{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T20:23:24Z","timestamp":1725913404382},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319694559"},{"type":"electronic","value":"9783319694566"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-69456-6_27","type":"book-chapter","created":{"date-parts":[[2017,10,18]],"date-time":"2017-10-18T14:04:34Z","timestamp":1508335474000},"page":"323-330","source":"Crossref","is-referenced-by-count":1,"title":["DREAD-R: Severity Assessment of ONOS SDN Controller"],"prefix":"10.1007","author":[{"given":"Muhammad","family":"Shakil","sequence":"first","affiliation":[]},{"given":"Alaelddin Fuad Yousif","family":"Mohammed","sequence":"additional","affiliation":[]},{"given":"Hyeontaek","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Jun Kyun","family":"Choi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,19]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/SURV.2014.012214.00180","volume":"16","author":"BAA Nunes","year":"2014","unstructured":"Nunes, B.A.A., Mendonca, M., Nguyen, X.N., Obraczka, K., Turletti, T.: A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun. Surv. Tutor. 16(3), 1617\u20131634 (2014)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"27_CR2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/JPROC.2014.2371999","volume":"103","author":"D Kreutz","year":"2015","unstructured":"Kreutz, D., Ramos, F.M., Verissimo, P.E., Rothenberg, C.E., Azodolmolky, S., Uhlig, S.: Software-defined networking: a comprehensive survey. Proc. IEEE 103(1), 14\u201376 (2015)","journal-title":"Proc. IEEE"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Shin, M.-K., Nam, K.-H., Kim, H.-J.: Software-defined networking (SDN): a reference architecture and open APIs. In: 2012 International Conference on ICT Convergence (ICTC), pp. 360\u2013361. IEEE (2012)","DOI":"10.1109\/ICTC.2012.6386859"},{"key":"27_CR4","unstructured":"SDN Architecture. Technical report, Open Networking Foundation (2014)"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Arbettu, R.K., Khondoker, R., Bayarou, K., Weber, F.: Security analysis of OpenDaylight, ONOS, Rosemary and Ryu SDN controllers. In: 2016 17th International Telecommunications Network Strategy and Planning Symposium (Networks), pp. 37\u201344. IEEE (2016)","DOI":"10.1109\/NETWKS.2016.7751150"},{"issue":"1","key":"27_CR6","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1109\/COMST.2015.2487361","volume":"18","author":"Q Yan","year":"2016","unstructured":"Yan, Q., Yu, F.R., Gong, Q., Li, J.: Software-defined networking (SDN) and distributed denial of service (DDoS) attacks in cloud computing environments: a survey, some research issues, and challenges. IEEE Commun. Surv. Tutor. 18(1), 602\u2013622 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Lee, S., Yoon, C., Lee, C., Shin, S., Yegneswaran, V., Porras, P.: Delta: a security assessment framework for software-defined networks. In: Proceedings of NDSS, vol. 17 (2017)","DOI":"10.14722\/ndss.2017.23457"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Hong, S., Xu, L., Wang, H., Gu, G.: Poisoning network visibility in software-defined networks: new attacks and countermeasures. In: NDSS (2015)","DOI":"10.14722\/ndss.2015.23283"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Benton, K., Camp, L.J., Small, C.: Openflow vulnerability assessment. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, pp. 151\u2013152. ACM (2013)","DOI":"10.1145\/2491185.2491222"},{"key":"27_CR10","doi-asserted-by":"crossref","unstructured":"Berde, P., Gerola, M., Hart, J., Higuchi, Y., Kobayashi, M., Koide, T., Lantz, B., O\u2019Connor, B., Radoslavov, P., Snow, W., et al.: ONOS: towards an open, distributed SDN OS. In: Proceedings of the Third Workshop on Hot Topics in Software Defined Networking, pp. 1\u20136. ACM (2014)","DOI":"10.1145\/2620728.2620744"},{"key":"27_CR11","unstructured":"Meier, J.D., Mackman, A., Dunner, M., Vasireddy, S., Escamilla, R., Murukan, A.: Improving Web Application Security: Threats and Countermeasures. Microsoft Corporation (2003)"},{"key":"27_CR12","unstructured":"Adam Shostack: Threat Modeling: Designing for Security. Wiley (2014)"},{"key":"27_CR13","unstructured":"Thompson, D.R., Di, J., Sunkara, H., Thompson, C.: Categorizing RFID privacy threats with stride. In: Proceedings ACMs Symposium on Usable Privacy and Security held at CMU (2006)"},{"key":"27_CR14","unstructured":"Saitta, P., Larcom, B., Eddington, M.: Trike v. 1 methodology document [draft] (2005). http:\/\/dymaxion.org\/trike\/Trike_v1_Methodology_Documentdraft.pdf"},{"key":"27_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"412","DOI":"10.1007\/3-540-45800-X_32","volume-title":"UML 2002 \u2014 The Unified Modeling Language","author":"J J\u00fcrjens","year":"2002","unstructured":"J\u00fcrjens, J.: UMLsec: extending UML for secure systems development. In: J\u00e9z\u00e9quel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 412\u2013425. Springer, Heidelberg (2002). doi: 10.1007\/3-540-45800-X_32"},{"key":"27_CR16","unstructured":"Gilliam, D.P., Powell, J.D.: Integrating a flexible modeling framework (FMF) with the network security assessment instrument to reduce software security risk. In: Proceedings of Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2002, pp. 153\u2013158. IEEE (2002)"},{"key":"27_CR17","doi-asserted-by":"crossref","DOI":"10.1002\/9781118988374","volume-title":"Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis","author":"T UcedaVelez","year":"2015","unstructured":"UcedaVelez, T., Morana, M.M.: Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis. Wiley, Hoboken (2015)"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Schehlmann, L., Abt, S., Baier, H.: Blessing or curse? Revisiting security aspects of software-defined networking. In: 2014 10th International Conference on Network and Service Management (CNSM), pp. 382\u2013387. IEEE (2014)","DOI":"10.1109\/CNSM.2014.7014199"},{"issue":"5","key":"27_CR19","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s11036-015-0665-5","volume":"21","author":"M Chen","year":"2016","unstructured":"Chen, M., Qian, Y., Mao, S., Tang, W., Yang, X.: Software-defined mobile networks security. Mob. Netw. Appl. 21(5), 729\u2013743 (2016)","journal-title":"Mob. Netw. Appl."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Shin, S., Yegneswaran, V., Porras, P., Gu, G.: Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, pp. 413\u2013424. ACM (2013)","DOI":"10.1145\/2508859.2516684"},{"key":"27_CR21","unstructured":"FIRST. Common Vulnerability Scoring System v3.0: Specification Document"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Selcuk, A.A., Uzun, E., Pariente, M.R.: A reputation-based trust management system for P2P networks. In: IEEE International Symposium on Cluster Computing and the Grid, CCGrid 2004, pp. 251\u2013258. IEEE (2004)","DOI":"10.1109\/CCGrid.2004.1336575"},{"key":"27_CR23","doi-asserted-by":"crossref","unstructured":"Anantvalee, T., Wu, J.: Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: IEEE International Conference on Communications, ICC 2007, pp. 3383\u20133388. IEEE (2007)","DOI":"10.1109\/ICC.2007.560"}],"container-title":["Lecture Notes in Computer Science","Multi-disciplinary Trends in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-69456-6_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,4]],"date-time":"2019-10-04T20:58:53Z","timestamp":1570222733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-69456-6_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319694559","9783319694566"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-69456-6_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}