{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T03:55:03Z","timestamp":1768017303278,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T00:00:00Z","timestamp":1685404800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T00:00:00Z","timestamp":1685404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"DOI":"10.1007\/s11416-023-00483-0","type":"journal-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T19:01:46Z","timestamp":1685473306000},"page":"15-25","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["DHCP DoS and starvation attacks on SDN controllers and their mitigation"],"prefix":"10.1007","volume":"20","author":[{"given":"Hafiz Usama","family":"Ishtiaq","sequence":"first","affiliation":[]},{"given":"Areeb Ahmed","family":"Bhutta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1034-0140","authenticated-orcid":false,"given":"Adnan Noor","family":"Mian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,30]]},"reference":[{"key":"483_CR1","unstructured":"Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., Durumeric, Z., Halderman, J.A., Invernizzi, L., Kallitsis, M., et al.: Understanding the mirai botnet. In: 26th USENIX Security Symposium (USENIX Security 17), pp. 1093\u20131110 (2017)"},{"key":"483_CR2","doi-asserted-by":"crossref","unstructured":"Duangphasuk, S., Kungpisdan, S., Hankla, S.: Design and implementation of improved security protocols for DHCP using digital certificates. In: 2011 17th IEEE International Conference on Networks, pp. 287\u2013292. IEEE (2011)","DOI":"10.1109\/ICON.2011.6168490"},{"issue":"1","key":"483_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12046-019-1244-4","volume":"45","author":"A Al-Ani","year":"2020","unstructured":"Al-Ani, A., Anbar, M., Al-Ani, A.K., Hasbullah, I.H.: DHCPv6Auth: a mechanism to improve DHCPv6 authentication and privacy. S\u0101dhan\u0101 45(1), 1\u201311 (2020)","journal-title":"S\u0101dhan\u0101"},{"issue":"2","key":"483_CR4","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s11416-020-00374-8","volume":"17","author":"M Aldaoud","year":"2021","unstructured":"Aldaoud, M., Al-Abri, D., Al Maashri, A., Kausar, F.: DHCP attacking tools: an analysis. J. Comput. Virol. Hacking Tech. 17(2), 119\u2013129 (2021)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"483_CR5","doi-asserted-by":"crossref","unstructured":"Wang, J.-L., Chen, Y.-C.: An SDN-based defensive solution against DHCP attacks in the virtualization environment. In: 2017 IEEE Conference on Dependable and Secure Computing, pp. 529\u2013530. IEEE (2017)","DOI":"10.1109\/DESEC.2017.8073876"},{"key":"483_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102394","volume":"109","author":"MS Tok","year":"2021","unstructured":"Tok, M.S., Demirci, M.: Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard. Comput. Secur. 109, 102394 (2021)","journal-title":"Comput. Secur."},{"key":"483_CR7","doi-asserted-by":"crossref","unstructured":"Tripathi, N., Hubballi, N.: A probabilistic anomaly detection scheme to detect DHCP starvation attacks. In: 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1\u20136. IEEE (2016)","DOI":"10.1109\/ANTS.2016.7947848"},{"key":"483_CR8","doi-asserted-by":"crossref","unstructured":"Nanda, S., Zafari, F., DeCusatis, C., Wedaa, E., Yang, B.: Predicting network attack patterns in SDN using machine learning approach. In: 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 167\u2013172. IEEE (2016)","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"issue":"5","key":"483_CR9","doi-asserted-by":"publisher","first-page":"3497","DOI":"10.1002\/dac.3497","volume":"31","author":"C Li","year":"2018","unstructured":"Li, C., Wu, Y., Yuan, X., Sun, Z., Wang, W., Li, X., Gong, L.: Detection and defense of DDoS attack-based on deep learning in OpenFlow-based SDN. Int. J. Commun. Syst. 31(5), 3497 (2018)","journal-title":"Int. J. Commun. Syst."},{"key":"483_CR10","doi-asserted-by":"crossref","unstructured":"Fran\u00e7ois, J., Festor, O.: Anomaly traceback using software defined networking. In: 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pp. 203\u2013208. IEEE (2014)","DOI":"10.1109\/WIFS.2014.7084328"},{"key":"483_CR11","doi-asserted-by":"crossref","unstructured":"Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: IEEE Local Computer Network Conference, pp. 408\u2013415. IEEE (2010)","DOI":"10.1109\/LCN.2010.5735752"},{"key":"483_CR12","doi-asserted-by":"crossref","unstructured":"Aldaoud, M., Al-Abri, D., Al\u00a0Maashri, A., Kausar, F.: Detecting and mitigating DHCP attacks in openflow-based SDN networks: a comprehensive approach. J. Comput. Virol. Hacking Tech., 1\u201318 (2023)","DOI":"10.1007\/s11416-023-00468-z"},{"issue":"1","key":"483_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1186\/s13677-023-00406-w","volume":"12","author":"P Krishnan","year":"2023","unstructured":"Krishnan, P., Jain, K., Aldweesh, A., Prabu, P., Buyya, R.: Openstackdp: a scalable network security framework for SDN-based openstack cloud infrastructure. J. Cloud Comput. 12(1), 26 (2023)","journal-title":"J. Cloud Comput."},{"key":"483_CR14","doi-asserted-by":"crossref","unstructured":"Maleh, Y., Qasmaoui, Y., El\u00a0Gholami, K., Sadqi, Y., Mounir, S.: A comprehensive survey on SDN security: threats, mitigations, and future directions. J. Reliab. Intell. Environ., 1\u201339 (2022)","DOI":"10.1007\/s40860-022-00171-8"},{"issue":"1","key":"483_CR15","doi-asserted-by":"publisher","first-page":"124","DOI":"10.26682\/sjuod.2019.22.1.14","volume":"22","author":"HY Khalid","year":"2019","unstructured":"Khalid, H.Y., Ismael, P.M., Al-Khalil, A.B.: Efficient mechanism for securing software defined network against ARP spoofing attack. J. Duhok Univ. 22(1), 124\u2013131 (2019)","journal-title":"J. Duhok Univ."},{"key":"483_CR16","doi-asserted-by":"crossref","unstructured":"Rietz, R., Cwalinski, R., K\u00f6nig, H., Brinner, A.: An SDN-based approach to ward off LAN attacks. J. Comput. Netw. Commun. 2018 (2018)","DOI":"10.1155\/2018\/4127487"},{"issue":"3","key":"483_CR17","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s11416-017-0310-x","volume":"14","author":"N Tripathi","year":"2018","unstructured":"Tripathi, N., Hubballi, N.: Detecting stealth DHCP starvation attack using machine learning approach. J. Comput. Virol. Hacking Tech. 14(3), 233\u2013244 (2018)","journal-title":"J. Comput. Virol. Hacking Tech."},{"key":"483_CR18","doi-asserted-by":"crossref","unstructured":"Dhawan, M., Poddar, R., Mahajan, K., Mann, V.: Sphinx: detecting security attacks in software-defined networks. In: NDSS, vol. 15, pp. 8\u201311. IEEE (2015)","DOI":"10.14722\/ndss.2015.23064"},{"key":"483_CR19","doi-asserted-by":"crossref","unstructured":"Alharbi, T., Durando, D., Pakzad, F., Portmann, M.: Securing ARP in software defined networks. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp. 523\u2013526. IEEE (2016)","DOI":"10.1109\/LCN.2016.83"},{"key":"483_CR20","doi-asserted-by":"crossref","unstructured":"Shete, A., Lahade, A., Patil, T., Pawar, R.: DHCP protocol using OTP based two-factor authentication. In: 2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), pp. 136\u2013141. IEEE (2018)","DOI":"10.1109\/ICOEI.2018.8553753"},{"key":"483_CR21","doi-asserted-by":"crossref","unstructured":"Mousavi, S.M., St-Hilaire, M.: Early detection of DDoS attacks against SDN controllers. In: 2015 International Conference on Computing, Networking and Communications, pp. 77\u201381 (2015). IEEE (ICNC)","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"483_CR22","doi-asserted-by":"crossref","unstructured":"Ye, J., Cheng, X., Zhu, J., Feng, L., Song, L.: A DDoS attack detection method based on SVM in software defined network. Secur. Commun. Netw. 2018 (2018)","DOI":"10.1155\/2018\/9804061"},{"key":"483_CR23","doi-asserted-by":"crossref","unstructured":"Cox\u00a0Jr, J.H., Clark, R.J., Owen\u00a0III, H.L.: Leveraging SDN to improve the security of DHCP. In: Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, pp. 35\u201338. ACM (2016)","DOI":"10.1145\/2876019.2876028"},{"key":"483_CR24","doi-asserted-by":"crossref","unstructured":"Alshamrani, A., Chowdhary, A., Pisharody, S., Lu, D., Huang, D.: A defense system for defeating DDoS attacks in SDN based networks. In: Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, pp. 83\u201392. ACM (2017)","DOI":"10.1145\/3132062.3132074"},{"key":"483_CR25","doi-asserted-by":"crossref","unstructured":"Ajaeiya, G.A., Adalian, N., Elhajj, I.H., Kayssi, A., Chehab, A.: Flow-based intrusion detection system for SDN. In: 2017 IEEE Symposium on Computers and Communications (ISCC), pp. 787\u2013793. IEEE (2017)","DOI":"10.1109\/ISCC.2017.8024623"},{"key":"483_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1016\/j.jnca.2019.03.005","volume":"136","author":"C Birkinshaw","year":"2019","unstructured":"Birkinshaw, C., Rouka, E., Vassilakis, V.G.: Implementing an intrusion detection and prevention system using software-defined networking: defending against port-scanning and denial-of-service attacks. J. Netw. Comput. Appl. 136, 71\u201385 (2019)","journal-title":"J. Netw. Comput. Appl."},{"key":"483_CR27","unstructured":"Gudmundsson, O., Droms, R.: Security Requirements for the DHCP protocol. Technical report, Internet Draft, March (1998)"},{"key":"483_CR28","unstructured":"Sanchez, R., Enrique, J.: International Standard ISO\/IEC Information technology-Security techniques-Information security. ISO vol (2016)"},{"key":"483_CR29","doi-asserted-by":"crossref","unstructured":"Lin, T.-Y., Wu, J.-P., Hung, P.-H., Shao, C.-H., Wang, Y.-T., Cai, Y.-Z., Tsai, M.-H.: Mitigating SYN flooding attack and ARP spoofing in SDN data plane. In: 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), pp. 114\u2013119. IEEE (2020)","DOI":"10.23919\/APNOMS50412.2020.9236951"},{"issue":"1","key":"483_CR30","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1007\/s11277-021-08920-3","volume":"122","author":"S Bhardwaj","year":"2022","unstructured":"Bhardwaj, S., Panda, S.N.: Performance evaluation using RYU SDN controller in software-defined networking environment. Wirel. Pers. Commun. 122(1), 701\u2013723 (2022)","journal-title":"Wirel. Pers. Commun."},{"key":"483_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-7299-4","volume-title":"Fundamentals of Network Forensics","author":"R Joshi","year":"2016","unstructured":"Joshi, R., Pilli, E.S.: Fundamentals of Network Forensics. Springer, New York (2016)"},{"key":"483_CR32","unstructured":"Barroso, D., Anders, A.: Yersinia: framework for layer 2 attacks. Black Hat Brief. (2005)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00483-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00483-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00483-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:21:50Z","timestamp":1708687310000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00483-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,5,30]]},"references-count":32,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["483"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00483-0","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,5,30]]},"assertion":[{"value":"31 December 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}