{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T05:55:35Z","timestamp":1721195735497},"reference-count":21,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T00:00:00Z","timestamp":1572652800000},"content-version":"vor","delay-in-days":305,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1016\/j.procs.2019.11.004","type":"journal-article","created":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T16:10:13Z","timestamp":1574352613000},"page":"825-830","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"special_numbering":"C","title":["New context-based node acceptance CBNA framework for MitM detection in SDN Architecture"],"prefix":"10.1016","volume":"160","author":[{"given":"Anass","family":"Sebbar","sequence":"first","affiliation":[]},{"given":"Karim","family":"Zkik","sequence":"additional","affiliation":[]},{"given":"Mohammed","family":"Boulmalf","sequence":"additional","affiliation":[]},{"given":"Mohamed Dafir Ech-Cherif","family":"El Kettani","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2019.11.004_bib0001","doi-asserted-by":"crossref","first-page":"152164","DOI":"10.1016\/j.jnca.2016.12.024","article-title":"Identifying cyber-attacks on software defined networks: An inference-based intrusion detection approach","volume":"80","author":"AlEroud","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.procs.2019.11.004_bib0002","unstructured":"V. K. Mishra, D. C. Verma, and C. Williams, Guide to Security in SDN and NFV, 2017."},{"key":"10.1016\/j.procs.2019.11.004_bib0003","doi-asserted-by":"crossref","first-page":"4215642168","DOI":"10.1109\/ACCESS.2019.2906926","article-title":"A Comprehensive Security Analysis of a SCADA Protocol: From OSINT to Mitigation","volume":"7","author":"Rosa","year":"2019","journal-title":"IEEE Access"},{"key":"10.1016\/j.procs.2019.11.004_bib0004","unstructured":"R. Thupae, B. Isong, N. Gasela, and A. M. Abu-Mahfouz, Software defined wireless sensor networks mangement and security challenges: A review, Proc. IECON 2018 - 44th Annu. Conf. IEEE Ind. Electron. Soc., no. October, pp. 47364741, 2018."},{"issue":"12","key":"10.1016\/j.procs.2019.11.004_bib0005","doi-asserted-by":"crossref","first-page":"15001521","DOI":"10.1631\/FITEE.1800575","article-title":"Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey","volume":"19","author":"Wang","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"10.1016\/j.procs.2019.11.004_bib0006","first-page":"515518","volume":"8491","author":"Garg","year":"2012","journal-title":"Evaluate the Effect of Man in Middle Attack (Active Attack) on Wireless LAN"},{"key":"10.1016\/j.procs.2019.11.004_bib0007","doi-asserted-by":"crossref","unstructured":"E. L. Fernandes et al., The Road to BOFUSS: The Basic OpenFlow User-space Software Switch, no. January, 2019.","DOI":"10.1016\/j.jnca.2020.102685"},{"key":"10.1016\/j.procs.2019.11.004_bib0008","doi-asserted-by":"crossref","unstructured":"K. ZKIK, A. Sebbara, Y. Baddic, and M. Boulmalfa, Secure Multipath Mutation SMPM in Moving Target Defense Based on SDN, 2019.","DOI":"10.1016\/j.procs.2019.04.137"},{"key":"10.1016\/j.procs.2019.11.004_bib0009","unstructured":"OpenDaylight Controller. https:\/\/www.opendaylight.org\/, 2018 [Online; accessed january 2019]"},{"key":"10.1016\/j.procs.2019.11.004_bib00010","unstructured":"What is OpenFlow? Definition and How it Relates to SDN https:\/\/www.sdxcentral.com\/sdn\/definitions\/what-is-OpenFlow\/ [Online; accessed january 2019]"},{"key":"10.1016\/j.procs.2019.11.004_bib00011","doi-asserted-by":"crossref","unstructured":"A. Sebbar, M. Boulmalf, M. Dafir Ech-Cherif El Kettani, and Y. Baddi, Detection MITM Attack in Multi-SDN Controller, in 2018 IEEE 5th International Congress on Information Science and Technology (CiSt), 2018, pp. 583587.","DOI":"10.1109\/CIST.2018.8596479"},{"key":"10.1016\/j.procs.2019.11.004_bib00012","unstructured":"Mininet emulator. http:\/\/mininet.org\/, 2018. [Online; accessed january 2019]"},{"key":"10.1016\/j.procs.2019.11.004_bib00013","unstructured":"Kali Linux. Kali Linux. https:\/\/www.kali.org\/, 2018. [Online; accessed january 2019"},{"key":"10.1016\/j.procs.2019.11.004_bib00014","first-page":"9095","article-title":"Using advanced detection and prevention technique to mitigate threats in SDN architecture","author":"Sebbar","year":"2019","journal-title":"in 2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC)"},{"key":"10.1016\/j.procs.2019.11.004_bib00015","doi-asserted-by":"crossref","unstructured":"P. Porras et al., A Security Enforcement Kernel for OpenFlow Networks. 2012.","DOI":"10.1145\/2342441.2342466"},{"key":"10.1016\/j.procs.2019.11.004_bib00016","first-page":"18","article-title":"Leveraging SDN for ARP security","volume":"2016","author":"Cox","year":"2016","journal-title":"in SoutheastCon"},{"key":"10.1016\/j.procs.2019.11.004_bib00017","unstructured":"L. Xu, S. Hong, H. Wang, and G. Gu, SDN Attacks and Mitigations View project Software-Defined Programmable Security (SPS) frameworks View project Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures, 2016."},{"key":"10.1016\/j.procs.2019.11.004_bib00018","first-page":"560566","article-title":"OpenFlow Communications and TLS Security in Software-Defined Networks","author":"Agborubere","year":"2017","journal-title":"in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)"},{"key":"10.1016\/j.procs.2019.11.004_bib00019","first-page":"131134","article-title":"Detecting man-in-the-middle attacks on non-mobile systems","volume":"14","author":"Vallivaara","year":"2014","journal-title":"in Proceedings of the 4th ACM conference on Data and application security and privacy - CODASPY"},{"key":"10.1016\/j.procs.2019.11.004_bib00020","doi-asserted-by":"crossref","unstructured":"D. Kreutz, L. Fcul, F. M. V Ramos, and P. Verissimo, Towards Secure and Dependable Software-Defined Networks. 2013.","DOI":"10.1145\/2491185.2491199"},{"issue":"12","key":"10.1016\/j.procs.2019.11.004_bib00021","doi-asserted-by":"crossref","first-page":"15001521","DOI":"10.1631\/FITEE.1800575","article-title":"Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey","volume":"19","author":"Wang","year":"2018","journal-title":"Front. Inf. Technol. Electron. Eng."}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050919317041?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050919317041?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,2,4]],"date-time":"2021-02-04T21:34:26Z","timestamp":1612474466000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050919317041"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":21,"alternative-id":["S1877050919317041"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2019.11.004","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"New context-based node acceptance CBNA framework for MitM detection in SDN Architecture","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2019.11.004","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2019 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}