{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:50:56Z","timestamp":1774540256485,"version":"3.50.1"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"National 973 Fundamental Basic Research Program","award":["2014CB340600"],"award-info":[{"award-number":["2014CB340600"]}]},{"DOI":"10.13039\/501100017607","name":"Shenzhen Fundamental Research Program","doi-asserted-by":"crossref","award":["JCYJ20170413114215614"],"award-info":[{"award-number":["JCYJ20170413114215614"]}],"id":[{"id":"10.13039\/501100017607","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2019,3,1]]},"DOI":"10.1109\/tsc.2016.2602861","type":"journal-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T18:17:46Z","timestamp":1472149066000},"page":"231-246","source":"Crossref","is-referenced-by-count":87,"title":["Defending Against Flow Table Overloading Attack in Software-Defined Networks"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5365-904X","authenticated-orcid":false,"given":"Bin","family":"Yuan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8534-5048","authenticated-orcid":false,"given":"Deqing","family":"Zou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4485-6743","authenticated-orcid":false,"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3934-7605","authenticated-orcid":false,"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4390-3819","authenticated-orcid":false,"given":"Weizhong","family":"Qiang","sequence":"additional","affiliation":[]},{"given":"Jinan","family":"Shen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"Introduction to queueing theory and stochastic teletraffic models","volume":"abs 1307 2968","author":"zukerman","year":"2013","journal-title":"CoRR"},{"key":"ref38","first-page":"1530","article-title":"Detecting SYN flooding attacks","volume":"3","author":"wang","year":"2002","journal-title":"Proc 21st Annu Joint Conf IEEE Comput Commun Soc"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/505680.505683"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"key":"ref31","year":"0"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535373"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5182-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316229"},{"key":"ref28","article-title":"Implementation of content-oriented networking architecture (CONA): A focus on DDoS countermeasure","author":"suh","year":"2010","journal-title":"Proc of the European NetFPGA Developers Workshop"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2014.99"},{"key":"ref2","article-title":"Software-defined networking: The new norm for networks","year":"0"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2602204.2602219"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195714"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2012.2194508"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2007.1111"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1132026.1132027"},{"key":"ref23","first-page":"7","article-title":"My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging","author":"fabian","year":"2007","journal-title":"Proc 1st Workshop on Hot Topics in Understanding Botnets"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.262"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842221"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1214\/13-AOAS710"},{"key":"ref51","year":"0"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018443"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1145\/2745844.2745880","article-title":"Latency in software defined networks: Measurements and mitigation techniques","author":"he","year":"2015","journal-title":"Proc ACM SIGMETRICS Int Conf Meas Modeling Comput Syst"},{"key":"ref52","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref40","volume":"1","author":"kleinrock","year":"1975","journal-title":"Queueing Systems Theory"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2002.1181418"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948116"},{"key":"ref18","article-title":"Implementing pushback: Router-based defense against DDoS attacks","author":"ioannidis","year":"2002","journal-title":"Proc 9th ISOC Netw Distrib Syst Secur Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848111"},{"key":"ref5","article-title":"penFlow switch specification version 1.4.0","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566832"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2012.16"},{"key":"ref49","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","article-title":"Power-law distributions in empirical data","volume":"51","author":"clauset","year":"2009","journal-title":"SIAM Rev"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018466"},{"key":"ref46","first-page":"1","article-title":"Can the production network be the testbed?","volume":"10","author":"sherwood","year":"2010","journal-title":"Proc 9th USENIX Conf Operating Syst Des Implementation"},{"key":"ref45","first-page":"146","article-title":"Evaluation of data center network structures considering routing methods","author":"shimotsuma","year":"2013","journal-title":"Proc 9th Int Conf Netw Services"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330110"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018467"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11134-009-9147-4"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848207"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834085"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/8684339\/07552587.pdf?arnumber=7552587","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:54:12Z","timestamp":1657745652000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7552587\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,1]]},"references-count":55,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2016.2602861","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"value":"1939-1374","type":"electronic"},{"value":"2372-0204","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,1]]}}}