{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,24]],"date-time":"2024-07-24T13:59:30Z","timestamp":1721829570989},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2016,3,5]],"date-time":"2016-03-05T00:00:00Z","timestamp":1457136000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s12243-016-0506-y","type":"journal-article","created":{"date-parts":[[2016,3,5]],"date-time":"2016-03-05T04:46:14Z","timestamp":1457153174000},"page":"595-605","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":31,"title":["An elastic intrusion detection system for software networks"],"prefix":"10.1007","volume":"71","author":[{"given":"Martin Andreoni","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Diogo Menezes","family":"Ferrazani Mattos","sequence":"additional","affiliation":[]},{"given":"Otto Carlos M. B.","family":"Duarte","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,5]]},"reference":[{"issue":"3\u20134","key":"506_CR1","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1007\/s12243-014-0454-3","volume":"70","author":"X Che","year":"2015","unstructured":"Che X, Lopez J, Maag S, Morales G (2015) Testing trust properties using a formal distributed network monitoring approach. Ann Telecommun 70(3\u20134):95\u2013105","journal-title":"Ann Telecommun"},{"key":"506_CR2","doi-asserted-by":"crossref","unstructured":"Chen H, Clark JA, Tapiador JE, Shaikh SA, Chivers H, Nobles P (2009) A multi-objective optimisation approach to IDS sensor placement. In: Computational intelligence in security for information systems. Springer, pp 101\u2013108","DOI":"10.1007\/978-3-642-04091-7_13"},{"issue":"7\u20138","key":"506_CR3","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1007\/s12243-014-0450-7","volume":"70","author":"E Coutinho","year":"2015","unstructured":"Coutinho E, de Carvalho Sousa F, Rego P, Gomes D, de Souza J (2015) Elasticity in cloud computing: a survey. Ann Telecommun 70(7\u20138):289\u2013309","journal-title":"Ann Telecommun"},{"issue":"5-6","key":"506_CR4","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s12243-010-0208-9","volume":"66","author":"NC Fernandes","year":"2011","unstructured":"Fernandes NC, Moreira MDD, Moraes IM, Ferraz LHG, Couto RS, Carvalho HET, Campista MEM, Costa LHMK, Duarte OMB (2011) Virtual networks: isolation, performance, and trends. Ann Telecommun 66(5-6):339\u2013355","journal-title":"Ann Telecommun"},{"key":"506_CR5","doi-asserted-by":"crossref","unstructured":"Ferraz LHG, Mattos DMF, Duarte OCMB (2014) A two-phase multipathing scheme based on genetic algorithm for data center networking. In: IEEE global communications conference - GLOBECOM, pp 2270\u20132275","DOI":"10.1109\/GLOCOM.2014.7037146"},{"key":"506_CR6","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.bjp.2013.10.014","volume":"62","author":"K Giotis","year":"2014","unstructured":"Giotis K, Argyropoulos C, Androulidakis G, Kalogeras D, Maglaris V (2014) Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput Netw 62:122\u2013136","journal-title":"Comput Netw"},{"key":"506_CR7","doi-asserted-by":"crossref","unstructured":"Hu H, Han W, Ahn GJ, Zhao Z (2014) FLOWGUARD: building robust firewalls for Software-Defined Networks. In: Proceedings of the 3rd workshop on hot topics in SDN. ACM, pp 97\u2013102","DOI":"10.1145\/2620728.2620749"},{"key":"506_CR8","doi-asserted-by":"crossref","unstructured":"Mattos DMF, Duarte OCMB (2014) XenFlow: Seamless migration primitive and Quality of Service for virtual networks. In: IEEE global communications conference - GLOBECOM","DOI":"10.1109\/GLOCOM.2014.7037155"},{"key":"506_CR9","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J (2008) OpenFlow: enabling innovation in campus networks. SIGCOMM Comput Commun 38:69\u201374","journal-title":"SIGCOMM Comput Commun"},{"key":"506_CR10","doi-asserted-by":"crossref","unstructured":"Mehdi SA, Khalid J, Khayam SA (2011) Revisiting traffic anomaly detection using software defined networking. In: Recent advances in intrusion detection. Springer, pp 161\u2013180","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"506_CR11","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.bjp.2014.01.002","volume":"63","author":"IM Moraes","year":"2014","unstructured":"Moraes IM, Mattos DM, Ferraz LHG, Campista MEM, Rubinstein MG, Costa LHM, de Amorim MD, Velloso PB, Duarte OC, Pujolle G (2014) FITS: a flexible virtual network testbed architecture. Comput Netw 63:221\u2013237","journal-title":"Comput Netw"},{"key":"506_CR12","doi-asserted-by":"crossref","unstructured":"Nam J, Jamshed M, Choi B, Han D, Park K (2015) Scaling the performance of network intrusion detection with many-core processors. In: ACM\/IEEE symposium on architectures for networking and communications systems (ANCS) , pp 191\u2013192","DOI":"10.1109\/ANCS.2015.7110135"},{"issue":"23\u201324","key":"506_CR13","doi-asserted-by":"crossref","first-page":"2435","DOI":"10.1016\/S1389-1286(99)00112-7","volume":"31","author":"V Paxson","year":"1999","unstructured":"Paxson V (1999) Bro: a system for detecting network intruders in real-time. Comput Netw 31(23\u201324):2435\u20132463","journal-title":"Comput Netw"},{"key":"506_CR14","doi-asserted-by":"crossref","unstructured":"Piedrahita AFM, Rueda S, Mattos DM, Duarte OCM (2015) FlowFence: a denial of service defense system for software defined networking. In: Global information infrastructure and networking symposium -GIIS, p 6","DOI":"10.1109\/GIIS.2015.7347185"},{"key":"506_CR15","doi-asserted-by":"crossref","unstructured":"Shanmugam PK, Subramanyam ND, Breen J, Roach C, Van der Merwe J (2014) DEIDtect: towards distributed elastic intrusion detection. In: Proceedings of the 2014 ACM SIGCOMM workshop on distributed cloud computing - DCC , pp 17\u201324","DOI":"10.1145\/2627566.2627579"},{"key":"506_CR16","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.1016\/j.comcom.2005.09.008","volume":"29","author":"VA Siris","year":"2006","unstructured":"Siris VA, Papagalou F (2006) Application of anomaly detection algorithms for detecting SYN flooding attacks. Comput Commun 29:1433\u20131442","journal-title":"Comput Commun"},{"key":"506_CR17","doi-asserted-by":"crossref","unstructured":"Sommer R, Paxson V (2010) Outside the closed world: on using machine learning for network intrusion detection. In: IEEE symposium on security and privacy, pp 305\u2013316","DOI":"10.1109\/SP.2010.25"},{"key":"506_CR18","unstructured":"Weaver N, Sommer R (2007) Stress testing cluster Bro. In: Proceedings of the DETER community workshop on cyber security experimentation and test. USENIX Association , pp 9\u20139"},{"key":"506_CR19","doi-asserted-by":"crossref","unstructured":"Xing T, Huang D, Xu L, Chung CJ, Khatkar P (2013) SnortFlow: a OpenFlow-based intrusion prevention system in cloud environment. In: 2nd GENI research and educational experiment workshop, pp 89\u201392","DOI":"10.1109\/GREE.2013.25"},{"key":"506_CR20","doi-asserted-by":"crossref","unstructured":"Yoon C, Park T, Lee S, Kang H, Shin S, Zhang Z (2015) Enabling security functions with SDN: a feasibility study. Computer Networks 1(1)","DOI":"10.1016\/j.comnet.2015.05.005"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0506-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-016-0506-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0506-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-016-0506-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T07:39:29Z","timestamp":1567669169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-016-0506-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,5]]},"references-count":20,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["506"],"URL":"https:\/\/doi.org\/10.1007\/s12243-016-0506-y","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,5]]}}}