{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:00:57Z","timestamp":1729638057822,"version":"3.28.0"},"reference-count":55,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1109\/nfv-sdn.2018.8725657","type":"proceedings-article","created":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:50:11Z","timestamp":1559256611000},"page":"1-7","source":"Crossref","is-referenced-by-count":16,"title":["Distributed Security Network Functions against Botnet Attacks in Software-defined Networks"],"prefix":"10.1109","author":[{"given":"Younghee","family":"Park","sequence":"first","affiliation":[]},{"given":"Nikhil Vijayakumar","family":"Kengalahalli","sequence":"additional","affiliation":[]},{"given":"Sang-Yoon","family":"Chang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","key":"ref39"},{"key":"ref38","article-title":"ClickOS and the art of network function virtualization","author":"martins","year":"2014","journal-title":"Proc 11th USENIX Symp NSDI"},{"journal-title":"Microservices a definition of this new architectural term","year":"0","author":"lewis","key":"ref33"},{"journal-title":"What Are Microservices in NFV? Definition","year":"0","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMP.2007.42"},{"key":"ref30","article-title":"Veriflow: Verifying network-wide invariants in real time","author":"khurshid","year":"2013","journal-title":"the 10th USENIX NSDI"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"article-title":"The 5 most significant ddos attacks of 2016","year":"2016","author":"bisson","key":"ref36"},{"article-title":"What we know about friday’s massive east coast internet outage","year":"2016","author":"newman","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502468"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2009.48"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"journal-title":"Enabling security functions with sdn A feasibility study Computer Networks","year":"2015","author":"yoon","key":"ref29"},{"journal-title":"Texas Instruments","article-title":"A smarter grid with the Internet of Things","year":"0","key":"ref2"},{"year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref22","article-title":"Split\/merge: System support for elastic execution in virtual middleboxes","author":"rajagopalan","year":"2013","journal-title":"Proceedings of NDSS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523635"},{"key":"ref24","article-title":"Improving the safety, scalability, and efficiency of network function state transfers","author":"gember-jacobson","year":"2015","journal-title":"Proc ACM Workshop Hot Topics in Middleboxes and Network Function Virtualization"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626313"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377766"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2017\/352"},{"key":"ref51","doi-asserted-by":"crossref","DOI":"10.1609\/aaai.v32i1.11678","article-title":"Feature Engineering for Predictive Modeling using Reinforcement Learning","author":"khurana","year":"2018","journal-title":"Proceedings of the AAAI Conference on Artificial Intelligence (AAAI)"},{"year":"0","key":"ref55"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/NETSOFT.2016.7502468"},{"year":"0","key":"ref53"},{"key":"ref52","article-title":"Mining Based Detection of Botnet Traffic in Network Flow","author":"kalaivani","year":"2016","journal-title":"International Journal of Computer Science and Information Technology & Security (IJCSITS)"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3041005"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3040992.3041004"},{"year":"2018","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.25"},{"key":"ref14","article-title":"Snortflow: A open flow-based intrusion prevention system in cloud environment","author":"xing","year":"2013","journal-title":"Proc of IEEE GENI Research and Educational Experiment Workshop (GREE)"},{"key":"ref15","first-page":"186","article-title":"Network security hacks","author":"lockhart","year":"2007","journal-title":"O'Reilly"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2014.7014181"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377680"},{"key":"ref19","article-title":"Design and implementation of a consolidated middlebox architecture","author":"sekar","year":"2012","journal-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref3","article-title":"Smart Cities Seoul: a case study","author":"hwang","year":"0","journal-title":"(PDF) ITU-T Technology Watch"},{"key":"ref6","article-title":"Understanding the Mirai Botnet","author":"antonakakis","year":"2017","journal-title":"USENIX Security Symposium"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.201"},{"key":"ref8","article-title":"Machine-learning based Threat-aware System in Software Defined Networks","author":"park","year":"2017","journal-title":"Proc the 26th International Conference on Computer Communications and Networks (ICCCN)"},{"key":"ref7","article-title":"Bohatei: flexible and elastic ddos defense","author":"fayaz","year":"2015","journal-title":"24th USENIX Security Symp"},{"year":"0","key":"ref49"},{"key":"ref9","article-title":"VNGuard: An NFV\/SDN Combination Framework for Provisioning and Managing Virtual Firewalls","author":"deng","year":"2015","journal-title":"IEEE NFV-SDN Conference"},{"year":"0","key":"ref46"},{"journal-title":"A weakness in the 4 2 BSD UNIX TCP\/IP software","year":"0","key":"ref45"},{"year":"0","key":"ref48"},{"year":"0","key":"ref47"},{"year":"0","key":"ref42"},{"journal-title":"Garage [Online]","article-title":"What risks are associated with recursive DNS queries?","year":"0","key":"ref41"},{"key":"ref44","article-title":"Defending against sequence number attacks","author":"steven","year":"0","journal-title":"RFC 6528"},{"key":"ref43","article-title":"Defenses Against TCP SYN Flooding Attacks","volume":"9","author":"eddy","year":"2006","journal-title":"The Internet Protocol Journal"}],"event":{"name":"2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)","start":{"date-parts":[[2018,11,27]]},"location":"Verona, Italy","end":{"date-parts":[[2018,11,29]]}},"container-title":["2018 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8718886\/8725609\/08725657.pdf?arnumber=8725657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,18]],"date-time":"2022-09-18T22:39:29Z","timestamp":1663540769000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8725657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/nfv-sdn.2018.8725657","relation":{},"subject":[],"published":{"date-parts":[[2018,11]]}}}