{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T06:31:09Z","timestamp":1769063469201,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,12,19]],"date-time":"2022-12-19T00:00:00Z","timestamp":1671408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,12,19]]},"DOI":"10.1145\/3570748.3570757","type":"proceedings-article","created":{"date-parts":[[2022,12,9]],"date-time":"2022-12-09T20:59:42Z","timestamp":1670619582000},"page":"62-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Fast Blocking of Malicious Traffic by Excluding Benign Flow Monitoring in IDS\/SDN Cooperative Firewall Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1137-3497","authenticated-orcid":false,"given":"Akihiro","family":"Takai","sequence":"first","affiliation":[{"name":"Graduate School of Engineering, Tokyo University of Agriculture and Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2651-2701","authenticated-orcid":false,"given":"Nariyoshi","family":"Yamai","sequence":"additional","affiliation":[{"name":"Institute of Engineering, Tokyo University of Agriculture and Technology, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5072-298X","authenticated-orcid":false,"given":"Rei","family":"Nakagawa","sequence":"additional","affiliation":[{"name":"Institute of Engineering, Tokyo University of Agriculture and Technology, Japan"}]}],"member":"320","published-online":{"date-parts":[[2022,12,19]]},"reference":[{"issue":"465","key":"e_1_3_2_1_1_1","first-page":"S2018","article-title":"Proposal of real-time brute-force attack detection and blocking system using software switch","volume":"118","author":"Katsura Y.","year":"2019","unstructured":"[ 1 ] Y. Katsura , H. Kimiyama , T. Tsutsumi , N. Yonezaki , J. Ichikawa and M. Maruyama , \u201c Proposal of real-time brute-force attack detection and blocking system using software switch \u201d, IEICE Technical Report , Vol. 118 , No. 465 , N S2018 - S2272 , pp. 461-464, 2019 (in Japanese). [1] Y. Katsura, H. Kimiyama, T. Tsutsumi, N. Yonezaki, J. Ichikawa and M. Maruyama, \u201cProposal of real-time brute-force attack detection and blocking system using software switch\u201d, IEICE Technical Report, Vol. 118, No. 465, NS2018-272, pp. 461-464, 2019 (in Japanese).","journal-title":"IEICE Technical Report"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT53585.2022.9728831"},{"key":"e_1_3_2_1_4_1","unstructured":"[\n  4\n  ]  Ryu SDN Framework. https:\/\/ryu-sdn.org\/  [4] Ryu SDN Framework. https:\/\/ryu-sdn.org\/"},{"key":"e_1_3_2_1_5_1","first-page":"1236","volume-title":"Mobile Symposium, Information Processing Society of Japan","author":"Cooperating Firewall SDN","year":"2021","unstructured":"[ 5 ] \u201dHigh Speed Blocking in IDS- SDN Cooperating Firewall Systems by Introducing Multiple IDSs\u201d (in Japanese), Multimedia, Distributed, Cooperative, and Mobile Symposium, Information Processing Society of Japan , pp.1233\u2013 1236 , June 30 \u2013 July 2, 2021 . [5] \u201dHigh Speed Blocking in IDS-SDN Cooperating Firewall Systems by Introducing Multiple IDSs\u201d (in Japanese), Multimedia, Distributed, Cooperative, and Mobile Symposium, Information Processing Society of Japan, pp.1233\u20131236, June 30 \u2013 July 2, 2021."},{"key":"e_1_3_2_1_6_1","unstructured":"[\n  6\n  ]  Snort - Network Intrusion Detection & Prevention System. https:\/\/snort.org\/  [6] Snort - Network Intrusion Detection & Prevention System. https:\/\/snort.org\/"},{"key":"e_1_3_2_1_7_1","unstructured":"[\n  7\n  ]  Suricata: Home. https:\/\/suricata.io\/  [7] Suricata: Home. https:\/\/suricata.io\/"},{"key":"e_1_3_2_1_8_1","first-page":"1124","volume-title":"Korea (South)","author":"Nam K.","year":"2018","unstructured":"[ 8 ] K. Nam and K. Kim , \" A Study on SDN security enhancement using open source IDS\/IPS Suricata,\" 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju , Korea (South) , 2018 , pp. 1124 - 1126 . [8] K. Nam and K. Kim, \"A Study on SDN security enhancement using open source IDS\/IPS Suricata,\" 2018 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), 2018, pp. 1124-1126."},{"key":"e_1_3_2_1_9_1","unstructured":"[\n  9\n  ]  RFC 5424 - The Syslog Protocol. https:\/\/datatracker.ietf.org\/doc\/html\/rfc5424.  [9] RFC 5424 - The Syslog Protocol. https:\/\/datatracker.ietf.org\/doc\/html\/rfc5424."},{"key":"e_1_3_2_1_10_1","unstructured":"[\n  10\n  ]  Raspberry Pi Foundation. Raspberry Pi 3 Model B+ product brief. https:\/\/static.raspberrypi.org\/files\/product-briefs\/200206+Raspberry+Pi+3 +Model+B+plus+Product+Brief+PRINT&DIGITAL.pdf.  [10] Raspberry Pi Foundation. Raspberry Pi 3 Model B+ product brief. https:\/\/static.raspberrypi.org\/files\/product-briefs\/200206+Raspberry+Pi+3 +Model+B+plus+Product+Brief+PRINT&DIGITAL.pdf."},{"key":"e_1_3_2_1_11_1","unstructured":"[\n  11\n  ]  Raspberry Pi Foundation. Raspberry Pi 4 Model B product brief. https:\/\/static.raspberrypi.org\/files\/product-briefs\/200521+Raspberry+Pi+4+ Product+Brief.pdf.  [11] Raspberry Pi Foundation. Raspberry Pi 4 Model B product brief. https:\/\/static.raspberrypi.org\/files\/product-briefs\/200521+Raspberry+Pi+4+ Product+Brief.pdf."},{"issue":"2","key":"e_1_3_2_1_12_1","first-page":"488","article-title":"A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test","volume":"15","year":"2009","unstructured":"[ 12 ] Chin-Ling Chen , \" A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test \", Journal of Universal Computer Science , vol. 15 , no. 2 ( 2009 ), 488 - 504 [12] Chin-Ling Chen, \"A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test\", Journal of Universal Computer Science, vol. 15, no. 2 (2009), 488-504","journal-title":"Journal of Universal Computer Science"}],"event":{"name":"AINTEC'22: The 17th Asian Internet Engineering Conference","location":"Hiroshima Japan","acronym":"AINTEC'22"},"container-title":["Proceedings of the 17th Asian Internet Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570748.3570757","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3570748.3570757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:34Z","timestamp":1750182574000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3570748.3570757"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,19]]},"references-count":12,"alternative-id":["10.1145\/3570748.3570757","10.1145\/3570748"],"URL":"https:\/\/doi.org\/10.1145\/3570748.3570757","relation":{},"subject":[],"published":{"date-parts":[[2022,12,19]]},"assertion":[{"value":"2022-12-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}