{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:44:50Z","timestamp":1775144690776,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Institute of Civil Military Technology Cooperation Center"},{"DOI":"10.13039\/501100003052","name":"South Korea Government (Defense Acquisition Program Administration (DAPA) and Ministry of Trade, Industry and Energy","doi-asserted-by":"publisher","award":["18-CM-SW-09"],"award-info":[{"award-number":["18-CM-SW-09"]}],"id":[{"id":"10.13039\/501100003052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tifs.2021.3075845","type":"journal-article","created":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T20:25:42Z","timestamp":1619468742000},"page":"3138-3153","source":"Crossref","is-referenced-by-count":28,"title":["BottleNet: Hiding Network Bottlenecks Using SDN-Based Topology Deception"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1303-8668","authenticated-orcid":false,"given":"Jinwoo","family":"Kim","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8907-5495","authenticated-orcid":false,"given":"Jaehyun","family":"Nam","sequence":"additional","affiliation":[]},{"given":"Suyeol","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[]},{"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1077-5606","authenticated-orcid":false,"given":"Seungwon","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2014","journal-title":"OpenFlow Switch Specification Version 1 2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2307\/3033543"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177100"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/964725.633039"},{"key":"ref30","year":"2020","journal-title":"A Practical Guide to (Correctly) Troubleshooting with Traceroute"},{"key":"ref37","year":"2020","journal-title":"Planetlab"},{"key":"ref36","year":"2020","journal-title":"OpenDaylight"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620744"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664285"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"ref28","first-page":"1","article-title":"A virtual honeypot framework","author":"provos","year":"2004","journal-title":"Proc Secur Symp USENIX"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0503-60"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535398"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921196"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2016.7568520"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2805600"},{"key":"ref21","first-page":"817","article-title":"Bohatei: Flexible and elastic DDoS defense","author":"fayaz","year":"2015","journal-title":"Proc Secur Symp USENIX"},{"key":"ref24","year":"2020","journal-title":"Ryu"},{"key":"ref23","year":"2020","journal-title":"Open Vswitch"},{"key":"ref26","year":"2020","journal-title":"Iperf3"},{"key":"ref25","year":"2006","journal-title":"Traceroute For Linux"},{"key":"ref50","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"erd?s","year":"1960","journal-title":"Publ Math Inst Hung Acad Sci"},{"key":"ref51","year":"2020","journal-title":"ONOS Master Experiment I&#x2014;Single Bench Flow Latency Test"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref58","year":"2020","journal-title":"Open Network Operating System (ONOS)"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00470-5_8"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30143-1_8"},{"key":"ref54","year":"2020","journal-title":"OpenFlow Configuration Guide Cisco IOS XE Gibraltar"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2775066"},{"key":"ref52","first-page":"19","article-title":"The CrossPath attack: Disrupting the SDN control channel via shared links","author":"cao","year":"2019","journal-title":"Proc Secur Symp USENIX"},{"key":"ref10","first-page":"693","article-title":"NetHide: Secure and practical network topology obfuscation","author":"meier","year":"2018","journal-title":"Proc Secur Symp USENIX"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2013.303"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00047"},{"key":"ref12","article-title":"Active link obfuscation to thwart link-flooding attacks for Internet of Things","author":"ding","year":"2017","journal-title":"arXiv 1703 09521"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23147"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599803"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995962"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015474"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.65.056109"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.814364"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866411"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04444-1_3"},{"key":"ref3","first-page":"127","article-title":"The crossfire attack","author":"kang","year":"2013","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.3682"},{"key":"ref5","author":"bellovin","year":"2013","journal-title":"A Technical Report From Columbia University"},{"key":"ref8","year":"2016","journal-title":"Large ddos attacks cause outages at twitter spotify and other sites"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660299"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.111002"},{"key":"ref9","year":"2013","journal-title":"Can a DDoS Break the Internet? Sure! Just Not all of it"},{"key":"ref46","year":"2020","journal-title":"CloudFlare"},{"key":"ref45","year":"2020","journal-title":"Open vSwitch NICIRA extension"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"ref47","year":"2020","journal-title":"Pulp"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-019-08746-5"},{"key":"ref41","year":"2005","journal-title":"Abilene Network"},{"key":"ref44","year":"2020","journal-title":"ET Docker"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.47"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/9151439\/09416475.pdf?arnumber=9416475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:52:35Z","timestamp":1652194355000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9416475\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":60,"URL":"https:\/\/doi.org\/10.1109\/tifs.2021.3075845","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}