{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,10]],"date-time":"2024-08-10T04:39:21Z","timestamp":1723264761313},"reference-count":39,"publisher":"Institution of Engineering and Technology (IET)","issue":"6","license":[{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2017,11,1]],"date-time":"2017-11-01T00:00:00Z","timestamp":1509494400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61309020"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. secur"],"published-print":{"date-parts":[[2017,11]]},"DOI":"10.1049\/iet-ifs.2017.0085","type":"journal-article","created":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T02:14:34Z","timestamp":1497665674000},"page":"345-355","source":"Crossref","is-referenced-by-count":24,"title":["MNOS: a mimic network operating system for software defined networks"],"prefix":"10.1049","volume":"11","author":[{"given":"Hongchao","family":"Hu","sequence":"first","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterNo.7 Jianxue Street, Wenhua RoadZhengzhouPeople's Republic of China"}]},{"given":"Zhenpeng","family":"Wang","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterNo.7 Jianxue Street, Wenhua RoadZhengzhouPeople's Republic of China"}]},{"given":"Guozhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterNo.7 Jianxue Street, Wenhua RoadZhengzhouPeople's Republic of China"}]},{"given":"Jiangxing","family":"Wu","sequence":"additional","affiliation":[{"name":"National Digital Switching System Engineering & Technological R&D CenterNo.7 Jianxue Street, Wenhua RoadZhengzhouPeople's Republic of China"}]}],"member":"265","published-online":{"date-parts":[[2017,11]]},"reference":[{"issue":"4","key":"e_1_2_11_2_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1282427.1282382","article-title":"Ethane: taking control of the enterprise","volume":"37","author":"Casado M.","year":"2007","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"e_1_2_11_3_2","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1145\/1355734.1355746","article-title":"OpenFlow: enabling innovation in campus networks","volume":"38","author":"McKeown N.","year":"2008","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"e_1_2_11_4_2","doi-asserted-by":"crossref","unstructured":"Yang M. Li Y. Jin D.et al: \u2018OpenRAN: a software defined ran architecture via virtualization\u2019.Proc. of the ACM SIGCOMM 2013 Conf. SIGCOMM Hong Kong China 2013 pp.549\u2013550","DOI":"10.1145\/2486001.2491732"},{"issue":"99","key":"e_1_2_11_5_2","first-page":"1","article-title":"Network function virtualization: state\u2010of\u2010the art and research challenges","author":"Mijumbi R.","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"e_1_2_11_6_2","unstructured":"Kannan K. Banerjee S.: \u2018Scissors: dealing with header redundancies in data centers through SDN\u2019.Proc. of the 8th Int. Conf. Network and Services Management Las Vegas Nevada 2013 pp.295\u2013301"},{"key":"e_1_2_11_7_2","doi-asserted-by":"crossref","unstructured":"Ghobadi M. Yeganeh S.H. Ganjali Y.: \u2018Rethinking end\u2010to\u2010end congestion control in software\u2010defined networks\u2019.Proc. of the 11th ACM Workshop on Hot Topics in Networks Redmond Washington 2012 pp.61\u201366","DOI":"10.1145\/2390231.2390242"},{"issue":"02","key":"e_1_2_11_8_2","first-page":"259","article-title":"Data center network research process and trends","volume":"37","author":"Li D.","year":"2014","journal-title":"Chin. J. Comput."},{"issue":"4","key":"e_1_2_11_9_2","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1145\/2377677.2377730","article-title":"Demo: programming enterprise WLANs with odin","volume":"42","author":"Suresh L.","year":"2012","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"e_1_2_11_10_2","doi-asserted-by":"crossref","unstructured":"Yi G. Lee S.: \u2018Fully distributed handover based on SDN in heterogeneous wireless networks\u2019.Proc. of the 8th Int. Conf. Ubiquitous Information Management and Communications Siem Reap Cambodia 2014 pp.1\u20137","DOI":"10.1145\/2557977.2558047"},{"key":"e_1_2_11_11_2","doi-asserted-by":"crossref","unstructured":"Lee J. Uddin M. Tourrilhes J.et al: \u2018meSDN: mobile extension of SDN\u2019.Proc. of the Fifth Int. Workshop Mobile Cloud Computing & Services Bretton Woods New Hampshire USA 2014 pp.7\u201314","DOI":"10.1145\/2609908.2609948"},{"key":"e_1_2_11_12_2","doi-asserted-by":"crossref","unstructured":"Jin D. Nicol D.M.: \u2018Parallel simulation of software defined networks\u2019.Proc. of the 2013 ACM SIGSIM Conf. Principles of Advanced Discrete Simulation Canada 2013 pp.91\u2013102","DOI":"10.1145\/2486092.2486104"},{"key":"e_1_2_11_13_2","unstructured":"Open Networking Foundation Security Working Group.Available athttps:\/\/www.opennetworking.org\/technical\u2010communities\/areas\/services"},{"key":"e_1_2_11_14_2","unstructured":"ETSI ISG Network Functions Virtualization Security Expert Group.Available athttp:\/\/www.etsi.org\/technologies\u2010clusters\/technologies\/nfv"},{"issue":"1","key":"e_1_2_11_15_2","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1109\/COMST.2015.2453114","article-title":"A survey of security in software defined networks","volume":"18","author":"Scott\u2010Hayward S.","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"e_1_2_11_16_2","unstructured":"National Science and Technology Council Trustworthy Cyberspace: Strategic Plan for The Federal Cybersecurity Research and Development Program December2011"},{"issue":"4","key":"e_1_2_11_17_2","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1109\/TCC.2014.2355227","article-title":"Byzantine\u2010resilient secure software\u2010defined networks with multiple controllers in cloud","volume":"2","author":"Li H.","year":"2014","journal-title":"IEEE Trans. Cloud Comput."},{"key":"e_1_2_11_18_2","unstructured":"Wu J.: \u2018Cyberspace mimic defense\u2019. Technical Report National Digital Switching System Engineering & Technological R&D Center 2013\u20132016"},{"issue":"3","key":"e_1_2_11_19_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/1384609.1384625","article-title":"NOX: towards an operating system for networks","volume":"38","author":"Gude N.","year":"2008","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"e_1_2_11_20_2","doi-asserted-by":"crossref","unstructured":"Porras P. Shin S. Yegneswaran V.et al\u2018A security enforcement kernel for OpenFlow networks\u2019.Proc. of the First Workshop on Hot Topics in Software Defined Networks 2012 pp.121\u2013126","DOI":"10.1145\/2342441.2342466"},{"key":"e_1_2_11_21_2","unstructured":"Floodlight Controller Floodlight Documentation For Developers Architecture.Available athttp:\/\/www.projectfloodlight.org\/floodlight\/"},{"key":"e_1_2_11_22_2","unstructured":"OPENFLOWSEC.ORG Security\u2010Enhanced Floodlight.Available atwww.openflowsec.org"},{"key":"e_1_2_11_23_2","doi-asserted-by":"crossref","unstructured":"Porras P. Cheung S. Fong M.et al: \u2018Securing the software\u2010defined network control layer\u2019.Proc. of the 2015\u00a0Network and Distributed System Security Symp. (NDSS) February2015","DOI":"10.14722\/ndss.2015.23222"},{"key":"e_1_2_11_24_2","doi-asserted-by":"crossref","unstructured":"Li H. Li P. Guo S.et al: \u2018Byzantine\u2010resilient secure software defined networks with multiple controllers\u2019.IEEE Int. Conf. Communications (ICC) 2014 2014 pp.695\u2013700","DOI":"10.1109\/ICC.2014.6883400"},{"key":"e_1_2_11_25_2","doi-asserted-by":"crossref","unstructured":"Botelho F.A. Ramos F.M.V. Kreutz D.et al: \u2018On the feasibility of a consistent and fault\u2010tolerant data store for SDNs\u2019.Second European Workshop on Software Defined Networks (EWSDN) 2013 2013 pp.38\u201343","DOI":"10.1109\/EWSDN.2013.13"},{"key":"e_1_2_11_26_2","doi-asserted-by":"crossref","unstructured":"Botelho F. Bessani A. Ramos F.M.et al: \u2018On the design of practical fault\u2010tolerant sdn controllers\u2019.Proc. of the 3rd European Workshop on Software Defined Networks (EWSDN) 2014 vol.14","DOI":"10.1109\/EWSDN.2014.25"},{"key":"e_1_2_11_27_2","unstructured":"Kim H. Santos J.R. Turner Y.et al: \u2018CORONET: fault tolerance for software defined networks\u2019.20th IEEE Int. Conf. Network Protocols (ICNP) 2012 October2012 pp.1\u20132"},{"key":"e_1_2_11_28_2","doi-asserted-by":"crossref","unstructured":"Katta N. Zhang H. Freedman M.et al: \u2018Ravana: controller fault\u2010tolerance in software\u2010defined networking\u2019.ACM Symp. for SDN Research (SOSR) June2015","DOI":"10.1145\/2774993.2774996"},{"key":"e_1_2_11_29_2","doi-asserted-by":"crossref","unstructured":"Eldefrawy K. Kaczmarek T.: \u2018Byzantine fault tolerant software\u2010defined networking (SDN) controllers\u2019.MidCCI 2016: The 2nd IEEE Int. Workshop on Middleware for Cyber Security Cloud Computing and Internetworking Atlana GA 2016","DOI":"10.1109\/COMPSAC.2016.76"},{"key":"e_1_2_11_30_2","doi-asserted-by":"crossref","unstructured":"Shin S. Song Y. Lee T.et al: \u2018Rosemary: a robust secure and high performance network operating system\u2019.Proc. of the 2014 ACM SIGSAC Conf. Computer and Communications Security 2014 pp.78\u201389","DOI":"10.1145\/2660267.2660353"},{"key":"e_1_2_11_31_2","doi-asserted-by":"crossref","unstructured":"Chandrasekaran B. Benson T.: \u2018Tolerating SDN application failures with LegoSDN\u2019.Proc. of the 13th ACM Workshop on Hot Topics in Networks 2014 p.22","DOI":"10.1145\/2670518.2673880"},{"key":"e_1_2_11_32_2","doi-asserted-by":"crossref","unstructured":"Wen X. Chen Y. Hu C.et al: \u2018Towards a secure controller platform for openflow applications\u2019.Proc. of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking 2013 pp.171\u2013172","DOI":"10.1145\/2491185.2491212"},{"key":"e_1_2_11_33_2","unstructured":"Shin S. Porras P. Yegneswaran V.et al: \u2018FRESCO: modular composable security services for software\u2010defined networks\u2019.Proc. of Network and Distributed Security Symp. 2013"},{"key":"e_1_2_11_34_2","unstructured":"Noxrepo.org About POX.Available athttp:\/\/www.noxrepo.org\/pox\/about\u2010pox\/"},{"key":"e_1_2_11_35_2","unstructured":"OpenDaylight:A Linux Foundation Collaborative Project 2014. Available athttp:\/\/www.opendaylight.org"},{"key":"e_1_2_11_36_2","doi-asserted-by":"crossref","unstructured":"Berde P. Gerola M. Hart J.et al: \u2018ONOS: towards an open distributed SDN OS\u2019.Proc. of the Third Workshop on Hot Topics in Software Defined Networking 2014 pp.1\u20136","DOI":"10.1145\/2620728.2620744"},{"key":"e_1_2_11_37_2","doi-asserted-by":"crossref","unstructured":"Bessani A. Sousa J. Alchieri E.: \u2018State machine replication for the masses with BFT\u2010SMaRt\u2019. Technical Report DI\u2010FCUL TR October2013","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_2_11_38_2","unstructured":"BFT\u2010SMaRt.Available athttp:\/\/code.google.com\/p\/bft\u2010smart\/"},{"key":"e_1_2_11_39_2","first-page":"1","article-title":"Analysis of OS diversity for intrusion tolerance","volume":"00","author":"Garcia M.","year":"2012","journal-title":"Softw. Pract. Exp."},{"key":"e_1_2_11_40_2","unstructured":"OpenFlow Switch Specification Version 1.4 Open Networking Foundation.Available athttps:\/\/www.opennetworking.org"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2017.0085","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-ifs.2017.0085","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-ifs.2017.0085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T16:40:00Z","timestamp":1610988000000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-ifs.2017.0085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2017,11]]}},"alternative-id":["10.1049\/iet-ifs.2017.0085"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs.2017.0085","archive":["Portico"],"relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"value":"1751-8709","type":"print"},{"value":"1751-8717","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,11]]}}}