{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:41Z","timestamp":1750220681109,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T00:00:00Z","timestamp":1619395200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-17-1-0370"],"award-info":[{"award-number":["W911NF-17-1-0370"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,26]]},"DOI":"10.1145\/3422337.3447824","type":"proceedings-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T07:57:52Z","timestamp":1618041472000},"page":"65-76","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Role-Based Deception in Enterprise Networks"],"prefix":"10.1145","author":[{"given":"Iffat","family":"Anjum","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Mu","family":"Zhu","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Isaac","family":"Polinsky","sequence":"additional","affiliation":[{"name":"North Carolina State University, RALEIGH, NC, USA"}]},{"given":"William","family":"Enck","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Munindar P.","family":"Singh","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2021,4,26]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2995959.2995962"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158668"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Mohammed H Almeshekah and Eugene H Spafford. 2016. Cyber security deception. In Cyber deception. 23--50.  Mohammed H Almeshekah and Eugene H Spafford. 2016. Cyber security deception. In Cyber deception. 23--50.","DOI":"10.1007\/978-3-319-32699-3_2"},{"key":"e_1_3_2_2_4_1","volume-title":"Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, and Munindar P Singh.","author":"Anjum Iffat","year":"2020","unstructured":"Iffat Anjum , Mohammad Sujan Miah , Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, and Munindar P Singh. 2020 . Optimizing Vulnerability-Driven Honey Traffic Using Game Theory . arxiv: cs.CR\/2002.09069 Iffat Anjum, Mohammad Sujan Miah, Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, and Munindar P Singh. 2020. Optimizing Vulnerability-Driven Honey Traffic Using Game Theory. arxiv: cs.CR\/2002.09069"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"crossref","unstructured":"Markku Antikainen Tuomas Aura and Mikko S\u00e4rel\u00e4. 2014. Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. In Secure IT Systems Karin Bernsmed and Simone Fischer-H\u00fcbner (Eds.). Springer International Publishing.  Markku Antikainen Tuomas Aura and Mikko S\u00e4rel\u00e4. 2014. Spook in Your Network: Attacking an SDN with a Compromised OpenFlow Switch. In Secure IT Systems Karin Bernsmed and Simone Fischer-H\u00fcbner (Eds.). Springer International Publishing.","DOI":"10.1007\/978-3-319-11599-3_14"},{"key":"e_1_3_2_2_6_1","unstructured":"Michael Backes Goran Doychev and Boris K\u00f6pf. 2013. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In 20textsuperscriptth ISOC Network and Distributed System Security Symposium.  Michael Backes Goran Doychev and Boris K\u00f6pf. 2013. Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In 20textsuperscriptth ISOC Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298314"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491222"},{"key":"e_1_3_2_2_9_1","first-page":"2","article-title":"A System for Generating and Injecting Indistinguishable Network Decoys","volume":"20","author":"Bowen Brian M.","year":"2012","unstructured":"Brian M. Bowen , Vasileios P. Kemerlis , Pratap Prabhu , Angelos D. Keromytis , and Salvatore J. Stolfo . 2012 . A System for Generating and Injecting Indistinguishable Network Decoys . J. Comput. Secur. , Vol. 20 , 2 -- 3 (2012), 199--221. Brian M. Bowen, Vasileios P. Kemerlis, Pratap Prabhu, Angelos D. Keromytis, and Salvatore J. Stolfo. 2012. A System for Generating and Injecting Indistinguishable Network Decoys. J. Comput. Secur., Vol. 20, 2--3 (2012), 199--221.","journal-title":"J. Comput. Secur."},{"key":"e_1_3_2_2_10_1","volume-title":"Rethinking Enterprise Network Control. IEEE\/ACM Transactions on Networking","volume":"17","author":"Casado M.","year":"2009","unstructured":"M. Casado , M. J. Freedman , J. Pettit , J. Luo , N. Gude , N. McKeown , and S. Shenker . 2009 . Rethinking Enterprise Network Control. IEEE\/ACM Transactions on Networking , Vol. 17 ( Aug 2009 ), 1270--1283. M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Gude, N. McKeown, and S. Shenker. 2009. Rethinking Enterprise Network Control. IEEE\/ACM Transactions on Networking, Vol. 17 (Aug 2009), 1270--1283."},{"key":"e_1_3_2_2_11_1","unstructured":"Internet2 Network Operations Center. 1996. Internet2. https:\/\/www.internet2.edu\/  Internet2 Network Operations Center. 1996. Internet2. https:\/\/www.internet2.edu\/"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44885-4_5"},{"key":"e_1_3_2_2_13_1","volume-title":"Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft). 1--6.","author":"Chi Po-Wen","year":"2015","unstructured":"Po-Wen Chi , Chien-Ting Kuo , Jing-Wei Guo , and Chin-Laung Lei . 2015 . How to detect a compromised SDN switch . In Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft). 1--6. Po-Wen Chi, Chien-Ting Kuo, Jing-Wei Guo, and Chin-Laung Lei. 2015. How to detect a compromised SDN switch. In Proceedings of the 1st IEEE Conference on Network Softwarization (NetSoft). 1--6."},{"key":"e_1_3_2_2_14_1","unstructured":"Catalin Cimpanu. 2019. Cisco bungled RV320\/RV325 patches routers still exposed to hacks. ZDNet. https:\/\/www.zdnet.com\/article\/cisco-bungled-rv320rv325-patches-routers-still-exposed-to-hacks\/.  Catalin Cimpanu. 2019. Cisco bungled RV320\/RV325 patches routers still exposed to hacks. ZDNet. https:\/\/www.zdnet.com\/article\/cisco-bungled-rv320rv325-patches-routers-still-exposed-to-hacks\/."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"crossref","unstructured":"Andrew Clark Kun Sun and Radha Poovendran. 2013. Effectiveness of IP address randomization in decoy-based moving target defense. In 52textsuperscriptnd IEEE Conference on Decision and Control. 678--685.  Andrew Clark Kun Sun and Radha Poovendran. 2013. Effectiveness of IP address randomization in decoy-based moving target defense. In 52textsuperscriptnd IEEE Conference on Decision and Control. 678--685.","DOI":"10.1109\/CDC.2013.6759960"},{"volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"Cohen Jacob","key":"e_1_3_2_2_16_1","unstructured":"Jacob Cohen . 1988. Statistical Power Analysis for the Behavioral Sciences second ed.). Routledge Member of the Taylor and Francis Group . Jacob Cohen. 1988. Statistical Power Analysis for the Behavioral Sciences second ed.). Routledge Member of the Taylor and Francis Group."},{"key":"e_1_3_2_2_17_1","volume-title":"SPHINX: Detecting Security Attacks in Software-Defined Networks. In ISOC Network and Distributed System Security Symposium.","author":"Dhawan Mohan","year":"2015","unstructured":"Mohan Dhawan , Rishabh Poddar , Kshiteej Mahajan , and Vijay Mann . 2015 . SPHINX: Detecting Security Attacks in Software-Defined Networks. In ISOC Network and Distributed System Security Symposium. Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, and Vijay Mann. 2015. SPHINX: Detecting Security Attacks in Software-Defined Networks. In ISOC Network and Distributed System Security Symposium."},{"key":"e_1_3_2_2_18_1","first-page":"54","article-title":"Targeted Cyberattacks: A Superset of Advanced Persistent Threats","volume":"11","author":"Enbody R. J.","year":"2013","unstructured":"R. J. Enbody and A. K. Sood . 2013 . Targeted Cyberattacks: A Superset of Advanced Persistent Threats . IEEE Security & Privacy , Vol. 11 (2013), 54 -- 61 . R. J. Enbody and A. K. Sood. 2013. Targeted Cyberattacks: A Superset of Advanced Persistent Threats. IEEE Security & Privacy, Vol. 11 (2013), 54--61.","journal-title":"IEEE Security & Privacy"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation (NSDI'07)","author":"Fonseca Rodrigo","year":"2007","unstructured":"Rodrigo Fonseca , George Porter , Randy H. Katz , Scott Shenker , and Ion Stoica . 2007 . X-trace: A Pervasive Network Tracing Framework . In Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation (NSDI'07) . USENIX Association, 20--20. Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica. 2007. X-trace: A Pervasive Network Tracing Framework. In Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation (NSDI'07). USENIX Association, 20--20."},{"key":"e_1_3_2_2_20_1","unstructured":"Wireshark Foundation. 1998. Wireshark. https:\/\/www.wireshark.org\/.  Wireshark Foundation. 1998. Wireshark. https:\/\/www.wireshark.org\/."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2876019.2876022"},{"key":"e_1_3_2_2_22_1","unstructured":"Graham Holmes. 2015. Evolution of attacks on Cisco IOS devices. https:\/\/blogs.cisco.com\/security\/evolution-of-attacks-on-cisco-ios-devices.  Graham Holmes. 2015. Evolution of attacks on Cisco IOS devices. https:\/\/blogs.cisco.com\/security\/evolution-of-attacks-on-cisco-ios-devices."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2015.2467358"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12)","author":"Kazemian Peyman","year":"2012","unstructured":"Peyman Kazemian , George Varghese , and Nick McKeown . 2012 . Header Space Analysis: Static Checking for Networks . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12) . USENIX Association, USA, 9. Peyman Kazemian, George Varghese, and Nick McKeown. 2012. Header Space Analysis: Static Checking for Networks. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12). USENIX Association, USA, 9."},{"key":"e_1_3_2_2_25_1","first-page":"15","article-title":"VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX","author":"Khurshid Ahmed","year":"2013","unstructured":"Ahmed Khurshid , Xuan Zou , Wenxuan Zhou , Matthew Caesar , and P. Brighten Godfrey . 2013 . VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX , Lombard , IL , 15 -- 27 . Ahmed Khurshid, Xuan Zou, Wenxuan Zhou, Matthew Caesar, and P. Brighten Godfrey. 2013. VeriFlow: Verifying Network-Wide Invariants in Real Time. In Presented as part of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI 13). USENIX, Lombard, IL, 15--27.","journal-title":"Lombard"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the ACM Conference on SIGCOMM. 271--282","author":"Hyun-Jin Kim Tiffany","year":"2014","unstructured":"Tiffany Hyun-Jin Kim , Cristina Basescu , Limin Jia , Soo Bum Lee , Yih-Chun Hu , and Adrian Perrig . 2014 . Lightweight Source Authentication and Path Validation . In Proceedings of the ACM Conference on SIGCOMM. 271--282 . Tiffany Hyun-Jin Kim, Cristina Basescu, Limin Jia, Soo Bum Lee, Yih-Chun Hu, and Adrian Perrig. 2014. Lightweight Source Authentication and Path Validation. In Proceedings of the ACM Conference on SIGCOMM. 271--282."},{"key":"e_1_3_2_2_27_1","volume-title":"Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning. In 22nd Network and Distributed System Security Symposium NDSS.","author":"Kranch Michael","year":"2015","unstructured":"Michael Kranch and Joseph Bonneau . 2015 . Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning. In 22nd Network and Distributed System Security Symposium NDSS. Michael Kranch and Joseph Bonneau. 2015. Upgrading HTTPS in Mid-Air: An Empirical Study of Strict Transport Security and Key Pinning. In 22nd Network and Distributed System Security Symposium NDSS."},{"key":"e_1_3_2_2_28_1","volume-title":"26th USENIX Security Symposium (USENIX Security 17)","author":"Krombholz Katharina","year":"2017","unstructured":"Katharina Krombholz , Wilfired Mayer , Martin Schmiedecker , and Edgar Weippl . 2017 . \" I have No Idea What I'm Doing\" - On the Usability of Deploying HTTPS . In 26th USENIX Security Symposium (USENIX Security 17) . USENIX Association. Katharina Krombholz, Wilfired Mayer, Martin Schmiedecker, and Edgar Weippl. 2017. \"I have No Idea What I'm Doing\" - On the Usability of Deploying HTTPS. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association."},{"key":"e_1_3_2_2_29_1","volume-title":"Proc. 23rd International Conference on Computer Aided Verification (CAV'11)","volume":"6806","author":"Kwiatkowska M.","unstructured":"M. Kwiatkowska , G. Norman , and D. Parker . 2011. PRISM 4.0: Verification of Probabilistic Real-time Systems . In Proc. 23rd International Conference on Computer Aided Verification (CAV'11) , Vol. 6806 . Springer, 585--591. M. Kwiatkowska, G. Norman, and D. Parker. 2011. PRISM 4.0: Verification of Probabilistic Real-time Systems. In Proc. 23rd International Conference on Computer Aided Verification (CAV'11), Vol. 6806. Springer, 585--591."},{"volume-title":"Probabilistic Model Checking: Advances and Applications","author":"Kwiatkowska Marta","key":"e_1_3_2_2_30_1","unstructured":"Marta Kwiatkowska , Gethin Norman , and David Parker . 2018. Probabilistic Model Checking: Advances and Applications . Springer International Publishing , 73--121. Marta Kwiatkowska, Gethin Norman, and David Parker. 2018. Probabilistic Model Checking: Advances and Applications.Springer International Publishing, 73--121."},{"key":"e_1_3_2_2_31_1","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Levin Dan","year":"2014","unstructured":"Dan Levin , Marco Canini , Stefan Schmid , Fabian Schaffert , and Anja Feldmann . 2014 . Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks . In 2014 USENIX Annual Technical Conference (USENIX ATC 14) . Philadelphia, PA, 333--345. Dan Levin, Marco Canini, Stefan Schmid, Fabian Schaffert, and Anja Feldmann. 2014.Panopticon: Reaping the Benefits of Incremental SDN Deployment in Enterprise Networks. In 2014 USENIX Annual Technical Conference (USENIX ATC 14). Philadelphia, PA, 333--345."},{"volume-title":"2011 6th International Conference on Malicious and Unwanted Software. 102--109","author":"Li F.","key":"e_1_3_2_2_32_1","unstructured":"F. Li , A. Lai , and D. Ddl . 2011. Evidence of Advanced Persistent Threat: A case study of malware for political espionage . In 2011 6th International Conference on Malicious and Unwanted Software. 102--109 . F. Li, A. Lai, and D. Ddl. 2011. Evidence of Advanced Persistent Threat: A case study of malware for political espionage. In 2011 6th International Conference on Malicious and Unwanted Software. 102--109."},{"key":"e_1_3_2_2_33_1","volume-title":"Dynamic Packet Forwarding Verification in SDN","author":"Li Q.","year":"2018","unstructured":"Q. Li , X. Zou , Q. Huang , J. Zheng , and P. P. C. Lee . 2018. Dynamic Packet Forwarding Verification in SDN . IEEE Transactions on Dependable and Secure Computing ( 2018 ), 1--1. Q. Li, X. Zou, Q. Huang, J. Zheng, and P. P. C. Lee. 2018. Dynamic Packet Forwarding Verification in SDN. IEEE Transactions on Dependable and Secure Computing (2018), 1--1."},{"volume-title":"2012 Proceedings IEEE INFOCOM. 2390--2398","author":"Ling Z.","key":"e_1_3_2_2_34_1","unstructured":"Z. Ling , J. Luo , Y. Zhang , Ming Yang , X. Fu , and W. Yu . 2012. A novel network delay based side-channel attack: Modeling and defense . In 2012 Proceedings IEEE INFOCOM. 2390--2398 . Z. Ling, J. Luo, Y. Zhang, Ming Yang, X. Fu, and W. Yu. 2012. A novel network delay based side-channel attack: Modeling and defense. In 2012 Proceedings IEEE INFOCOM. 2390--2398."},{"key":"e_1_3_2_2_35_1","volume-title":"An SDN\/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement. IEEE Communications Magazine","volume":"55","author":"Lorenz C.","year":"2017","unstructured":"C. Lorenz , D. Hock , J. Scherer , R. Durner , W. Kellerer , S. Gebert , N. Gray , T. Zinner , and P. Tran-Gia . 2017 . An SDN\/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement. IEEE Communications Magazine , Vol. 55 ( March 2017 ), 217--223. C. Lorenz, D. Hock, J. Scherer, R. Durner, W. Kellerer, S. Gebert, N. Gray, T. Zinner, and P. Tran-Gia. 2017. An SDN\/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement. IEEE Communications Magazine, Vol. 55 (March 2017), 217--223."},{"key":"e_1_3_2_2_36_1","volume-title":"Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. In 26th Network and Distributed System Security Symposium (NDSS).","author":"Luo Meng","year":"2019","unstructured":"Meng Luo , Pierre Laperdrix , Nima Honarmand , and Nick Nikiforakis . 2019 . Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. In 26th Network and Distributed System Security Symposium (NDSS). Meng Luo, Pierre Laperdrix, Nima Honarmand, and Nick Nikiforakis. 2019. Time Does Not Heal All Wounds: A Longitudinal Analysis of Security-Mechanism Support in Mobile Browsers. In 26th Network and Distributed System Security Symposium (NDSS)."},{"volume-title":"Information and Communications Security","author":"Ma Duohe","key":"e_1_3_2_2_37_1","unstructured":"Duohe Ma , Cheng Lei , Liming Wang , Hongqi Zhang , Zhen Xu , and Meng Li. 2016. A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks . In Information and Communications Security . Springer International Publishing , 39--53. Duohe Ma, Cheng Lei, Liming Wang, Hongqi Zhang, Zhen Xu, and Meng Li. 2016. A Self-adaptive Hopping Approach of Moving Target Defense to thwart Scanning Attacks. In Information and Communications Security. Springer International Publishing, 39--53."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_2_39_1","unstructured":"Daniel Miessler. 2019. amass- Automated Attack Surface Mapping. https:\/\/danielmiessler.com\/study\/amass\/.  Daniel Miessler. 2019. amass- Automated Attack Surface Mapping. https:\/\/danielmiessler.com\/study\/amass\/."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.34"},{"key":"e_1_3_2_2_41_1","volume-title":"HONEYSCOPE: IoT Device Protection with Deceptive Network Views,. In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings","author":"Mohamed Reham","year":"2019","unstructured":"Reham Mohamed , Terrance O'Connor , Markus Miettinen , William Enck , and Ahmad-Reza Sadeghi . 2019 . HONEYSCOPE: IoT Device Protection with Deceptive Network Views,. In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings . Springer International Publishing . Reham Mohamed, Terrance O'Connor, Markus Miettinen, William Enck, and Ahmad-Reza Sadeghi. 2019. HONEYSCOPE: IoT Device Protection with Deceptive Network Views,. In Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings. Springer International Publishing."},{"key":"e_1_3_2_2_42_1","volume-title":"Flowmon: Driving Network Visibility. https:\/\/www.flowmon.com\/en\/.","author":"Networks Flowmon","year":"2019","unstructured":"Flowmon Networks . 2019 . Flowmon: Driving Network Visibility. https:\/\/www.flowmon.com\/en\/. Flowmon Networks. 2019. Flowmon: Driving Network Visibility. https:\/\/www.flowmon.com\/en\/."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185474"},{"key":"e_1_3_2_2_44_1","unstructured":"The University of Adelaide. 2010. The Internet Topology Zoo. http:\/\/www.topology-zoo.org\/contact.html  The University of Adelaide. 2010. The Internet Topology Zoo. http:\/\/www.topology-zoo.org\/contact.html"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/774763.774775"},{"key":"e_1_3_2_2_46_1","volume-title":"Symmetry","volume":"10","author":"Park Kyungmin","year":"2018","unstructured":"Kyungmin Park , Samuel Woo , Daesung Moon , and Hoon Choi . 2018 . Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat . Symmetry , Vol. 10 (01 2018), 14. Kyungmin Park, Samuel Woo, Daesung Moon, and Hoon Choi. 2018. Secure Cyber Deception Architecture and Decoy Injection to Mitigate the Insider Threat. Symmetry, Vol. 10 (01 2018), 14."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486022"},{"key":"e_1_3_2_2_48_1","volume-title":"Beauty and the Burst: Remote Identification of Encrypted Video Streams. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Schuster Roei","year":"2017","unstructured":"Roei Schuster , Vitaly Shmatikov , and Eran Tromer . 2017 . Beauty and the Burst: Remote Identification of Encrypted Video Streams. In 26th USENIX Security Symposium (USENIX Security 17) . Vancouver, BC, 1357--1374. Roei Schuster, Vitaly Shmatikov, and Eran Tromer. 2017. Beauty and the Burst: Remote Identification of Encrypted Video Streams. In 26th USENIX Security Symposium (USENIX Security 17). Vancouver, BC, 1357--1374."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3053039"},{"key":"e_1_3_2_2_50_1","volume-title":"Snowden: The NSA planted backdoors in Cisco products. https:\/\/www.infoworld.com\/article\/2608141\/snowden-the-nsa-planted-backdoors-in-cisco-products.html.","author":"Snyder Bill","year":"2014","unstructured":"Bill Snyder . 2014 . Snowden: The NSA planted backdoors in Cisco products. https:\/\/www.infoworld.com\/article\/2608141\/snowden-the-nsa-planted-backdoors-in-cisco-products.html. Bill Snyder. 2014. Snowden: The NSA planted backdoors in Cisco products. https:\/\/www.infoworld.com\/article\/2608141\/snowden-the-nsa-planted-backdoors-in-cisco-products.html."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028798"},{"volume-title":"Sampling-Based Measurement Platform for Commodity SDN. In 2014 IEEE 34th International Conference on Distributed Computing Systems. 228--237","author":"Suh J.","key":"e_1_3_2_2_52_1","unstructured":"J. Suh , T. T. Kwon , C. Dixon , W. Felter , and J. Carter . 2014. OpenSample: A Low-Latency , Sampling-Based Measurement Platform for Commodity SDN. In 2014 IEEE 34th International Conference on Distributed Computing Systems. 228--237 . J. Suh, T. T. Kwon, C. Dixon, W. Felter, and J. Carter. 2014. OpenSample: A Low-Latency, Sampling-Based Measurement Platform for Commodity SDN. In 2014 IEEE 34th International Conference on Distributed Computing Systems. 228--237."},{"key":"e_1_3_2_2_53_1","unstructured":"Hacker Target. 2019. Simplify the security assessment process with hosted vulnerability scanners. https:\/\/hackertarget.com\/.  Hacker Target. 2019. Simplify the security assessment process with hosted vulnerability scanners. https:\/\/hackertarget.com\/."},{"key":"e_1_3_2_2_54_1","unstructured":"Mininet Team. 2018. Mininet An Instant Virtual Network on your Laptop (or other PC). http:\/\/mininet.org\/.  Mininet Team. 2018. Mininet An Instant Virtual Network on your Laptop (or other PC). http:\/\/mininet.org\/."},{"key":"e_1_3_2_2_55_1","volume-title":"Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR","author":"Thimmaraju Kashyap","year":"2016","unstructured":"Kashyap Thimmaraju , Bhargava Shastry , Tobias Fiebig , Felicitas Hetzelt , Jean-Pierre Seifert , Anja Feldmann , and Stefan Schmid . 2016a. Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR ( 2016 ). arxiv: 1610.08717 Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, and Stefan Schmid. 2016a. Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR (2016). arxiv: 1610.08717"},{"key":"e_1_3_2_2_56_1","volume-title":"Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR","author":"Thimmaraju Kashyap","year":"2016","unstructured":"Kashyap Thimmaraju , Bhargava Shastry , Tobias Fiebig , Felicitas Hetzelt , Jean-Pierre Seifert , Anja Feldmann , and Stefan Schmid . 2016b. Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR , Vol. abs\/ 1610 .08717 ( 2016 ). Kashyap Thimmaraju, Bhargava Shastry, Tobias Fiebig, Felicitas Hetzelt, Jean-Pierre Seifert, Anja Feldmann, and Stefan Schmid. 2016b. Reigns to the Cloud: Compromising Cloud Systems via the Data Plane. CoRR, Vol. abs\/1610.08717 (2016)."},{"volume-title":"2014 IEEE Network Operations and Management Symposium (NOMS). 1--8.","author":"van Adrichem N. L. M.","key":"e_1_3_2_2_57_1","unstructured":"N. L. M. van Adrichem , C. Doerr , and F. A. Kuipers . 2014. OpenNetMon: Network monitoring in OpenFlow Software-Defined Networks . In 2014 IEEE Network Operations and Management Symposium (NOMS). 1--8. N. L. M. van Adrichem, C. Doerr, and F. A. Kuipers. 2014. OpenNetMon: Network monitoring in OpenFlow Software-Defined Networks. In 2014 IEEE Network Operations and Management Symposium (NOMS). 1--8."},{"key":"e_1_3_2_2_58_1","volume-title":"Swing: Realistic and Responsive Network Traffic Generation","author":"Vishwanath K. V.","year":"2009","unstructured":"K. V. Vishwanath and A. Vahdat . 2009 . Swing: Realistic and Responsive Network Traffic Generation . IEEE\/ACM Transactions on Networking , Vol. 17 (June 2009), 712--725. K. V. Vishwanath and A. Vahdat. 2009. Swing: Realistic and Responsive Network Traffic Generation. IEEE\/ACM Transactions on Networking, Vol. 17 (June 2009), 712--725."},{"volume-title":"FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 239--250","author":"Wang H.","key":"e_1_3_2_2_59_1","unstructured":"H. Wang , L. Xu , and G. Gu . 2015 . FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 239--250 . H. Wang, L. Xu, and G. Gu. 2015. FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In 2015 45th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks. 239--250."},{"key":"e_1_3_2_2_60_1","unstructured":"GenShen Ye. 2018. 75 000 +MikroTik Routers Are Forwarding Owners' Traffic to the Attackers How is Yours? Netlab 360. https:\/\/blog.netlab.360.com\/7500-mikrotik-routers-are-forwarding-owners-traffic-to-the-attackers-how-is-yours-en\/.  GenShen Ye. 2018. 75 000 +MikroTik Routers Are Forwarding Owners' Traffic to the Attackers How is Yours? Netlab 360. https:\/\/blog.netlab.360.com\/7500-mikrotik-routers-are-forwarding-owners-traffic-to-the-attackers-how-is-yours-en\/."},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.05.005"},{"volume-title":"Research in Attacks, Intrusions, and Defenses,","author":"Zhang Menghao","key":"e_1_3_2_2_62_1","unstructured":"Menghao Zhang , Guanyu Li , Lei Xu , Jun Bi , Guofei Gu , and Jiasong Bai . 2018. Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures . In Research in Attacks, Intrusions, and Defenses, , Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Springer International Publishing , 161--183. Menghao Zhang, Guanyu Li, Lei Xu, Jun Bi, Guofei Gu, and Jiasong Bai. 2018. Control Plane Reflection Attacks in SDNs: New Attacks and Countermeasures. In Research in Attacks, Intrusions, and Defenses,, Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, and Sotiris Ioannidis (Eds.). Springer International Publishing, 161--183."},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2859483"}],"event":{"name":"CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Virtual Event USA","acronym":"CODASPY '21"},"container-title":["Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447824","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3422337.3447824","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447824","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3422337.3447824","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:03:21Z","timestamp":1750197801000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3422337.3447824"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,26]]},"references-count":63,"alternative-id":["10.1145\/3422337.3447824","10.1145\/3422337"],"URL":"https:\/\/doi.org\/10.1145\/3422337.3447824","relation":{},"subject":[],"published":{"date-parts":[[2021,4,26]]},"assertion":[{"value":"2021-04-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}