{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:05:49Z","timestamp":1758845149049,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":15,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2684793.2684797","type":"proceedings-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T13:51:05Z","timestamp":1418997065000},"page":"23-30","source":"Crossref","is-referenced-by-count":12,"title":["Security Analysis of Security Applications for Software Defined Networks"],"prefix":"10.1145","author":[{"given":"Markus","family":"Tasch","sequence":"first","affiliation":[]},{"given":"Rahamatullah","family":"Khondoker","sequence":"additional","affiliation":[]},{"given":"Ronald","family":"Marx","sequence":"additional","affiliation":[]},{"given":"Kpatcha","family":"Bayarou","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"key":"key-10.1145\/2684793.2684797-1","unstructured":"Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). http:\/\/www.cert.org\/resilience\/products-services\/octave\/index.cfm. accessed: 21.06.2014."},{"key":"key-10.1145\/2684793.2684797-2","doi-asserted-by":"crossref","unstructured":"R. Arends, R. Austein, D. Larson, M. Massey, and S. Rose. RFC 4033: DNS Security Introduction and Requirements. http:\/\/tools.ietf.org\/rfc\/rfc4033.txt, March 2005. accessed: 21.06.2014.","DOI":"10.17487\/rfc4033"},{"key":"key-10.1145\/2684793.2684797-3","unstructured":"M. Brandt, R. Khondoker, R. Marx, and K. Bayarou. Security Analysis of Software Defined Networking Protocols---OpenFlow, OF-Config and OVSDB. In The 2014 IEEE Fifth International Conference on Communications and Electronics (ICCE 2014), DA NANG, Vietnam, July 2014."},{"key":"key-10.1145\/2684793.2684797-4","doi-asserted-by":"crossref","unstructured":"T. Dierks and E. Rescorla. RFC 5246: The Transport Layer Security (TLS) Protocol Version 1.2. http:\/\/tools.ietf.org\/html\/rfc5246, August 2008. accessed: 21.06.2014.","DOI":"10.17487\/rfc5246"},{"key":"key-10.1145\/2684793.2684797-5","unstructured":"S. Hernan, S. Lambert, T. Ostwald, and A. Shostack. Uncover Security Design Flaws Using The STRIDE Approach. http:\/\/msdn.microsoft.com\/en-us\/magazine\/cc163519.aspx, Nov. 2006. accessed: 21.06.2014."},{"key":"key-10.1145\/2684793.2684797-6","unstructured":"M. Howard and D. E. Leblanc. Writing Secure Code. Microsoft Press, Redmond, WA, USA, 2nd edition, 2002."},{"key":"key-10.1145\/2684793.2684797-7","doi-asserted-by":"crossref","unstructured":"J. H. Jafarian, E. Al-Shaer, and Q. Duan. Openflow Random Host Mutation: Transparent Moving Target Defense Using Software Defined Networking. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN '12, pages 127--132, New York, NY, USA, 2012. ACM.","DOI":"10.1145\/2342441.2342467"},{"key":"key-10.1145\/2684793.2684797-8","doi-asserted-by":"crossref","unstructured":"N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner. OpenFlow: Enabling Innovation in Campus Networks. SIGCOMM Comput. Commun. Rev., 38(2):69--74, Mar. 2008.","DOI":"10.1145\/1355734.1355746"},{"key":"key-10.1145\/2684793.2684797-9","doi-asserted-by":"crossref","unstructured":"A. K. Nayak, A. Reimers, N. Feamster, and R. Clark. Resonance: Dynamic Access Control for Enterprise Networks. In Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, WREN '09, pages 11--18, New York, NY, USA, 2009. ACM.","DOI":"10.1145\/1592681.1592684"},{"key":"key-10.1145\/2684793.2684797-10","unstructured":"Open Networking Foundation. OpenFlow Switch Specification version 1.4. https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/onf-specifications\/openflow\/openflow-spec-v1.4.0.pdf, October 2013. accessed: 21.06.2014."},{"key":"key-10.1145\/2684793.2684797-11","doi-asserted-by":"crossref","unstructured":"P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu. A Security Enforcement Kernel for OpenFlow Networks. In Proceedings of the First Workshop on Hot Topics in Software Defined Networks, HotSDN '12, pages 121--126, New York, NY, USA, 2012. ACM.","DOI":"10.1145\/2342441.2342466"},{"key":"key-10.1145\/2684793.2684797-12","unstructured":"P. Saitta, B. Larcom, and M. Eddington. Trike v.1 methodology document [draft]. http:\/\/octotrike.org\/, 2005. accessed: 21.06.2014."},{"key":"key-10.1145\/2684793.2684797-13","doi-asserted-by":"crossref","unstructured":"S. Scott-Hayward, G. O'Callaghan, and S. Sezer. Sdn security: A survey. In 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pages 1--7, Nov 2013.","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"key-10.1145\/2684793.2684797-14","unstructured":"S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu, and M. Tyson. FRESCO: Modular Composable Security Services for Software-Defined Networks. In NDSS. The Internet Society, 2013."},{"key":"key-10.1145\/2684793.2684797-15","doi-asserted-by":"crossref","unstructured":"Y. Wang, Y. Zhang, V. Singh, C. Lumezanu, and G. Jiang. NetFuse: Short-circuiting traffic surges in the cloud. In 2013 IEEE International Conference on Communications (ICC), pages 3514--3518, June 2013.","DOI":"10.1109\/ICC.2013.6655095"}],"event":{"number":"14","sponsor":["SIGCOMM, ACM Special Interest Group on Data Communication","AIOT, Asian Institute of Technology"],"acronym":"AINTEC '14","name":"the AINTEC 2014","start":{"date-parts":[[2014,11,26]]},"location":"Chiang Mai, Thailand","end":{"date-parts":[[2014,11,28]]}},"container-title":["Proceedings of the AINTEC 2014 on Asian Internet Engineering Conference - AINTEC '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2684793.2684797","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2684797&amp;ftid=1522815&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:13:41Z","timestamp":1750227221000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2684793.2684797"}},"subtitle":[],"proceedings-subject":"Asian Internet Engineering Conference","short-title":[],"issued":{"date-parts":[[2014]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1145\/2684793.2684797","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}