{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:46:45Z","timestamp":1750308405845,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,15]],"date-time":"2019-11-15T00:00:00Z","timestamp":1573776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,15]]},"DOI":"10.1145\/3371676.3371706","type":"proceedings-article","created":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T04:40:36Z","timestamp":1578976836000},"page":"154-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Mitigating Flow Table Overloading Attack with Controller-based Flow Filtering Strategy in SDN"],"prefix":"10.1145","author":[{"given":"Phan The","family":"Duy","sequence":"first","affiliation":[{"name":"Information Security Lab, University of Information Technology, VNU-HCM, Hochiminh City, Vietnam"}]},{"given":"Le Duy","family":"An","sequence":"additional","affiliation":[{"name":"Information Security Lab, University of Information Technology, VNU-HCM, Hochiminh City, Vietnam"}]},{"given":"Van-Hau","family":"Pham","sequence":"additional","affiliation":[{"name":"Information Security Lab, University of Information Technology, VNU-HCM, Hochiminh City, Vietnam"}]}],"member":"320","published-online":{"date-parts":[[2020,1,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"04","article-title":"A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures","volume":"2016","author":"Li Wenjuan","year":"2016","unstructured":"Wenjuan Li , Weizhi Meng and Lam For Kwok . 2016 . A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures , Journal of Network and Computer Applications. DOI= http:\/\/dx.doi.org\/10.1016\/j.jnca. 2016 . 04 .011 10.1016\/j.jnca.2016.04.011 Wenjuan Li, Weizhi Meng and Lam For Kwok. 2016. A Survey on OpenFlow-based Software Defined Networks: Security Challenges and Countermeasures, Journal of Network and Computer Applications. DOI= http:\/\/dx.doi.org\/10.1016\/j.jnca.2016.04.011","journal-title":"Journal of Network and Computer Applications. DOI= http:\/\/dx.doi.org\/10.1016\/j.jnca."},{"key":"e_1_3_2_1_2_1","unstructured":"https:\/\/www.opennetworking.org\/  https:\/\/www.opennetworking.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Hping3 https:\/\/tools.kali.org\/information-gathering\/hping3  Hping3 https:\/\/tools.kali.org\/information-gathering\/hping3"},{"key":"e_1_3_2_1_4_1","unstructured":"Scapy https:\/\/scapy.net\/  Scapy https:\/\/scapy.net\/"},{"key":"e_1_3_2_1_5_1","volume-title":"European Conference on Networks and Communications (EuCNC). DOI= https:\/\/doi.org\/10","author":"Qian Y.","year":"2016","unstructured":"Y. Qian , W. You , K. Qian . 2016 . OpenFlow flow table overflow attacks and countermeasures. 2016 . European Conference on Networks and Communications (EuCNC). DOI= https:\/\/doi.org\/10 .1109\/NETSOFT.2017.8004229 10.1109\/NETSOFT.2017.8004229 Y. Qian, W. You, K. Qian. 2016. OpenFlow flow table overflow attacks and countermeasures. 2016. European Conference on Networks and Communications (EuCNC). DOI= https:\/\/doi.org\/10.1109\/NETSOFT.2017.8004229"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3132015"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2017.8004229"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOIN.2015.7057902"},{"key":"e_1_3_2_1_9_1","unstructured":"Prabhakar Krishnan Jisha S Najeem. 2017. A Review Of Security Threats And Mitigation Solutions For SDN Stack. International Journal of Pure and Applied Mathematics.  Prabhakar Krishnan Jisha S Najeem. 2017. A Review Of Security Threats And Mitigation Solutions For SDN Stack. International Journal of Pure and Applied Mathematics."},{"volume-title":"A Survey of Security in Software Defined Networks","author":"S.","key":"e_1_3_2_1_10_1","unstructured":"Scott-Hayward, S., Natarajan, S., & Sezer, S. 2016. A Survey of Security in Software Defined Networks . IEEE Communications Surveys and Tutorials . DOI= https:\/\/doi.org\/10.1109\/COMST.2015.2453114 10.1109\/COMST.2015.2453114 Scott-Hayward, S., Natarajan, S., & Sezer, S. 2016. A Survey of Security in Software Defined Networks. IEEE Communications Surveys and Tutorials. DOI= https:\/\/doi.org\/10.1109\/COMST.2015.2453114"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"N. Dayal P. Maity S. Srivastava R. Khondoker. Research trends in security and DDoS in SDN. Security and Communication Networks. DOI= https:\/\/doi.org\/10.1002\/sec.1759    10.1002\/sec.1759\nN. Dayal P. Maity S. Srivastava R. Khondoker. Research trends in security and DDoS in SDN. Security and Communication Networks. DOI= https:\/\/doi.org\/10.1002\/sec.1759","DOI":"10.1002\/sec.1759"},{"key":"e_1_3_2_1_12_1","volume-title":"MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments. IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). DOI= http:\/\/10","author":"Peuster M.","year":"2016","unstructured":"M. Peuster , H. Karl , and S. v. Rossem . 2016 . MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments. IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). DOI= http:\/\/10 .0.4.85\/NFV-SDN.2016.7919490 M. Peuster, H. Karl, and S. v. Rossem. 2016. MeDICINE: Rapid Prototyping of Production-Ready Network Services in Multi-PoP Environments. IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). DOI= http:\/\/10.0.4.85\/NFV-SDN.2016.7919490"},{"key":"e_1_3_2_1_13_1","unstructured":"Mininet http:\/\/mininet.org\/  Mininet http:\/\/mininet.org\/"},{"key":"e_1_3_2_1_14_1","unstructured":"Docker https:\/\/www.docker.com\/  Docker https:\/\/www.docker.com\/"},{"key":"e_1_3_2_1_15_1","unstructured":"Floodlight http:\/\/www.projectfloodlight.org\/floodlight\/  Floodlight http:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"e_1_3_2_1_16_1","first-page":"177","volume-title":"NAFOSTED Conference on Information and Computer Science (NICS), Ho Chi Minh City.","author":"Duy P. T.","year":"2018","unstructured":"P. T. Duy , D. T. T. Hien and V. Pham . 2018. A role-based statistical mechanism for DDoS attack detection in SDN . NAFOSTED Conference on Information and Computer Science (NICS), Ho Chi Minh City. pp. 177 -- 182 . DOI=10.1109\/NICS. 2018 .8606851 P. T. Duy, D. T. T. Hien and V. Pham. 2018. A role-based statistical mechanism for DDoS attack detection in SDN. NAFOSTED Conference on Information and Computer Science (NICS), Ho Chi Minh City. pp. 177--182. DOI=10.1109\/NICS.2018.8606851"}],"event":{"name":"ICCNS 2019: 2019 the 9th International Conference on Communication and Network Security","sponsor":["University of Tokyo","Chongqing University of Posts and Telecommunications"],"location":"Chongqing China","acronym":"ICCNS 2019"},"container-title":["Proceedings of the 2019 9th International Conference on Communication and Network Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371706","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3371676.3371706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:45:23Z","timestamp":1750268723000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3371676.3371706"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,15]]},"references-count":16,"alternative-id":["10.1145\/3371676.3371706","10.1145\/3371676"],"URL":"https:\/\/doi.org\/10.1145\/3371676.3371706","relation":{},"subject":[],"published":{"date-parts":[[2019,11,15]]},"assertion":[{"value":"2020-01-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}