{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T21:50:56Z","timestamp":1775598656943,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"EU H2020 Projects BEBA","award":["644122"],"award-info":[{"award-number":["644122"]}]},{"name":"Superfluidity","award":["671566"],"award-info":[{"award-number":["671566"]}]},{"DOI":"10.13039\/501100000780","name":"Marie Curie Fellowship funded by the European Commission","doi-asserted-by":"publisher","award":["PCIG11-GA-2012-321980"],"award-info":[{"award-number":["PCIG11-GA-2012-321980"]}],"id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"EU TagItSmart! Project","award":["H2020-ICT30-2015-688061"],"award-info":[{"award-number":["H2020-ICT30-2015-688061"]}]},{"name":"EU-India REACH Project","award":["ICI+\/2014\/342-896"],"award-info":[{"award-number":["ICI+\/2014\/342-896"]}]},{"name":"\u201cPhysical-Layer Security for Wireless Communication\u201d and \u201cContent Centric Networking: Security and Privacy Issues\u201d funded by the University of Padua"},{"DOI":"10.13039\/100000923","name":"Cisco University Research Program Fund and Silicon Valley Community Foundation","doi-asserted-by":"publisher","award":["2017-166478 (3696)"],"award-info":[{"award-number":["2017-166478 (3696)"]}],"id":[{"id":"10.13039\/100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/comst.2017.2689819","type":"journal-article","created":{"date-parts":[[2017,3,30]],"date-time":"2017-03-30T23:16:08Z","timestamp":1490915768000},"page":"1701-1725","source":"Crossref","is-referenced-by-count":152,"title":["A Survey on the Security of Stateful SDN Data Planes"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0908-6483","authenticated-orcid":false,"given":"Tooska","family":"Dargahi","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Caponi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2520-9092","authenticated-orcid":false,"given":"Moreno","family":"Ambrosin","sequence":"additional","affiliation":[]},{"given":"Giuseppe","family":"Bianchi","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2015.7288477"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2013.6761300"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2013.6970722"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2013.6614127"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2008.080406"},{"key":"ref77","first-page":"27","article-title":"ATLANTIC: A framework for anomaly traffic detection, classification, and mitigation in SDN","author":"da silva","year":"2016","journal-title":"Proc IEEE\/IFIP Netw Oper Manage Symp (NOMS)"},{"key":"ref74","first-page":"1","article-title":"Interest flooding attack and countermeasures in named data networking","author":"afanasyev","year":"2013","journal-title":"Proc IFIP Netw Conf"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250987"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2015.12"},{"key":"ref79","article-title":"Post quantum group theoretic cryptography","author":"anshel","year":"2016"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121112.00190"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774999"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2015.7148981"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320094"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2330903"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2000.898055"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/378444.378449"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1273778"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231276"},{"key":"ref63","year":"0","journal-title":"Safe Layer 2 Security in-Depth Version 2"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2015.2499747"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref65","year":"2016","journal-title":"Named Data Networking Project"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2016.7561017"},{"key":"ref29","author":"kim","year":"2016","journal-title":"In-Band Network Telemetry (INT)"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486023"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2392629"},{"key":"ref69","first-page":"1","article-title":"Lessons from the past: Why data-driven states harm future information-centric networking","author":"w\u00e4hlisch","year":"2013","journal-title":"Proc IFIP Netw Conf"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"ref21","article-title":"Open packet processor: A programmable architecture for wire speed platform-independent stateful in-network processing","volume":"abs 1605 1977","author":"bianchi","year":"2016","journal-title":"CoRR"},{"key":"ref24","first-page":"103","article-title":"Compiling packet programs to reconfigurable switches","author":"jose","year":"2015","journal-title":"Proc USENIX NSDI"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2914642.2914643"},{"key":"ref25","year":"2016","journal-title":"The P4 Language Specification Version 1 0 3"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999607"},{"key":"ref51","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","author":"fayaz","year":"2015","journal-title":"24th USENIX Security Symp"},{"key":"ref90","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/3-540-45657-0_29","article-title":"NuSMV 2: An opensource tool for symbolic model checking","author":"cimatti","year":"2002","journal-title":"Proc Int Conf Comput Aided Verification"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57186-7_29"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2626287"},{"key":"ref57","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1145\/2714576.2714612","article-title":"LineSwitch: Efficiently managing switch flow in software-defined networking while effectively tackling DoS attacks","author":"ambrosin","year":"2015","journal-title":"Proc 10th ACM Symp Inf Comput Commun Security"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref55","author":"krzywinski","year":"2004","journal-title":"A Critique of Port Knocking&#x2014;Author&#x2019;s Response"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1007\/978-3-319-15509-8_26","article-title":"What you need to know about SDN flow tables","author":"ku?niar","year":"2015","journal-title":"Passive and Active Measurement"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2790012"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342443"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1592681.1592684"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1145\/2034574.2034812","article-title":"Frenetic: A network programming language","volume":"46","author":"foster","year":"2011","journal-title":"ACM SIGPLAN Notices"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.014"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342451"},{"key":"ref13","first-page":"1","article-title":"Composing software-defined networks","author":"monsanto","year":"2013","journal-title":"Proc USENIX NSDI"},{"key":"ref14","first-page":"519","article-title":"Tierless programming and reasoning for software-defined networks","author":"nelson","year":"2014","journal-title":"Proc USENIX NSDI"},{"key":"ref15","first-page":"59","article-title":"Kinetic: Verifiable dynamic network control","author":"kim","year":"2015","journal-title":"Proc USENIX Symp Netw Syst Design Implem (NSDI)"},{"key":"ref82","first-page":"4","article-title":"Ravana: Controller fault-tolerance in software-defined networking","author":"katta","year":"2015","journal-title":"Proc 1st ACM SIGCOMM Symp Softw Defined Netw Res"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_20"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.06.004"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2342356.2342427"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602211"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890965"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1145\/2620728.2620729","article-title":"Flow-level state transition as a new switch primitive for SDN","author":"moshref","year":"2014","journal-title":"Proc 3rd Workshop Hot Topics Softw Defined Netw (HotSDN)"},{"key":"ref80","first-page":"1","article-title":"Walnut digital signature algorithm: A lightweight, quantum-resistant signature scheme for use in passive, low-power, and IoT devices","author":"atkins","year":"2016","journal-title":"Proc Lightweight Cryptography Workshop (NIST)"},{"key":"ref89","year":"2016","journal-title":"Source Code Analysis Tools"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453114"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2421391"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218382"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491200"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2013.6665172"},{"key":"ref87","first-page":"1","article-title":"NeSMA: Enabling network-level state-aware applications in SDN","author":"sun","year":"2016","journal-title":"Proc Int Conf Netw Protocols (ICNP)"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.114"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384625"},{"key":"ref46","year":"2015","journal-title":"OpenFlow Switch Specification v 1 5 1 ONF TS-025"},{"key":"ref45","year":"2014","journal-title":"OpenFlow Switch Specification V1 3 1"},{"key":"ref48","article-title":"Specification and compilation of event-driven SDN programs","author":"mcclurg","year":"2015","journal-title":"arXiv preprint arXiv 1507 07049"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491190"},{"key":"ref42","article-title":"The future of networking, and the past of protocols","volume":"20","author":"shenker","year":"2011","journal-title":"Keynote Slides Open Netw"},{"key":"ref41","article-title":"Software-defined networking: The new norm for networks","author":"fundation","year":"2012"},{"key":"ref44","article-title":"The benefits of multiple flow tables and TTPs, version 1.0","year":"2015"},{"key":"ref43","year":"2009","journal-title":"OpenFlow Switch Specification v 1 0 0"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/8013866\/07890396.pdf?arnumber=7890396","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,27]],"date-time":"2022-07-27T01:59:13Z","timestamp":1658887153000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7890396\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":90,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2017.2689819","relation":{},"ISSN":["1553-877X"],"issn-type":[{"value":"1553-877X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}