<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>IST-153 Workshop on CYBER RESILIENCE Resilience and Security in Software Defined Networking</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Camen Mas-Machuca</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Senior Member</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Petra Vizarreta</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Raphael Durner</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Jacek Rak</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Member</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>C. Mas Machuca, P. Vizarreta and R. Durner are with the Chair of Communication Networks, Technical University of Munich</institution>
          ,
          <addr-line>TUM</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>-This paper gives an overview of the most important issues on resilience and security in Software Defined Networking.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>II. DATA PLANE RESILIENCE</title>
      <p>
        Data plane resilience deals with the protection and
restoration of data flows. Existing protection schemes for
transport networks such as dedicated or share path protection,
which finds link and/or node disjoint paths can be also
applied to SDN networks. These schemes aim at offering
100% reliability and have been further extended in order
to consider QoS/security aspects and use less resources
when possible [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. The compromise between protection
and restoration in terms of flow restoration time and used
resources is targeted by pre-computing several disjoint paths,
from which the best one is selected in case of failure.
Another proposed technique by Xie et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] proposes
a proactive local failure recovery module running at the
      </p>
    </sec>
    <sec id="sec-2">
      <title>III. CONTROL PLANE RESILIENCE</title>
      <p>
        In SDN, the control plane of any network device is shifted to
the SDN controller(s). Hence, any device has to be connected
at least to one controller. The loss of connectivity between the
forwarding devices and their designated controllers, as well
as the failures of the controllers themselves, might seriously
diminish the overall network performance. Heegaard et al. [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
presented five classes of threats to reliability in SDN, which
can be summarized as follows:
      </p>
      <p>Threats affecting Control Flows
– Connectivity loss between forwarding devices and
controller(s)
– State consistency between the controller replicas
Threats affecting the controller
– Controller outages
– Controller software design</p>
      <p>Human error and misconfiguration of the network
Let us briefly present several representative papers
addressing these threats. The ”Human error and network
misconfiguration” threat is not specific to SDN based networks, but has
potentially have a much broader impact than in traditionally
distributed legacy networks, since controller would
disseminate the configuration to the entire network.</p>
      <sec id="sec-2-1">
        <title>A. Control Flows</title>
        <p>
          The control plane in SDN is logically centralized, but may
employ multiple physically distributed SDN controllers across
the network in order to improve the resilience [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. Ross et al.
[
          <xref ref-type="bibr" rid="ref8">8</xref>
          ] showed that in order to achieve 99.999% availability of the
control plane, the forwarding devices have to be connected to
at least two controllers for most of today’s wide area networks.
These control flows are referred as secure channels.
        </p>
        <p>
          The resilience of the control plane highly depends on the
number and the location of the controllers in the network.
Several controller placement algorithms maximizing the control
path diversity [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ], and optimization of minimal cut sets have
been proposed literature. Vizarreta et al. [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] compared two
control path protection designs and also proposed an optimal
strategy based on solution of the corresponding Integer Linear
Programming (ILP) problem. It has been shown that protecting
control paths can improve the control path loss up three orders
of magnitude, while adding a small extra delay. However, since
the problem of resilient control paths planning is NP-hard, this
approach does not scale for large networks. Recent efforts have
been focused on finding the efficient approximation algorithms
for resilient control path design.
        </p>
        <p>
          In order to improve the fault tolerance, controllers may
deploy distributed storage system to replicate the current state
of the nodes and flows under their control. Maintaining the
state consistency has to find the compromise between accuracy
and control traffic, as the other controllers have to be informed
about any state update (e.g., new flow rule installed). Sakic et
al. [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] proposed an adaptive consistency framework, where
sharing the state updates can be deferred in time, depending on
the application requirements, and hence balancing the
tradeoff between control plane latency and message overhead. It
is important to provide and maintain the reliable connection
between the controllers to prevent the loss of the state update
messages, that could compromise the control plane reliability.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>B. Controller</title>
        <p>
          The SDN controller is essentially a software component
running on commodity hardware which makes it susceptible
to different types of failures. In [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] different failure modes
of SDN controller were analyzed. The authors have shown
that the failures of hardware and operating system, although
less frequent than software failures, contribute more to the
controller outages.
        </p>
        <p>
          The SDN controller is required to perform large set of tasks,
ranging from network state monitoring, traffic steering and
enforcement of network performance policies, which requires
a rather complex software. Today’s production grade SDN
controllers have grown to have more than 3 million lines of
code [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], and software bugs are inevitable. Some software
bugs, such as an error in path computation element or
concurrency issues, cannot be overcome with the simple redundancy,
and more sophisticated fault tolerance mechanisms are needed.
The state-of-the-art literature is still missing a comprehensive
study on nature and frequency of software related failures.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>IV. SECURITY IN SDN</title>
      <p>
        As SDN emerges from research to productive deployments,
the security of SDN gains more and more importance. The
most prominent SDN protocol is OpenFlow, which is
descending from Ethane [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Ethane was developed to
provide fine grained control in enterprise networks in order to
improve the security. One main difference is the change in
network behavior from ”allow-first-restrict-later” to
”restrictfirst-allow-later”. This approach improves security in SDNs
inherently, when compared to legacy networks . Additionally
with the introduction of a centralized control plane, a global
network view is getting available. Using this global view,
largely facilitates network verification methods like introduced
for example by Kazemian et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. This is critical to ensure
the isolation of multiple network zones with different security
demands.
      </p>
      <p>On the other hand, SDN also introduces new attack
vectors. In the following, the main attack vectors are structured
according to the planes introduced in Figure 1.</p>
      <sec id="sec-3-1">
        <title>A. Attacks from the Data Plane</title>
        <p>
          If the attacker has only access to the data plane, like every
host in the network, there are some possible attack vectors:
an attacker can try to overload the controller [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ], the secure
channel between controller and forwarding devices [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] or
even the switch table [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ] by injecting certain packets with
high rate. Existing works that try to prevent these Denial of
Service attacks use anomaly detection mechanisms and block
the attacker’s packets directly in the data plane [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ], [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. One
main advantage of SDN is the automatic configuration of the
network. One example is the automatic topology discovery,
usually performed with the Link Layer Discovery Protocol
(LLDP). Without any precautions, like for example
authenticated LLDP Packets, an attacker can manipulate the topology
view of the controller using forged packets. This can be further
exploited for eavesdropping attacks [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>B. Attacks from the Control Plane</title>
        <p>
          If the attacker can get access to the control plane, by for
example hijacking a forwarding device, even more serious
threats are possible. An attacker could use conventional means
to perform a Man-in-the-middle attack against the secure
channel [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ], giving him full control over the network.
Additionally attacks with malformed packets in the control plane
can cause failures of the controllers [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] and in consequence
cause network failures. To meet these risks, authentication
and encryption of the secure channel is crucial. Unfortunately
authentication is not always supported in the current SDN
ecosystem [
          <xref ref-type="bibr" rid="ref22">22</xref>
          ].
        </p>
      </sec>
      <sec id="sec-3-3">
        <title>C. Attacks from the Application Plane</title>
        <p>
          Additional risks can turn up from the usage of malicious
or malfunctioning SDN applications. This can be relieved
using formal verification methods in the controller [
          <xref ref-type="bibr" rid="ref23">23</xref>
          ]. These
methods can be used to enforce security rules, like for example
the isolation of different network zones.
        </p>
        <p>One issue for a secure operation of an SDN that remains
open is the verification of the security of all components and a
full bottom up trust relationship between all components and
layers.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>V. CONCLUSION</title>
      <p>This paper has given an overview of the most important
issues and some proposed solutions in order to increase the
reliability and security in Software Defined Networking. As
it has been mentioned, the flexibility and efficiency offered
by SDN comes with some challenges (e.g., higher software
failures).</p>
    </sec>
    <sec id="sec-5">
      <title>ACKNOWLEDGMENT</title>
      <p>This article is based upon work from COST Action CA
15127 (Resilient communication services protecting end-user
applications from disaster-based failures RECODIS)
supported by COST (European Cooperation in Science and
Technology.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vizarreta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Heegaard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Helvik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Kellerer</surname>
          </string-name>
          , and
          <string-name>
            <surname>M. M. Carmen</surname>
          </string-name>
          , “
          <article-title>Characterization of failure dynamics in sdn controllers,” in Resilient Networks Design and Modeling (RNDM</article-title>
          ),
          <year>2017</year>
          9th International Workshop on. IEEE,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Furdek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Skorin-Kapov</surname>
          </string-name>
          , and L. Wosinska, “
          <article-title>Attack-aware dedicated path protection in optical networks</article-title>
          ,
          <source>” Journal of Lightwave Technology</source>
          , vol.
          <volume>34</volume>
          , no.
          <issue>4</issue>
          , pp.
          <fpage>1050</fpage>
          -
          <lpage>1061</lpage>
          ,
          <year>Feb 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>J.</given-names>
            <surname>Yallouz</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Orda</surname>
          </string-name>
          , “
          <article-title>Tunable qos-aware network survivability,”</article-title>
          <source>IEEE/ACM Transactions on Networking</source>
          , vol.
          <volume>25</volume>
          , no.
          <issue>1</issue>
          , pp.
          <fpage>139</fpage>
          -
          <lpage>149</lpage>
          ,
          <year>Feb 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Xie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Wang</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Lu</surname>
          </string-name>
          , “
          <article-title>Designing a disaster-resilient network with software defined networking,” in 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS)</article-title>
          ,
          <source>May</source>
          <year>2014</year>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>140</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Vaghani</surname>
          </string-name>
          and
          <string-name>
            <surname>C.-H. Lung</surname>
          </string-name>
          , “
          <article-title>A comparison of data forwarding schemes for network resiliency in software defined networking,” Procedia Computer Science</article-title>
          , vol.
          <volume>34</volume>
          , pp.
          <fpage>680</fpage>
          -
          <lpage>685</lpage>
          ,
          <year>2014</year>
          ,
          <source>the 9th International Conference on Future Networks and Communications (FNC'14)/The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC</source>
          '14)/Affiliated Workshops. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1877050914009521
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>P. E.</given-names>
            <surname>Heegaard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B. E.</given-names>
            <surname>Helvik</surname>
          </string-name>
          , and
          <string-name>
            <given-names>V. B.</given-names>
            <surname>Mendiratta</surname>
          </string-name>
          , “
          <article-title>Achieving dependability in software-defined networkinga perspective,” in Reliable Networks Design and Modeling (RNDM</article-title>
          ),
          <year>2015</year>
          7th International Workshop on. IEEE,
          <year>2015</year>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>70</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>D.</given-names>
            <surname>Levin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Wundsam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Heller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Handigol</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Feldmann</surname>
          </string-name>
          , “
          <article-title>Logically centralized?: state distribution trade-offs in software defined networks,” in Proceedings of the first workshop on Hot topics in software defined networks</article-title>
          .
          <source>ACM</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>F. J.</given-names>
            <surname>Ros and P. M. Ruiz</surname>
          </string-name>
          , “
          <article-title>Five nines of southbound reliability in software-defined networks</article-title>
          ,
          <source>” in Proceedings of the third workshop on Hot topics in software defined networking. ACM</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>31</fpage>
          -
          <lpage>36</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>L. F.</given-names>
            <surname>Mu</surname>
          </string-name>
          <article-title>¨ller</article-title>
          ,
          <string-name>
            <given-names>R. R.</given-names>
            <surname>Oliveira</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Luizelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. P.</given-names>
            <surname>Gaspary</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M. P.</given-names>
            <surname>Barcellos</surname>
          </string-name>
          , “
          <article-title>Survivor: an enhanced controller placement strategy for improving sdn survivability,” in 2014 IEEE Global Communications Conference</article-title>
          . IEEE,
          <year>2014</year>
          , pp.
          <fpage>1909</fpage>
          -
          <lpage>1915</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Vizarreta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. M.</given-names>
            <surname>Machuca</surname>
          </string-name>
          , and W. Kellerer, “
          <article-title>Controller placement strategies for a resilient sdn control plane,” in Resilient Networks Design and Modeling (RNDM</article-title>
          ),
          <year>2016</year>
          8th International Workshop on. IEEE,
          <year>2016</year>
          , pp.
          <fpage>253</fpage>
          -
          <lpage>259</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>E.</given-names>
            <surname>Sakic</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Sardis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. W.</given-names>
            <surname>Guck</surname>
          </string-name>
          , and W. Kellerer, “
          <article-title>Towards adaptive state consistency in distributed sdn control plane,” in Conference on Communications (ICC), 2017 IEEE International</article-title>
          . IEEE,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Linux</surname>
            <given-names>Foundation</given-names>
          </string-name>
          , “Opendaylight.” [Online]. Available: https://www.opendaylight.org/
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Casado</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. J.</given-names>
            <surname>Freedman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pettit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Luo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>McKeown</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Shenker</surname>
          </string-name>
          , “Ethane:
          <article-title>Taking control of the enterprise</article-title>
          ,”
          <source>in Proceedings of the 2007 Conference on Applications</source>
          , Technologies, Architectures, and
          <article-title>Protocols for Computer Communications, ser</article-title>
          .
          <source>SIGCOMM '07</source>
          . New York, NY, USA: ACM,
          <year>2007</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          . [Online]. Available: http://doi.acm.
          <source>org/10</source>
          .1145/1282380.1282382
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>P.</given-names>
            <surname>Kazemian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Chan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zeng</surname>
          </string-name>
          , G. Varghese,
          <string-name>
            <given-names>N.</given-names>
            <surname>McKeown</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Whyte</surname>
          </string-name>
          , “
          <article-title>Real time network policy checking using header space analysis</article-title>
          .
          <source>” in NSDI</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>99</fpage>
          -
          <lpage>111</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shin</surname>
          </string-name>
          and G. Gu, “
          <article-title>Attacking software-defined networks: A first feasibility study,” in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking</article-title>
          .
          <source>ACM</source>
          ,
          <year>2013</year>
          , pp.
          <fpage>165</fpage>
          -
          <lpage>166</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>L.</given-names>
            <surname>Schehlmann</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abt</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.</given-names>
            <surname>Baier</surname>
          </string-name>
          , “
          <article-title>Blessing or curse? revisiting security aspects of software-defined networking,” in Network and Service Management (CNSM</article-title>
          ),
          <year>2014</year>
          10th International Conference on. IEEE,
          <year>2014</year>
          , pp.
          <fpage>382</fpage>
          -
          <lpage>387</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>R.</given-names>
            <surname>Klo</surname>
          </string-name>
          <article-title>¨ti, V. Kotronis, and</article-title>
          <string-name>
            <given-names>P.</given-names>
            <surname>Smith</surname>
          </string-name>
          , “
          <article-title>OpenFlow: A security analysis</article-title>
          ,
          <source>” Proceedings - International Conference on Network Protocols, ICNP</source>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Mousavi</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>St-Hilaire</surname>
          </string-name>
          , “
          <article-title>Early detection of DDoS attacks against SDN controllers</article-title>
          ,” 2015 International Conference on Computing, Networking and Communications,
          <string-name>
            <surname>ICNC</surname>
          </string-name>
          <year>2015</year>
          , pp.
          <fpage>77</fpage>
          -
          <lpage>81</lpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Durner</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lorenz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Wiedemann</surname>
          </string-name>
          , and W. Kellerer, “
          <article-title>Detecting and mitigating denial of service attacks against the data plane in software defined networks,”</article-title>
          <source>in IEEE Conference on Network Softwarization - Workshop on Security in NFV-SDN</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>K.</given-names>
            <surname>Benton</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L. J.</given-names>
            <surname>Camp</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C.</given-names>
            <surname>Small</surname>
          </string-name>
          , “
          <article-title>OpenFlow Vulnerability Assessment Categories</article-title>
          and Subject Descriptors,
          <source>” Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking - HotSDN '13</source>
          , pp.
          <fpage>151</fpage>
          -
          <lpage>152</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Shalimov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zuikov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zimarina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Pashkov</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Smeliansky</surname>
          </string-name>
          , “
          <article-title>Advanced study of SDN/OpenFlow controllers</article-title>
          ,
          <source>” Proceedings of the 9th Central &amp; Eastern European Software Engineering Conference in Russia on - CEE-SECR '13</source>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          ,
          <year>2013</year>
          . [Online]. Available: http://dl.acm.org/citation.cfm?doid=
          <volume>2556610</volume>
          .
          <fpage>2556621</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>R.</given-names>
            <surname>Durner</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Kellerer</surname>
          </string-name>
          , “
          <article-title>The cost of security in the sdn control plane</article-title>
          ,” CoNEXT Student Workhop,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>H.</given-names>
            <surname>Hu</surname>
          </string-name>
          , W. Han,
          <string-name>
            <surname>G</surname>
          </string-name>
          .-j. Ahn, and
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhao</surname>
          </string-name>
          , “FLOWGUARD,”
          <source>in Proceedings of the third workshop on Hot topics in software defined networking - HotSDN</source>
          '
          <fpage>14</fpage>
          . New York, New York, USA: ACM Press,
          <year>2014</year>
          , pp.
          <fpage>97</fpage>
          -
          <lpage>102</lpage>
          . [Online]. Available: http://dl.acm.org/citation.cfm?doid=
          <volume>2620728</volume>
          .
          <fpage>2620749</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>