{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T21:36:33Z","timestamp":1726090593359},"publisher-location":"Cham","reference-count":57,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030446840"},{"type":"electronic","value":"9783030446857"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44685-7_25","type":"book-chapter","created":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:07:01Z","timestamp":1595426821000},"page":"631-652","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Resilient SDN, CDN and ICN Technology and Solutions"],"prefix":"10.1007","author":[{"given":"Micha\u0142","family":"Aibin","sequence":"first","affiliation":[]},{"given":"Miros\u0142aw","family":"Kantor","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Bory\u0142o","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Niedermayer","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Cho\u0142da","sequence":"additional","affiliation":[]},{"given":"Torsten","family":"Braun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,23]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Alsmadi I, Xu D (2015) Security of software defined networks: a survey. Comput Secur 53:79\u2013108","DOI":"10.1016\/j.cose.2015.05.006"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Aad I, Braun T, Mansour D (2016) Authentication and trust in service-centric networking. In: 2016 IEEE 41st Conference on Local Computer Networks (LCN), pp 563\u2013566","DOI":"10.1109\/LCN.2016.93"},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"3542","DOI":"10.1109\/COMST.2018.2839348","volume":"20","author":"A Abdou","year":"2018","unstructured":"Abdou A, van Oorschot PC, Wan T (2018) Comparative analysis of control plane security of SDN and conventional networks. IEEE Commun Surv Tutor 20(4):3542\u20133559","journal-title":"IEEE Commun Surv Tutor"},{"issue":"7","key":"25_CR4","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MCOM.2012.6231276","volume":"50","author":"B Ahlgren","year":"2012","unstructured":"Ahlgren B, Dannewitz C, Imbrenda C, Kutscher D, Ohlman B (2012) A survey of information-centric networking. IEEE Commun Mag 50(7):26\u201336","journal-title":"IEEE Commun Mag"},{"key":"25_CR5","doi-asserted-by":"publisher","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","volume":"17","author":"I Ahmad","year":"2015","unstructured":"Ahmad I, Namal S, Ylianttila M, Gurtov AV (2015) Security in software defined networks: a survey. IEEE Commun Surv Tutor 17:2317\u20132346","journal-title":"IEEE Commun Surv Tutor"},{"key":"25_CR6","unstructured":"Aibin M (2017) Dynamic routing algorithms for cloud-ready elastic optical networks. PhD thesis, Wroclaw University of Science and Technology"},{"key":"25_CR7","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.osn.2016.06.008","volume":"23","author":"M Aibin","year":"2017","unstructured":"Aibin M, Walkowiak K, Sen A (2017) Software-defined adaptive survivability for elastic optical networks. Opt Switch Netw 23:85\u201396","journal-title":"Opt Switch Netw"},{"issue":"4","key":"25_CR8","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2015.7081073","volume":"53","author":"A Akhunzada","year":"2015","unstructured":"Akhunzada A, Ahmed E, Gani A, Khan MK, Imran M, Guizani S (2015) Securing software defined networks: taxonomy, requirements, and open issues. IEEE Commun Mag 53(4):36\u201344","journal-title":"IEEE Commun Mag"},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1284680.1341892","volume":"10","author":"B Awerbuch","year":"2008","unstructured":"Awerbuch B, Curtmola R, Holmer D, Nita-Rotaru C, Rubens H (2008) ODSBR: an on-demand secure byzantine resilient routing protocol for wireless ad hoc networks. ACM Trans Inf Syst Secur 10(4):1\u201335","journal-title":"ACM Trans Inf Syst Secur"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Balu K, Pardal ML, Correia M (2016) DARSHANA: detecting route hijacking for communication confidentiality. In: 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). IEEE, pp 52\u201359","DOI":"10.1109\/NCA.2016.7778593"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Beheshti N, Zhang Y (2012) Fast failover for control traffic in software-defined networks. In: GLOBECOM\u2014IEEE Global Telecommunications Conference, pp 2665\u20132670","DOI":"10.1109\/GLOCOM.2012.6503519"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Braun T, Hilt V, Hofmann M, Rimac I, Steiner M, Varvello M (2011) Service-centric networking. In: 2011 IEEE International Conference on Communications Workshops (ICC), pp 1\u20136","DOI":"10.1109\/iccw.2011.5963587"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Brownlee N, Claffy KC, Nemeth E (2001) DNS measurements at a root server. In: Global Telecommunications Conference, 2001. GLOBECOM\u201901, vol\u00a03. IEEE, pp 1672\u20131676","DOI":"10.1109\/GLOCOM.2001.965864"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Cheng Y, Rahman MM, Gangadhar S, Alenazi MJ, Sterbenz JP (2015) Cross-layer framework with geodiverse routing in software-defined networking. In: 2015 11th International Conference on Network and Service Management (CNSM). IEEE, pp 348\u2013353","DOI":"10.1109\/CNSM.2015.7367381"},{"issue":"3","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1701","DOI":"10.1109\/COMST.2017.2689819","volume":"19","author":"T Dargahi","year":"2017","unstructured":"Dargahi T, Caponi A, Ambrosin M, Bianchi G, Conti M (2017) A survey on the security of stateful SDN data planes. IEEE Commun Surv Tutor 19(3):1701\u20131725","journal-title":"IEEE Commun Surv Tutor"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Ebert C, Gallardo G, Hernantes J, Serrano N (2016) DevOps. IEEE Software","DOI":"10.1109\/MS.2016.68"},{"key":"25_CR17","doi-asserted-by":"crossref","unstructured":"Fok MP, Wang Z, Deng Y, Prucnal PR (2011) Optical layer security in fiber-optic networks. IEEE Trans Inf Forens Secur 6(3 Part 1):725\u2013736","DOI":"10.1109\/TIFS.2011.2141990"},{"issue":"3","key":"25_CR18","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/2500098.2500103","volume":"43","author":"B Frank","year":"2013","unstructured":"Frank B, Poese I, Lin Y, Smaragdakis G, Feldmann A, Maggs B, Rake J, Uhlig S, Weber R (2013) Pushing CDN-ISP collaboration to the limit. ACM SIGCOMM Comput Commun Rev 43(3):34","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"issue":"7","key":"25_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MCOM.2013.6553676","volume":"51","author":"B Fraser","year":"2013","unstructured":"Fraser B, Lake D, Systems C, Finnegan J, Viljoen N, Etworking SOEN (2013) Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Commun Mag 51(7):36\u201343","journal-title":"IEEE Commun Mag"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Furdek M, Wosinska L, Goscien R, Manousakis K, Aibin M, Walkowiak K, Ristov S, Gushev M, Marzo J (2016) An overview of security challenges in communication networks. In: 8th International Workshop on Resilient Networks Design and Modeling. Halmstad, Sweden, pp 43\u201350","DOI":"10.1109\/RNDM.2016.7608266"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Gasparyan M, Corsini G, Braun T, Schiller E, Saltarin J (2017) Session support for SCN. In: 2017 IFIP Networking Conference (IFIP Networking) and Workshops, pp 1\u20136","DOI":"10.23919\/IFIPNetworking.2017.8264879"},{"key":"25_CR22","unstructured":"Gasparyan M, Marandi A, Schiller E, Braun T (2019) Fault-tolerant session support for service-centric networking. In: 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp 312\u2013320"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Haeri S, Thong WWK, Chen G, Trajkovic L (2013) A reinforcement learning-based algorithm for deflection routing in optical burst-switched networks. In: 14th International Conference on Information Reuse and Integration. IEEE IRI, pp 474\u2013481","DOI":"10.1109\/IRI.2013.6642508"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Helfert F, Niedermayer H, Carle G (2018) Evaluation of algorithms for multipath route selection over the Internet. In: 14th International Workshop on Design of Reliable Communication Networks (DRCN), pp 1\u20138","DOI":"10.1109\/ICIN.2018.8401640"},{"key":"25_CR25","unstructured":"Hoque AKMM, Amin SO, Alyyan A, Zhang B, Zhang L, Wang L (2013) NLSR: named-data link state routing protocol. In: Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking, ICN\u201913, pp 15\u201320"},{"issue":"4","key":"25_CR26","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1016\/S1361-3723(08)70065-4","volume":"2008","author":"P Hunter","year":"2008","unstructured":"Hunter P (2008) Pakistan YouTube block exposes fundamental internet security weakness: concern that Pakistani action affected Youtube access elsewhere in world. Comput Fraud Secur 2008(4):10\u201311","journal-title":"Comput Fraud Secur"},{"key":"25_CR27","unstructured":"Huy AN, Tam VN, Dong IK, Choi D (2008) Network traffic anomalies detection and identification with flow monitoring. In: 5th IEEE and IFIP International Conference on Wireless and Optical Communications Networks, WOCN 2008, pp 1\u20135"},{"key":"25_CR28","unstructured":"Jain R (2014) OpenFlow, software defined networking (SDN) and network function virtualization (NFV). In: IEEE International Conference on Communications (ICC), pp 1\u2013102"},{"key":"25_CR29","unstructured":"Kaczmarski K, Pilarski M, Banasiak B, Kabut C (2013) Content delivery network monitoring with limited resources. In: 2013 Federated Conference on Computer Science and Information Systems, FedCSIS 2013"},{"key":"25_CR30","doi-asserted-by":"crossref","unstructured":"Khan SU, Maciejewski AA, Siegel HJ (2009) Robust CDN replica placement techniques. In: IPDPS 2009\u2014Proceedings of the 2009 IEEE International Parallel and Distributed Processing Symposium, pp 1\u20138","DOI":"10.1109\/IPDPS.2009.5160908"},{"key":"25_CR31","unstructured":"Kim MS, Kong HJ, Hong SC, Chung SH, Hong J (2004) A flow-based method for abnormal network traffic detection. In: 2004 IEEE\/IFIP Network Operations and Management Symposium (IEEE Cat. No. 04CH37507), vol 1, pp 1\u201314"},{"issue":"1","key":"25_CR32","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz D, Ramos FMV, Ver\u00edssimo PE, Rothenberg CE, Azodolmolky S, Uhlig S (2015) Software-defined networking: a comprehensive survey. Proc IEEE 103(1):14\u201376","journal-title":"Proc IEEE"},{"key":"25_CR33","doi-asserted-by":"crossref","unstructured":"Lakhina A, Crovella M, Diot C (2004) Characterization of network-wide anomalies in traffic flows. In: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement\u2014IMC \u201904, p 201","DOI":"10.1145\/1028788.1028813"},{"key":"25_CR34","doi-asserted-by":"crossref","unstructured":"Lau F, Rubin SHS, Stuart H, Smith MH, Trajkovic L (2000) Distributed denial of service attacks. In: 2000 IEEE International Conference on Systems, Man, and Cybernetics, pp 2275\u20132280","DOI":"10.1109\/ICSMC.2000.886455"},{"issue":"4","key":"25_CR35","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TCC.2014.2355227","volume":"2","author":"H Li","year":"2014","unstructured":"Li H, Li P, Guo S, Nayak A (2014) Byzantine-resilient secure software-defined networks with multiple controllers in cloud. IEEE Trans Cloud Comput 2(4):436\u2013447","journal-title":"IEEE Trans Cloud Comput"},{"key":"25_CR36","doi-asserted-by":"crossref","unstructured":"Li W, Meng W, Kwok LF (2016) A survey on OpenFlow-based software defined networks: security challenges and countermeasures. J Netw Comput Appl 68:126\u2013139","DOI":"10.1016\/j.jnca.2016.04.011"},{"key":"25_CR37","doi-asserted-by":"crossref","unstructured":"Li Y, Xing HJ, Hua Q, Wang XZ, Batta P, Haeri S, Trajkovic L (2014) Classification of BGP anomalies using decision trees and fuzzy rough sets. In: 2014 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp 1312\u20131317","DOI":"10.1109\/SMC.2014.6974096"},{"key":"25_CR38","doi-asserted-by":"crossref","unstructured":"Mahoney MV (2003) Network traffic anomaly detection based on packet bytes. In: Proceedings of the 2003 ACM Symposium on Applied Computing\u2014SAC \u201903, p 346","DOI":"10.1145\/952532.952601"},{"key":"25_CR39","doi-asserted-by":"crossref","unstructured":"Mehdi SA, Khalid J, Khayam SA (2011) Revisiting traffic anomaly detection using software defined networking. In: Recent Advances in Intrusion Detection. Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"25_CR40","unstructured":"M\u00fcnz G, Li S, Carle G (2007) Traffic anomaly detection using k-means clustering. In: GI\/ITG Workshop MMBnet"},{"key":"25_CR41","doi-asserted-by":"crossref","unstructured":"Nychis G, Sekar V, Andersen DG, Kim H, Zhang H (2008) An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement Conference\u2014IMC \u201908","DOI":"10.1145\/1452520.1452539"},{"key":"25_CR42","doi-asserted-by":"crossref","unstructured":"Obadia M, Bouet M, Leguay J, Phemius K, Iannone L (2014) Failover mechanisms for distributed SDN controllers. In: 2014 International Conference on the Network of the Future, NOF 2014\u2014Workshop on Smart Cloud Networks and Systems, SCNS 2014","DOI":"10.1109\/NOF.2014.7119795"},{"key":"25_CR43","doi-asserted-by":"crossref","unstructured":"Pashkov V, Shalimov A, Smeliansky R (2014) Controller failover for SDN enterprise networks. In: SDN and NFV: Next Generation of Computational Infrastructure\u20142014 International Science and Technology Conference\u2014Modern Networking Technologies, MoNeTec 2014, Proceedings","DOI":"10.1109\/MoNeTeC.2014.6995594"},{"key":"25_CR44","unstructured":"Qiu L, Padmanabhan VN, Voelker GM (2001) On the placement of web server replicas. In: Proceedings\u2014IEEE INFOCOM, vol 3, pp 1587\u20131596"},{"key":"25_CR45","doi-asserted-by":"crossref","unstructured":"Raposo D, Pardal ML, Rodrigues L, Correia M (2016) Machete: multi-path communication for security. In: 2016 IEEE 15th International Symposium on Network Computing and Applications (NCA). IEEE, pp 60\u201367","DOI":"10.1109\/NCA.2016.7778594"},{"key":"25_CR46","unstructured":"Rodrigues M, Moreira A, Neves M, Azev\u00eado E, Sadok D, Callado A, Souza V (2013) Flow count: a CDN dynamic replica placement algorithm for cross traffic optimization. In: 2013 IFIP\/IEEE International Symposium on Integrated Network Management (IM 2013), p\u00a04"},{"key":"25_CR47","doi-asserted-by":"crossref","unstructured":"Rohrer JP, Naidu R, Sterbenz JPG (2009) Multipath at the transport layer: an end-to-end resilience mechanism. In: 2009 International Conference on Ultra Modern Telecommunications Workshops, pp 1\u20137","DOI":"10.1109\/ICUMT.2009.5345602"},{"key":"25_CR48","doi-asserted-by":"crossref","unstructured":"Santos J (2016) On the impact of deploying federated SDN controllers in optical transport networks. In: 18th International Conference on Transparent Optical Networks (ICTON), Trento, Italy, pp 5\u20137","DOI":"10.1364\/OFC.2016.Th1A.5"},{"key":"25_CR49","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","volume":"18","author":"S Scott-Hayward","year":"2016","unstructured":"Scott-Hayward S, Natarajan S, Sezer S (2016) A survey of security in software defined networks. IEEE Commun Surv Tutor 18:623\u2013654","journal-title":"IEEE Commun Surv Tutor"},{"issue":"2","key":"25_CR50","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1109\/TNSM.2018.2811944","volume":"15","author":"V Sourlas","year":"2018","unstructured":"Sourlas V, Ascigil O, Psaras I, Pavlou G (2018) Enhancing information resilience in disruptive information-centric networks. IEEE Trans Netw Serv Manag 15(2):746\u2013760","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"25_CR51","doi-asserted-by":"crossref","unstructured":"Sourlas V, Tassiulas L, Psaras I, Pavlou G (2015) Information resilience through user-assisted caching in disruptive content-centric networks. In: 2015 IFIP Networking Conference (IFIP Networking), pp 1\u20139","DOI":"10.1109\/IFIPNetworking.2015.7145301"},{"issue":"2","key":"25_CR52","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1002\/net.3230040204","volume":"4","author":"JW Suurballe","year":"1974","unstructured":"Suurballe JW (1974) Disjoint paths in a network. Networks 4(2):125\u2013145","journal-title":"Networks"},{"issue":"3","key":"25_CR53","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TNSM.2009.03.090303","volume":"6","author":"VL Thing","year":"2009","unstructured":"Thing VL, Sloman M, Dulay N (2009) Locating network domain entry and exit point\/path for DDoS attack traffic. IEEE Trans Netw Serv Manag 6(3):163\u2013174","journal-title":"IEEE Trans Netw Serv Manag"},{"key":"25_CR54","doi-asserted-by":"crossref","unstructured":"Wang H, Gong Z, Guan Q, Wang B (2008) Detection network anomalies based on packet and flow analysis. In: Proceedings\u20147th International Conference on Networking, ICN 2008, pp 497\u2013502","DOI":"10.1109\/ICN.2008.83"},{"key":"25_CR55","doi-asserted-by":"crossref","unstructured":"Wang L, Lehman V, Mahmudul Hoque AKM, Zhang B, Yu Y, Zhang L (2018) A secure link state routing protocol for NDN. IEEE Access 6:10470\u201310482","DOI":"10.1109\/ACCESS.2017.2789330"},{"key":"25_CR56","doi-asserted-by":"crossref","unstructured":"Wang Z, Jiang H, Sun Y, Li J, Liu J, Dutkiewicz E (2010) A k-coordinated decentralized replica placement algorithm for the ring-based CDN-P2P architecture. In: Proceedings\u2014IEEE Symposium on Computers and Communications, pp 811\u2013816","DOI":"10.1109\/ISCC.2010.5546711"},{"issue":"3","key":"25_CR57","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/2656877.2656887","volume":"44","author":"L Zhang","year":"2014","unstructured":"Zhang L, Afanasyev A, Burke J, Jacobson V, Claffy K, Crowley P, Papadopoulos C, Wang L, Zhang B (2014) Named data networking. SIGCOMM Comput Commun Rev 44(3):66\u201373","journal-title":"SIGCOMM Comput Commun Rev"}],"container-title":["Computer Communications and Networks","Guide to Disaster-Resilient Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44685-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,22]],"date-time":"2020-07-22T14:14:50Z","timestamp":1595427290000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44685-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030446840","9783030446857"],"references-count":57,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44685-7_25","relation":{},"ISSN":["1617-7975","2197-8433"],"issn-type":[{"type":"print","value":"1617-7975"},{"type":"electronic","value":"2197-8433"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}