{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T16:20:00Z","timestamp":1772727600983,"version":"3.50.1"},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/noms.2014.6838409","type":"proceedings-article","created":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T19:03:46Z","timestamp":1406574226000},"page":"1-9","source":"Crossref","is-referenced-by-count":102,"title":["OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions"],"prefix":"10.1109","author":[{"given":"Adel","family":"Zaalouk","sequence":"first","affiliation":[{"name":"RWTH Aachen University, Germany"}]},{"given":"Rahamatullah","family":"Khondoker","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology (SIT), Rheinstr. 75, Darmstadt, Germany"}]},{"given":"Ronald","family":"Marx","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology (SIT), Rheinstr. 75, Darmstadt, Germany"}]},{"given":"Kpatcha","family":"Bayarou","sequence":"additional","affiliation":[{"name":"Fraunhofer Institute for Secure Information Technology (SIT), Rheinstr. 75, Darmstadt, Germany"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.397"},{"key":"18","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"15","author":"peter","year":"2013","journal-title":"DNS amplification attacks"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SAINT-W.2007.17"},{"key":"14","author":"zaalouk","year":"2014","journal-title":"Taking In-Network Security to the Next-Level with Software Defined Networking (SDN)"},{"key":"11","author":"jurga","year":"2007","journal-title":"Technical Report Packet Sampling for Network Monitoring"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177102"},{"key":"21","year":"2013","journal-title":"Floodlight Controller"},{"key":"20","year":"2014","journal-title":"Virtual Box"},{"key":"22","year":"2013","journal-title":"About POX"},{"key":"23","author":"biondi","year":"2010","journal-title":"Scapy A Powerful Interactive Packet Manipulation Program"},{"key":"24","year":"2014","journal-title":"Dnslib"},{"key":"25","year":"2014","journal-title":"Most Visited Websites"},{"key":"26","author":"lara","year":"2013","journal-title":"Network Innovation Using Openflow A Survey"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WDFIA.2007.4299371"},{"key":"10","first-page":"76","article-title":"Representational state transfer","author":"fielding","year":"2000","journal-title":"Architectural Styles and the Design of Netowork-based Software Architecture"},{"key":"1","author":"zargar","year":"2013","journal-title":"A Survey of Defense Mechanisms Against Distributed Denial of Service (Ddos) Flooding Attacks"},{"key":"7","article-title":"FRESCO: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"proceedings of Network and Distributed Security Symposium"},{"key":"6","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-23644-0_9","article-title":"Revisiting traffic anomaly detection using software defined networking","author":"mehdi","year":"2011","journal-title":"Recent Advances in Intrusion Detection"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342467"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2012.6459946"}],"event":{"name":"NOMS 2014 - 2014 IEEE\/IFIP Network Operations and Management Symposium","location":"Krakow, Poland","start":{"date-parts":[[2014,5,5]]},"end":{"date-parts":[[2014,5,9]]}},"container-title":["2014 IEEE Network Operations and Management Symposium (NOMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6828592\/6838210\/06838409.pdf?arnumber=6838409","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,9]],"date-time":"2021-06-09T10:02:58Z","timestamp":1623232978000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6838409\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/noms.2014.6838409","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}