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1109\/TNSM.2019.2959268","volume":"17","author":"Z Li","year":"2020","unstructured":"Li Z, Xing W, Khamaiseh S, Xu D. Detecting saturation attacks based on self-similarity of OpenFlow traffic. IEEE Transactions on Network and Service Management, 2020, 17(1): 607-621. DOI: https:\/\/doi.org\/10.1109\/TNSM.2019.2959268.","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"1495_CR7","doi-asserted-by":"publisher","unstructured":"Achleitner S, Porta T L, Jaeger T, McDaniel P. Adversarial network forensics in software defined networking. In Proc. the Symposium on SDN Research, April 2017, pp.8-20. DOI: https:\/\/doi.org\/10.1145\/3050220.3050223.","DOI":"10.1145\/3050220.3050223"},{"key":"1495_CR8","doi-asserted-by":"crossref","unstructured":"Liu S, Reiter M K, Sekar V. Flow reconnaissance via timing attacks on SDN switches. In Proc. the 37th IEEE International Conference on Distributed Computing Systems, June 2017, pp.196-206. DOI: 10.1109\/ICDCS.2017.281.","DOI":"10.1109\/ICDCS.2017.281"},{"key":"1495_CR9","unstructured":"Cao J, Li Q, Xie R et al. The CrossPath attack: Disrupting the SDN control channel via shared links. In Proc. the 28th USENIX Security Symposium, August 2019, pp.19-36."},{"key":"1495_CR10","doi-asserted-by":"publisher","unstructured":"Patwardhan A, Jayarama D, Limaye N et al. SDN Security: Information disclosure and flow table over-flow attacks. In Proc. the IEEE Global Communications Conference, December 2019. DOI: https:\/\/doi.org\/10.1109\/GLOBE-COM38437.2019.9014048.","DOI":"10.1109\/GLOBE-COM38437.2019.9014048"},{"key":"1495_CR11","doi-asserted-by":"publisher","unstructured":"Zhang M, Li G, Xu L et al. Control plane reflection attacks in SDNs: New attacks and countermeasures. In Proc. the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, September 2018, pp.161-183. DOI: https:\/\/doi.org\/10.1007\/978-3-030-00470-5_8.","DOI":"10.1007\/978-3-030-00470-5_8"},{"key":"1495_CR12","doi-asserted-by":"publisher","unstructured":"Cao J, Xu M, Li Q et al. Disrupting SDN via the data plane: A low-rate flow table overflow attack. In Proc. the 13th International Conference on Security and Privacy in Communication Networks, October 2017, pp.356-376. DOI: https:\/\/doi.org\/10.1007\/978-3-319-78813-5_18.","DOI":"10.1007\/978-3-319-78813-5_18"},{"key":"1495_CR13","doi-asserted-by":"crossref","unstructured":"Yu M, He T, McDaniel P, Burke Q K. Flow table security in SDN: Adversarial reconnaissance and intelligent attacks. In Proc. the 39th IEEE International Conference on Computer Communications, July 2020, pp.1519-1528. DOI: 10.1109\/INFOCOM41043.2020.9155538.","DOI":"10.1109\/INFOCOM41043.2020.9155538"},{"key":"1495_CR14","doi-asserted-by":"crossref","unstructured":"Wang H, Xu L, Gu G. FloodGuard: A DoS attack prevention extension in software-defined networks. In Proc. the 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, June 2015, pp.239-250. DOI: 10.1109\/DSN.2015.27.","DOI":"10.1109\/DSN.2015.27"},{"key":"1495_CR15","doi-asserted-by":"publisher","unstructured":"Gao S, Peng Z, Xiao B, Hu A Q, Ren K. FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks. In Proc. the 36th IEEE International Conference on Computer Communications, May 2017. DOI: https:\/\/doi.org\/10.1109\/INFOCOM.2017.8057009.","DOI":"10.1109\/INFOCOM.2017.8057009"},{"key":"1495_CR16","doi-asserted-by":"crossref","unstructured":"Buragohain C, Medhi N. FlowTrApp: An SDN based architecture for DDoS attack detection and mitigation in data centers. In Proc. the 3rd International Conference on Signal Processing and Integrated Networks, February 2016, pp.519-524. DOI: 10.1109\/SPIN.2016.7566750.","DOI":"10.1109\/SPIN.2016.7566750"},{"key":"1495_CR17","doi-asserted-by":"publisher","unstructured":"Hu D, Hong P, Chen Y. FADM: DDoS flooding attack detection and mitigation system in software-defined networking. In Proc. the IEEE Global Communications Conference, December 2017. DOI: https:\/\/doi.org\/10.1109\/GLOCOM.2017.8254023.","DOI":"10.1109\/GLOCOM.2017.8254023"},{"key":"1495_CR18","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis K, Argyropoulos C, Androulidakis G et al. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Computer Networks, 2014, 62: 122-136. DOI: https:\/\/doi.org\/10.1016\/j.bjp.2013.10.014.","journal-title":"Computer Networks"},{"key":"1495_CR19","doi-asserted-by":"publisher","unstructured":"Da Silva A, Wickboldt J, Granville L, Schaeffer-Filho A. ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDN. In Proc. the IEEE\/IFIP Conference on Network Operations and Management Symposium, April 2016, pp.27-35. DOI: https:\/\/doi.org\/10.1109\/NOMS.2016.7502793.","DOI":"10.1109\/NOMS.2016.7502793"},{"key":"1495_CR20","doi-asserted-by":"publisher","unstructured":"Kotani D, Okabe Y. A packet-in message filtering mechanism for protection of control plane in OpenFlow networks. In Proc. the ACM\/IEEE Symposium on Architectures for Networking and Communications Systems, October 2014, pp.29-40. DOI: https:\/\/doi.org\/10.1145\/2658260.2658276.","DOI":"10.1145\/2658260.2658276"},{"key":"1495_CR21","doi-asserted-by":"publisher","unstructured":"Huang X, Xue K, Xing Y, Hu D, Li R, Sun Q. FSDM: Fast recovery saturation attack detection and mitigation frame-work in SDN. In Proc. the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Dec. 2020, pp.329-337. DOI: https:\/\/doi.org\/10.1109\/MASS50613.2020.00048.","DOI":"10.1109\/MASS50613.2020.00048"},{"issue":"2","key":"1495_CR22","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1111\/j.1469-1809.1936.tb02137.x","volume":"7","author":"RA Fisher","year":"1936","unstructured":"Fisher R A. The use of multiple measurements in taxonomic problems. Annals of Eugenics, 1936, 7(2): 179-188. DOI: https:\/\/doi.org\/10.1111\/j.1469-1809.1936.tb02137.x.","journal-title":"Annals of Eugenics"},{"key":"1495_CR23","doi-asserted-by":"crossref","unstructured":"Shin S, Gu G. Attacking software-defined networks: A first feasibility study. In Proc. the 2nd ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, August 2013, pp.165-166. DOI: 10.1145\/2491185.2491220.","DOI":"10.1145\/2491185.2491220"},{"issue":"2","key":"1495_CR24","doi-asserted-by":"publisher","first-page":"1206","DOI":"10.1109\/TNET.2016.2626287","volume":"25","author":"M Ambrosin","year":"2017","unstructured":"Ambrosin M, Conti M, De Gaspari F, Poovendran R. LineSwitch: Tackling control plane saturation attacks in software-defined networking. IEEE\/ACM Transactions on Networking, 2017, 25(2): 1206-1219. DOI: https:\/\/doi.org\/10.1109\/TNET.2016.2626287.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1495_CR25","doi-asserted-by":"publisher","unstructured":"Sonchack J, Dubey A, Aviv A J et al. Timing-based reconnaissance and defense in software-defined networks. In Proc. the 32nd Annual Conference on Computer Security Applications, December 2016, pp.89-100. DOI: https:\/\/doi.org\/10.1145\/2991079.2991081.","DOI":"10.1145\/2991079.2991081"},{"issue":"7","key":"1495_CR26","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom B H. Space\/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422-426. DOI: https:\/\/doi.org\/10.1145\/362686.362692.","journal-title":"Communications of the ACM"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-022-1495-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11390-022-1495-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-022-1495-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T02:13:20Z","timestamp":1660356800000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11390-022-1495-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["1495"],"URL":"https:\/\/doi.org\/10.1007\/s11390-022-1495-0","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"4 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}