{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:38:13Z","timestamp":1774539493626,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,1,4]],"date-time":"2025-01-04T00:00:00Z","timestamp":1735948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,1,4]]},"DOI":"10.1145\/3700838.3703695","type":"proceedings-article","created":{"date-parts":[[2025,1,2]],"date-time":"2025-01-02T12:58:12Z","timestamp":1735822692000},"page":"346-351","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["SYN-Monitor: An Energy Efficient Defense System against TCP-SYN Flooding Attacks in SDN"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7650-2010","authenticated-orcid":false,"given":"Mitali","family":"Sinha","sequence":"first","affiliation":[{"name":"Indian Institute of Technology, Bhubaneswar, Bhubaneswar, Odisha, India and Computer Science and Engineering, Parala Maharaja Engineering College, Berhampur, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0044-7051","authenticated-orcid":false,"given":"Padmalochan","family":"Bera","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Bhubaneswar, Bhubaneswar, Odisha, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9237-0978","authenticated-orcid":false,"given":"Manoranjan","family":"Satpathy","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Bhubaneswar, Bhubaneswar, Odisha, India"}]}],"member":"320","published-online":{"date-parts":[[2025,1,4]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"[n. d.]. http:\/\/mininet.org\/. Accessed: April 2020."},{"key":"e_1_3_3_1_3_2","unstructured":"[n. d.]. https:\/\/github.com\/scapy.py accessed: July 2020. ([n. d.])."},{"key":"e_1_3_3_1_4_2","unstructured":"[n. d.]. https:\/\/iperf.fr\/ accessed: July 2020. ([n. d.])."},{"key":"e_1_3_3_1_5_2","unstructured":"[n. d.]. http:\/\/www.topology-zoo.org\/ accessed: July 2020. ([n. d.])."},{"key":"e_1_3_3_1_6_2","unstructured":"[n. d.]. A Java based OpenFlow Controller accessed on: 31-July-2020. [Online]. Available: www.projectfloodlight.org\/floodlight\/. ([n. d.])."},{"key":"e_1_3_3_1_7_2","volume-title":"OpenFlow Switch Specifications Version 1.3","unstructured":"[n. d.]. OpenFlow Switch Specifications Version 1.3. https:\/\/www.opennetworking.org\/images\/stories\/downloads\/sdn-resources\/onf-specifications\/openflow\/openflow-spec-v1.3.0.pdf Accessed on: 31-July-2018."},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","unstructured":"2024. DDoS SourceTracer: An Intelligent Application for DDoS Attack Mitigation in SDN. Computers and Electrical Engineering 117 (2024) 109282. 10.1016\/j.compeleceng.2024.109282","DOI":"10.1016\/j.compeleceng.2024.109282"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"crossref","unstructured":"M. Aladaileh et\u00a0al. 2021. Entropy-Based Approach to Detect DDoS Attacks on Software Defined Networking Controller. Computers Materials & Continua 69 1 (2021) 373\u2013391.","DOI":"10.32604\/cmc.2021.017972"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"publisher","unstructured":"Tianyang Cai et\u00a0al. 2023. ADAM: An Adaptive DDoS Attack Mitigation Scheme in Software-Defined Cyber-Physical System. IEEE Transactions on Industrial Informatics 19 6 (2023) 7802\u20137813. 10.1109\/TII.2023.3240586","DOI":"10.1109\/TII.2023.3240586"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Deng et\u00a0al. 2018. Packet Injection Attack and Its Defense in Software-Defined Networks. IEEE Transactions on Information Forensics and Security 13 3 (2018) 695\u2013705. 10.1109\/TIFS.2017.2765506","DOI":"10.1109\/TIFS.2017.2765506"},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","unstructured":"Silvia Fichera et\u00a0al. 2015. OPERETTA: An OPEnflow-based REmedy to mitigate TCP SYNFLOOD Attacks against web servers. Computer Networks 92 (2015) 89\u2013100. 10.1016\/j.comnet.2015.08.038","DOI":"10.1016\/j.comnet.2015.08.038"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"crossref","unstructured":"Eduard Marin et\u00a0al. 2019. An In-depth Look Into SDN Topology Discovery Mechanisms: Novel Attacks and Practical Countermeasures. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019). https:\/\/api.semanticscholar.org\/CorpusID:207959749","DOI":"10.1145\/3319535.3354194"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","unstructured":"Bruno Astuto\u00a0A. Nunes et\u00a0al. 2014. A Survey of Software-Defined Networking: Past Present and Future of Programmable Networks. IEEE Communications Surveys & Tutorials 16 3 (2014) 1617\u20131634. 10.1109\/SURV.2014.012214.00180","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","unstructured":"Seungwon et\u00a0al. 2013. AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks. (11 2013). 10.1145\/2508859.2516684","DOI":"10.1145\/2508859.2516684"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3631461.3631463"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"crossref","unstructured":"M. Sinha et\u00a0al. 2023. DDoS Vulnerabilities Analysis in SDN Controllers: Understanding the Attacking Strategies. Accepted in Proc. WiSPNET (2023) 1\u20135.","DOI":"10.1109\/WiSPNET57748.2023.10134518"}],"event":{"name":"ICDCN 2025: 26th International Conference on Distributed Computing and Networking","location":"Hyderabad India","acronym":"ICDCN 2025"},"container-title":["Proceedings of the 26th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703695","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3700838.3703695","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:10:22Z","timestamp":1750295422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3700838.3703695"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,4]]},"references-count":17,"alternative-id":["10.1145\/3700838.3703695","10.1145\/3700838"],"URL":"https:\/\/doi.org\/10.1145\/3700838.3703695","relation":{},"subject":[],"published":{"date-parts":[[2025,1,4]]},"assertion":[{"value":"2025-01-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}