{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T21:10:08Z","timestamp":1756156208482,"version":"3.44.0"},"reference-count":45,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/lcnsymposium47956.2019.9000660","type":"proceedings-article","created":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T04:25:53Z","timestamp":1581999953000},"page":"100-107","source":"Crossref","is-referenced-by-count":4,"title":["White Box Analysis at the Service of Low Rate Saturation Attacks on Virtual SDN Data Plane"],"prefix":"10.1109","author":[{"given":"Sajad","family":"Khorsandroo","sequence":"first","affiliation":[{"name":"North Carolina A&amp;T State University,Department of Computer Science"}]},{"given":"Ali Saman","family":"Tosun","sequence":"additional","affiliation":[{"name":"The University of Texas at San Antonio,Department of Computer Science"}]}],"member":"263","reference":[{"journal-title":"LINC Switch","year":"0","key":"ref39"},{"key":"ref38","article-title":"Softnic: A software nic to augment hardware","author":"han","year":"2015","journal-title":"Tech Rep"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2808062.2808073"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169856"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26362-5_16"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2765506"},{"key":"ref37","article-title":"Scalable high-performance elastic software openflow switch in userspace for wide-area network","author":"nakajima","year":"2014","journal-title":"Proc Open Networking Summit (ONS)"},{"key":"ref36","first-page":"117","article-title":"The design and implementation of open vswitch","volume":"15","author":"pfaff","year":"2015","journal-title":"NSDI"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2015.7116186"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2626287"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169877"},{"key":"ref11","article-title":"Of-guard: A dos attack prevention extension in software-defined networks","author":"wang","year":"2014","journal-title":"Open Networking Summit"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004113"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3132015"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN.2017.8169839"},{"key":"ref15","article-title":"A switch table vulnerability in the open floodlight sdn controller","author":"dover","year":"2014","journal-title":"Relat&#x00F3;rio T&#x00E9;cnico"},{"key":"ref16","first-page":"356","article-title":"Disrupting sdn via the data plane: a low-rate flow table overflow attack","author":"cao","year":"2017","journal-title":"International Conference on Security and Privacy in Communication Systems"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/4760632"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2016.7561033"},{"year":"0","key":"ref19","article-title":"Mitigating the table-overflow attack in software-defined networking"},{"article-title":"Analysis of topology poisoning attacks in software-defined networking","year":"2015","author":"thanh bui","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620734"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366363"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3139645.3139657"},{"key":"ref6","first-page":"1","article-title":"How to detect a compromised sdn switch","author":"chi","year":"2015","journal-title":"Network Softwarization (NetSoft) 2015 IEEE 1st Conference on"},{"key":"ref29","first-page":"451","article-title":"Attacking the brain: Races in the SDN control plane","author":"xu","year":"2017","journal-title":"26th USENIX Security Symposium (USENIX Security 17)"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CloudNet.2014.6968979"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185468"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11599-3_14"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185496"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref1","first-page":"203","article-title":"Network virtualization in multi-tenant datacenters","volume":"14","author":"koponen","year":"2014","journal-title":"NSDI"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2018.00050"},{"journal-title":"OpenFlow Timeouts Demystified","year":"2012","author":"zarek","key":"ref45"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57186-7_29"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2991079.2991081"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2015.26"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2014.38"},{"article-title":"An inference attack model for flow table capacity and usage: Exploiting the vulnerability of flow table overflow in software-defined network","year":"2015","author":"leng","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316216"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876030"},{"journal-title":"Definitions for the struct skbuff memory handlers","year":"0","key":"ref43"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2016.7841843"}],"event":{"name":"2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium)","start":{"date-parts":[[2019,10,14]]},"location":"Osnabrueck, Germany","end":{"date-parts":[[2019,10,17]]}},"container-title":["2019 IEEE 44th LCN Symposium on Emerging Topics in Networking (LCN Symposium)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8982112\/9000653\/09000660.pdf?arnumber=9000660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:39:01Z","timestamp":1756154341000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9000660\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":45,"URL":"https:\/\/doi.org\/10.1109\/lcnsymposium47956.2019.9000660","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}