{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T15:47:21Z","timestamp":1774021641574,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,6]],"date-time":"2019-11-06T00:00:00Z","timestamp":1572998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,6]]},"DOI":"10.1145\/3319535.3354194","type":"proceedings-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T13:08:32Z","timestamp":1573132112000},"page":"1101-1114","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["An In-depth Look Into SDN Topology Discovery Mechanisms"],"prefix":"10.1145","author":[{"given":"Eduard","family":"Marin","sequence":"first","affiliation":[{"name":"University of Birmingham (UK) and imec-COSIC, KU Leuven (Belgium), Birmingham, United Kingdom"}]},{"given":"Nicola","family":"Bucciol","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"University of Padua, Padua, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,11,6]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Flow scalability per broadcom chipset. https:\/\/docs.pica8.com\/display\/ picos2102cg\/Flow+Scalability+per+Broadcom+Chipset [Online","year":"2018"},{"key":"e_1_3_2_2_2_1","first-page":"3542","volume-title":"Comparative Analysis of Control Plane Security of SDN and Conventional Networks. IEEE Communications Surveys Tutorials","author":"Abdou A.","year":"2018"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2015.7366363"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98989-1_23"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2626287"},{"key":"e_1_3_2_2_6_1","volume-title":"CoRR","author":"Azzouni A."},{"key":"e_1_3_2_2_7_1","first-page":"344","volume-title":"Distance-bounding Protocols. In International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT).","author":"Brands S.","year":"1994"},{"key":"e_1_3_2_2_8_1","first-page":"19","volume-title":"USENIX Security Symposium.","author":"Cao J.","year":"2019"},{"key":"e_1_3_2_2_9_1","first-page":"150","volume-title":"The Case for Making Tight Control Plane Latency Guarantees in SDN Switches. In Symposium on SDN Research (SOSR).","author":"Chen H.","year":"2017"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018466"},{"key":"e_1_3_2_2_11_1","first-page":"8","volume-title":"SPHINX: Detecting Security Attacks in Software-Defined Networks. In Network and Distributed System Security Symposium (NDSS).","author":"Dhawan M.","year":"2015"},{"key":"e_1_3_2_2_12_1","volume-title":"Raspberry Pi 3 Model B. https:\/\/www.raspberrypi. org\/products\/raspberry-pi-3-model-b\/ [Online","author":"Foundation Raspberry Pi","year":"2018"},{"key":"e_1_3_2_2_13_1","unstructured":"Linux Fundation. Open vSwitch version 2.5.5 LTS. http:\/\/openvswitch.org\/ releases\/openvswitch-2.5.5.tar.gz [Online; accessed 7-Dec-2018].  Linux Fundation. Open vSwitch version 2.5.5 LTS. http:\/\/openvswitch.org\/ releases\/openvswitch-2.5.5.tar.gz [Online; accessed 7-Dec-2018]."},{"key":"e_1_3_2_2_14_1","first-page":"1","volume-title":"Measuring Control Plane Latency in SDN-enabled Switches. In Symposium on SDN Research (SOSR).","author":"He K.","year":"2015"},{"key":"e_1_3_2_2_15_1","first-page":"8","volume-title":"Poisoning Network Visibility in SoftwareDefined Networks: New Attacks and Countermeasures. In Network and Distributed System Security Symposium (NDSS).","author":"Hong S.","year":"2015"},{"key":"e_1_3_2_2_16_1","volume-title":"IEEE Standard for Ethernet","author":"IEEE.","year":"2015"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486019"},{"key":"e_1_3_2_2_18_1","first-page":"311","volume-title":"BEADS: Automated Attack Discovery in OpenFlow-Based SDN Systems. In Symposium on Research in Attacks, Intrusions, and Defenses (RAID).","author":"Jero S.","year":"2017"},{"key":"e_1_3_2_2_19_1","first-page":"415","volume-title":"Identifier Binding Attacks and Defenses in Software-Defined Networks. In USENIX Security Symposium.","author":"Jero S.","year":"2017"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890969"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2011.6077015"},{"key":"e_1_3_2_2_22_1","unstructured":"J. King and K. Lauerman. 2014. ARP poisoning attack and mitigation techniques. https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/switches\/ catalyst-6500-series-switches\/white_paper_c11_603839.html [Online; accessed 7-Dec-2018].  J. King and K. Lauerman. 2014. ARP poisoning attack and mitigation techniques. https:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/switches\/ catalyst-6500-series-switches\/white_paper_c11_603839.html [Online; accessed 7-Dec-2018]."},{"key":"e_1_3_2_2_23_1","first-page":"1","volume-title":"IEEE International Conference on Network Protocols (ICNP).","author":"Kloti R."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"e_1_3_2_2_25_1","first-page":"10","author":"Kreutz D.","year":"2014","journal-title":"Software-Defined Networking: A Comprehensive Survey. In ArXiv e-prints"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675011"},{"key":"e_1_3_2_2_27_1","volume-title":"Porras. DELTA: A Security Assessment Framework for Software-Defined Networks. In Network and Distributed System Security Symposium (NDSS)","author":"Lee S.","year":"2017"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3781"},{"key":"e_1_3_2_2_30_1","volume-title":"http:\/\/www.projectfloodlight.org\/ floodlight\/ [Online","author":"Networks Big Switch","year":"2018"},{"key":"e_1_3_2_2_31_1","volume-title":"Floodlight Git repository. https:\/\/github.com\/ floodlight\/floodlight [Online","author":"Networks Big Switch","year":"2018"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890123"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.013"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2865"},{"key":"e_1_3_2_2_35_1","first-page":"1","volume-title":"SDNsec: Forwarding Accountability for the SDN Data Plane. In International Conference on Computer Communication and Networks (ICCCN).","author":"Sasaki T.","year":"2016"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/LANMAN.2013.6528283"},{"key":"e_1_3_2_2_37_1","volume-title":"FRESCO: Modular Composable Security Services for Software-Defined Networks. In Annual Network and Distributed System Security Symposium (NDSS)","author":"Shin S.","year":"2013"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"e_1_3_2_2_39_1","first-page":"792","volume-title":"Annual International Conference on Mobile Computing and Networking (MobiCom).","author":"Shrivastava P.","year":"2018"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00047"},{"key":"e_1_3_2_2_41_1","first-page":"89","volume-title":"Timing-based Reconnaissance and Defense in Software-defined Networks. In Annual Conference on Computer Security Applications (ACSAC).","author":"Sonchack J.","year":"2016"},{"key":"e_1_3_2_2_42_1","volume-title":"The State of the Art in DNS Spoofing. In International Conference on Applied Cryptography and Network Security (ACNS)","author":"Steinhoff A.","year":"2006"},{"key":"e_1_3_2_2_43_1","volume-title":"http:\/\/mininet.org [Online","author":"Team Mininet","year":"2018"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2017.21"},{"key":"e_1_3_2_2_45_1","first-page":"648","volume-title":"Cross-App Poisoning in SoftwareDefined Networking. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Ujcich B. E.","year":"2018"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674005.2675002"},{"key":"e_1_3_2_2_47_1","first-page":"3","volume-title":"Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era. In ACM SIGSAC Conference on Computer and Communications Security (CCS).","author":"Wang H.","year":"2018"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2016.7784436"},{"key":"e_1_3_2_2_49_1","volume-title":"https:\/\/github.com\/xuraylei\/TopoGuard_Plus [Online","author":"Lei Xu.","year":"2018"},{"key":"e_1_3_2_2_50_1","first-page":"451","volume-title":"USENIX Security Symposium.","author":"Xu L.","year":"2017"},{"key":"e_1_3_2_2_51_1","author":"Xue L.","year":"2018","journal-title":"LinkScope: Towards Detecting Target Link Flooding Attacks. IEEE Transactions on Information Forensics and Security (TIFS)"},{"key":"e_1_3_2_2_52_1","first-page":"136","volume-title":"On scalability of softwaredefined networking","author":"Yeganeh S. Hassas","year":"2013"},{"key":"e_1_3_2_2_53_1","first-page":"351","volume-title":"Scalable Flow-based Networking with DIFANE. In ACM SIGCOMM Conference.","author":"Yu M.","year":"2010"},{"key":"e_1_3_2_2_54_1","volume-title":"Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. In Symposium on Research in Attacks, Intrusions and Defenses (RAID)","author":"Zhang M.","year":"2018"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8056994"}],"event":{"name":"CCS '19: 2019 ACM SIGSAC Conference on Computer and Communications Security","location":"London United Kingdom","acronym":"CCS '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354194","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3319535.3354194","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:24:02Z","timestamp":1750202642000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3319535.3354194"}},"subtitle":["Novel Attacks and Practical Countermeasures"],"short-title":[],"issued":{"date-parts":[[2019,11,6]]},"references-count":55,"alternative-id":["10.1145\/3319535.3354194","10.1145\/3319535"],"URL":"https:\/\/doi.org\/10.1145\/3319535.3354194","relation":{},"subject":[],"published":{"date-parts":[[2019,11,6]]},"assertion":[{"value":"2019-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}