{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T13:10:01Z","timestamp":1749993001045,"version":"3.41.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/icitst.2016.7856698","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:16:34Z","timestamp":1487283394000},"page":"210-215","source":"Crossref","is-referenced-by-count":4,"title":["An approach for detecting encrypted insider attacks on OpenFlow SDN Networks"],"prefix":"10.1109","author":[{"given":"Charles V.","family":"Neu","sequence":"first","affiliation":[]},{"given":"Avelino F.","family":"Zorzo","sequence":"additional","affiliation":[]},{"given":"Alex M. S.","family":"Orozco","sequence":"additional","affiliation":[]},{"given":"Regio A.","family":"Michelin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ColComCon.2014.6860404"},{"year":"1999","key":"ref31","article-title":"Kdd cup 1999 data"},{"article-title":"Openflow switch specification, version 1.0.0","year":"2009","author":"foundation","key":"ref30"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/WCCAIS.2014.6916572"},{"journal-title":"Practical Cryptography","year":"2003","author":"ferguson","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WiSPNET.2016.7566121"},{"article-title":"Computer and information security handbook","year":"2012","author":"vacca","key":"ref14"},{"journal-title":"The CERT Guide to Insider Threats How to Prevent Detect and Respond to Information Technology Crimes (Theft Sabotage Fraud)","year":"2012","author":"cappelli","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2897795.2897799"},{"year":"2016","key":"ref17","article-title":"The snort project"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/NSS.2009.55"},{"key":"ref19","first-page":"94","article-title":"Guide to intrusion detection and prevention systems (idps)","volume":"800","author":"scarfone","year":"2007","journal-title":"NIST Special Publication"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/CBD.2014.40"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70440-7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCE.2008.4580619"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6852093"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326417"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2016.7586578"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038787"},{"article-title":"Openflow switch specification, version 1.5.0","year":"2014","author":"foundation","key":"ref8"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.26636\/jtit.2015.4.977","article-title":"Intrusion detection in software defined networks with self-organized maps","author":"jankowski","year":"2015","journal-title":"Journal of Telecommunications & Information Technology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSNC.2008.44"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2609876.2609880"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.052213.00046"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.032210.00054"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/IMF.2015.12"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21393-9_6"},{"key":"ref24","first-page":"2745","article-title":"On inferring application protocol behaviors in encrypted network traffic","volume":"7","author":"wright","year":"2006","journal-title":"The Journal of Machine Learning Research"},{"key":"ref23","first-page":"1","article-title":"Privacy vulnerabilities in encrypted http streams","author":"bissias","year":"2005","journal-title":"Proceedings of the 5th internationalconference on Privacy Enhancing Technologies"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787502"},{"key":"ref25","first-page":"373","article-title":"Realtime classification for encrypted traffic","author":"bar-yanai","year":"2010","journal-title":"SEA'10 Proceedings of the 9th international conference on Experimental Algorithms"}],"event":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2016,12,5]]},"location":"Barcelona, Spain","end":{"date-parts":[[2016,12,7]]}},"container-title":["2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7847254\/7856645\/07856698.pdf?arnumber=7856698","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,15]],"date-time":"2025-06-15T12:40:32Z","timestamp":1749991232000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7856698\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icitst.2016.7856698","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}