{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T19:08:42Z","timestamp":1772824122983,"version":"3.50.1"},"reference-count":196,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,1,19]],"date-time":"2022-01-19T00:00:00Z","timestamp":1642550400000},"content-version":"vor","delay-in-days":140,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100002341","name":"Academy of Finland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002341","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1016\/j.comnet.2021.108245","type":"journal-article","created":{"date-parts":[[2021,6,19]],"date-time":"2021-06-19T01:00:33Z","timestamp":1624064433000},"page":"108245","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":19,"special_numbering":"C","title":["A Survey of Virtual Private LAN Services (VPLS): Past, Present and Future"],"prefix":"10.1016","volume":"196","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6216-0278","authenticated-orcid":false,"given":"Kuntal","family":"Gaur","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3985-4578","authenticated-orcid":false,"given":"Anshuman","family":"Kalla","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9717-0441","authenticated-orcid":false,"given":"Jyoti","family":"Grover","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3570-3297","authenticated-orcid":false,"given":"Mohammad","family":"Borhani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9829-9287","authenticated-orcid":false,"given":"Andrei","family":"Gurtov","sequence":"additional","affiliation":[]},{"given":"Madhusanka","family":"Liyanage","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b1","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/45.913204","article-title":"Virtual private networks","volume":"20","author":"Venkateswaran","year":"2001","journal-title":"IEEE Potentials"},{"key":"10.1016\/j.comnet.2021.108245_b2","series-title":"Framework for Layer 2 Virtual Private Networks (L2VPNs)","author":"Andersson","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b3","series-title":"Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs)","author":"Carugi","year":"2005"},{"issue":"6","key":"10.1016\/j.comnet.2021.108245_b4","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/MCOM.2004.1304249","article-title":"Layer 1 virtual private networks: service concepts, architecture requirements, and related advances in standardization","volume":"42","author":"Takeda","year":"2004","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2021.108245_b5","series-title":"Layer 1 VPN Basic Mode","author":"Fedyk","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b6","series-title":"Enhancing Security and Scalability of Virtual Private LAN Services","author":"Liyanage","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b7","series-title":"2017 IEEE International Conference on Computer and Information Technology (CIT)","first-page":"286","article-title":"Enhancing security, scalability and flexibility of virtual private LAN services","author":"Liyanage","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b8","series-title":"2020 IEEE Conference on Computer Applications (ICCA)","first-page":"1","article-title":"Comparative analysis of site-to-site layer 2 virtual private networks","author":"Aung","year":"2020"},{"key":"10.1016\/j.comnet.2021.108245_b9","series-title":"Network Architectures, Management, and Applications II, Vol. 5626","first-page":"137","article-title":"VPLS: an effective technology for building scalable transparent LAN services","author":"Dong","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b10","series-title":"Virtual Private LAN Service (VPLS) Using BGP for Auto-Discovery and Signaling","author":"Kompella","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b11","series-title":"Virtual Private LAN Service (VPLS) Using Label Distribution Protocol (LDP) Signaling","author":"Lasserre","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b12","series-title":"2012 IEEE Network Operations and Management Symposium","first-page":"237","article-title":"Monitoring the status of MPLS VPN and VPLS based on BGP signaling information","author":"Di\u00a0Battista","year":"2012"},{"key":"10.1016\/j.comnet.2021.108245_b13","series-title":"Internet Draft","article-title":"HIP-based virtual private LAN service (HIPLS)","author":"Henderson","year":"2011"},{"key":"10.1016\/j.comnet.2021.108245_b14","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/j.future.2015.09.010","article-title":"Assessment of SDN technology for an easy-to-use VPN service","volume":"56","author":"van\u00a0der Pol","year":"2016","journal-title":"Future Gener. Comput. Syst."},{"key":"10.1016\/j.comnet.2021.108245_b15","series-title":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","first-page":"379","article-title":"Rethinking virtual private networks in the software-defined era","author":"Lospoto","year":"2015"},{"issue":"3","key":"10.1016\/j.comnet.2021.108245_b16","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MCOM.2004.1273776","article-title":"Operation, administration, and maintenance of ethernet services in wide area networks","volume":"42","author":"Cavendish","year":"2004","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2021.108245_b17","series-title":"Layer 2 Virtual Private Network (L2VPN) Operations, Administration, and Maintenance (OAM) Requirements and Framework","author":"Sajassi","year":"2011"},{"key":"10.1016\/j.comnet.2021.108245_b18","unstructured":"J. Arco, J. Carral, A. Garc\u00eda, G. Iba\u00f1ez, RBP, Resilience and Traffic Balance Protocol in VPLS Access Network."},{"key":"10.1016\/j.comnet.2021.108245_b19","series-title":"System and method to facilitate interoperability between virtual private LAN service (VPLS) and ethernet virtual private network (EVPN) with all-active multi-homing","author":"Sajassi","year":"2020"},{"key":"10.1016\/j.comnet.2021.108245_b20","series-title":"2014 IEEE International Conference on Communications (ICC)","first-page":"2982","article-title":"A novel distributed spanning tree protocol for provider provisioned VPLS networks","author":"Liyanage","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b21","series-title":"SCADA: Supervisory Control and Data Acquisition","author":"Boyer","year":"2009"},{"key":"10.1016\/j.comnet.2021.108245_b22","series-title":"Boeing HIP Secure Mobile Architecture","author":"Henderson","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b23","series-title":"Whitepaper IDN","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b24","series-title":"TofinoSecurity Project","year":"2017"},{"issue":"2","key":"10.1016\/j.comnet.2021.108245_b25","doi-asserted-by":"crossref","first-page":"153","DOI":"10.12921\/cmst.2005.11.02.153-159","article-title":"Interdomain VPLS and deployment experiences","volume":"11","author":"Serrano","year":"2005","journal-title":"Comput. Methods Sci. Technol."},{"key":"10.1016\/j.comnet.2021.108245_b26","series-title":"Cisco VPLS Project","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b27","series-title":"Juniper Networks-VPLS","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b28","series-title":"Samsung Research VPLS","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b29","series-title":"Nokia VPLS Course","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b30","series-title":"Vodafone VPN Services","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b31","series-title":"VPLS Estimation","year":"2019"},{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b32","doi-asserted-by":"crossref","DOI":"10.1109\/35.815462","article-title":"MPLS: The magic behind the myths [Multi protocol label switching]","volume":"38","author":"Armitage","year":"2000","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2021.108245_b33","series-title":"WCC 2000-ICCT 2000. 2000 International Conference on Communication Technology Proceedings (Cat. No. 00EX420), Vol. 1","first-page":"691","article-title":"Research on tunneling techniques in virtual private networks","author":"Aqun","year":"2000"},{"issue":"3","key":"10.1016\/j.comnet.2021.108245_b34","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MCOM.2004.1273777","article-title":"Issues and approaches on extending ethernet beyond LANs","volume":"42","author":"Chiruvolu","year":"2004","journal-title":"IEEE Commun. Mag."},{"issue":"3","key":"10.1016\/j.comnet.2021.108245_b35","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1109\/MIC.2005.61","article-title":"Multiprotocol label switching and IP. Part I. MPLS VPNs over IP tunnels","volume":"9","author":"Daugherty","year":"2005","journal-title":"IEEE Internet Comput."},{"key":"10.1016\/j.comnet.2021.108245_b36","series-title":"Software Defined VPNs","author":"Konstantaras","year":"2014"},{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b37","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/COMST.2014.2330903","article-title":"A survey on software-defined networking","volume":"17","author":"Xia","year":"2014","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.comnet.2021.108245_b38","doi-asserted-by":"crossref","first-page":"2317","DOI":"10.1109\/COMST.2015.2474118","article-title":"Security in software defined networks: A survey","volume":"17","author":"Ahmad","year":"2015","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b39","first-page":"476","article-title":"A survey paper of distributed denial-of-service attack in software defined networking (SDN)","volume":"13","author":"Fajar","year":"2018","journal-title":"Int. J. Appl. Eng. Res."},{"key":"10.1016\/j.comnet.2021.108245_b40","series-title":"Virtual private network","author":"Seid","year":"1998"},{"issue":"4","key":"10.1016\/j.comnet.2021.108245_b41","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/S1361-3723(18)30034-4","article-title":"VPN: From an obscure network to a widespread solution","volume":"2018","author":"Longworth","year":"2018","journal-title":"Comput. Fraud Secur."},{"key":"10.1016\/j.comnet.2021.108245_b42","series-title":"Generic Requirements for Provider Provisioned Virtual Private Networks (PPVPN)","author":"Nagarajan","year":"2004"},{"key":"10.1016\/j.comnet.2021.108245_b43","series-title":"Provider Provisioned Virtual Private Network (VPN) Terminology","author":"Andersson","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b44","series-title":"Framework and Requirements for Layer 1 Virtual Private Networks","author":"Takeda","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b45","series-title":"OSPF-Based Layer 1 VPN Auto-Discovery","author":"Bryskin","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b46","series-title":"Applicability Statement for Layer 1 Virtual Private Network (L1VPN) Basic Mode","author":"Takeda","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b47","series-title":"A YANG Data Model for Layer 2 Virtual Private Network (L2VPN) Service Delivery","author":"Wen","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b48","series-title":"Layer 2 Virtual Private Network (L2VPN) Extensions for Layer 2 Tunneling Protocol (L2TP)","author":"Luo","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b49","series-title":"Pseudowire Redundancy","author":"Muley","year":"2012"},{"key":"10.1016\/j.comnet.2021.108245_b50","series-title":"Multicast in Virtual Private LAN Service (VPLS)","author":"Aggarwal","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b51","series-title":"Protocol Independent Multicast (PIM) over Virtual Private LAN Service (VPLS)","author":"Dornon","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b52","series-title":"Updated Processing of Control Flags for BGP Virtual Private LAN Service (VPLS)","author":"Singh","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b53","series-title":"IP-Only LAN Service (IPLS)","author":"Shah","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b54","series-title":"A Framework for Layer 3 Provider-Provisioned Virtual Private Networks (PPVPNS)","author":"Callon","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b55","series-title":"Layer 3 Virtual Private Network (VPN) Tunnel Traffic Leakages in Dual-Stack Hosts\/Networks","author":"Gont","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b56","series-title":"BGP\/MPLS IP Virtual Private Networks (VPNs)","author":"Rosen","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b57","series-title":"Constrained Route Distribution for Border Gateway Protocol\/ Multi Protocol Label Switching (BGP\/MPLS) Internet Protocol (IP) Virtual Private Networks (VPNs)","author":"Marques","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b58","series-title":"Use of Provider Edge to Provider Edge (PE-PE) Generic Routing Encapsulation (GRE) or IP in BGP\/MPLS IP Virtual Private Networks","author":"Rekhter","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b59","series-title":"Virtual Subnet: A BGP\/MPLS IP VPN-Based Subnet Extension Solution","author":"Raszuk","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b60","series-title":"Security Model with Tunnel-Mode IPsec for NAT Domains","author":"Srisuresh","year":"1999"},{"key":"10.1016\/j.comnet.2021.108245_b61","series-title":"Securing L2TP using IPsec","author":"Patel","year":"2001"},{"key":"10.1016\/j.comnet.2021.108245_b62","series-title":"Using Authenticated Encryption Algorithms with the Encrypted Payload of the Internet Key Exchange Version 2 (IKEv2) Protocol","author":"Black","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b63","series-title":"Ethernet-Tree (E-Tree) Support in Ethernet VPN (EVPN) and Provider Backbone Bridging EVPN (PBB-EVPN)","author":"Uttaro","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b64","series-title":"Framework for Ethernet VPN Designated Forwarder Election Extensibility","author":"Drake","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b65","series-title":"Seamless Integration of Ethernet VPN (EVPN) with Virtual Private LAN Service (VPLS) and Their Provider Backbone Bridge (PBB) Equivalents","author":"Sajassi","year":"2019"},{"key":"10.1016\/j.comnet.2021.108245_b66","series-title":"Virtual eXtensible Local Area Network (VXLAN): A Framework for Overlaying Virtualized Layer 2 Networks over Layer 3 Networks","author":"Mahalingam","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b67","series-title":"A Network Virtualization Overlay Solution Using ETHERNET VPN (EVPN)","author":"Sajassi","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b68","series-title":"2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS)","first-page":"60","article-title":"Performance analysis of open-source linux-based HIP implementations","author":"Okwuibe","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b69","series-title":"Comparing, Designing, and Deploying VPNs","author":"Lewis","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b70","series-title":"Service Requirements for Layer 2 Provider-Provisioned Virtual Private Networks","author":"Augustyn","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b71","series-title":"Ethernet services over MPLS networks","first-page":"425","author":"Hussain","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b72","series-title":"Deliverable D2 \u201cDefinition of Network Management and Control requirements of network scenarios and solutions supporting Broadband Services for All\u201d","author":"Nobel","year":"2004"},{"key":"10.1016\/j.comnet.2021.108245_b73","series-title":"Proceedings 2000. International Workshop on Parallel Processing","first-page":"479","article-title":"End-to-end QoS architecture for VPNs: MPLS VPN deployment in a backbone network","author":"Lee","year":"2000"},{"key":"10.1016\/j.comnet.2021.108245_b74","series-title":"Proceedings of the Eighth IEEE Symposium on Computers and Communications. ISCC 2003","first-page":"975","article-title":"VPN scalability over high performance backbones evaluating MPLS VPN against traditional approaches","author":"Palmieri","year":"2003"},{"key":"10.1016\/j.comnet.2021.108245_b75","series-title":"A Border Gateway Protocol 4 (BGP-4)","author":"Rekhter","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b76","series-title":"A Border Gateway Protocol 4 (BGP-4)","author":"Rekhter","year":"1995"},{"key":"10.1016\/j.comnet.2021.108245_b77","series-title":"Layer 2 solutions in access provider networks","author":"J\u00e4rvi","year":"2020"},{"key":"10.1016\/j.comnet.2021.108245_b78","series-title":"Host Identity Protocol (HIP) Architecture","author":"Moskowitz","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b79","series-title":"2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC)","first-page":"1","article-title":"Software defined VPLS architectures: Opportunities and challenges","author":"Liyanage","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b80","doi-asserted-by":"crossref","first-page":"967","DOI":"10.1109\/ACCESS.2015.2447014","article-title":"Secure hierarchical VPLS architecture for provider provisioned networks","volume":"3","author":"Liyanage","year":"2015","journal-title":"IEEE Access"},{"key":"10.1016\/j.comnet.2021.108245_b81","series-title":"BGP Route Reflection: An Alternative to Full Mesh Internal BGP","author":"Bates","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b82","series-title":"Security Framework for Provider-Provisioned Virtual Private Networks (PPVPNs)","author":"Fang","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b83","series-title":"Generic Threats to Routing Protocols","author":"Barbir","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b84","series-title":"Security Mechanisms for the Internet","author":"Bellovin","year":"2003"},{"key":"10.1016\/j.comnet.2021.108245_b85","series-title":"Conference Proceedings of the 1996 IEEE Fifteenth Annual International Phoenix Conference on Computers and Communications","first-page":"218","article-title":"TCP\/IP spoofing fundamentals","author":"Hastings","year":"1996"},{"key":"10.1016\/j.comnet.2021.108245_b86","series-title":"MPLS VPN Security","author":"Behringer","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b87","series-title":"System and method for optimizing error detection to detect unauthorized modification of transmitted data","author":"Whitehead","year":"2010"},{"key":"10.1016\/j.comnet.2021.108245_b88","series-title":"Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No. 97CB36097)","first-page":"208","article-title":"Analysis of a denial of service attack on TCP","author":"Schuba","year":"1997"},{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b89","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MIC.2006.5","article-title":"Denial-of-service attack-detection techniques","volume":"10","author":"Carl","year":"2006","journal-title":"IEEE Internet Comput."},{"issue":"4","key":"10.1016\/j.comnet.2021.108245_b90","doi-asserted-by":"crossref","first-page":"89","DOI":"10.3390\/fi11040089","article-title":"Social engineering attacks: A survey","volume":"11","author":"Salahdine","year":"2019","journal-title":"Future Internet"},{"key":"10.1016\/j.comnet.2021.108245_b91","series-title":"Protection of BGP Sessions via the TCP MD5 Signature Option","author":"Heffernan","year":"1998"},{"key":"10.1016\/j.comnet.2021.108245_b92","series-title":"The MD5 message-digest algorithm","author":"Rivest","year":"1992"},{"issue":"4","key":"10.1016\/j.comnet.2021.108245_b93","doi-asserted-by":"crossref","first-page":"582","DOI":"10.1109\/49.839934","article-title":"Secure border gateway protocol (S-BGP)","volume":"18","author":"Kent","year":"2000","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2021.108245_b94","series-title":"LDP Specification","author":"Andersson","year":"2001"},{"key":"10.1016\/j.comnet.2021.108245_b95","series-title":"2015 IEEE International Conference on Communication Workshop (ICCW)","first-page":"2231","article-title":"Secure virtual private LAN services: An overview with performance evaluation","author":"Liyanage","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b96","series-title":"2013 IEEE Conference on Communications and Network Security (CNS)","first-page":"233","article-title":"Secure hierarchical virtual private LAN services for provider provisioned networks","author":"Liyanage","year":"2013"},{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b97","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/sec.701","article-title":"Securing virtual private LAN service by efficient key management","volume":"7","author":"Liyanage","year":"2014","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.comnet.2021.108245_b98","series-title":"2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC)","first-page":"530","article-title":"Improving the tunnel management performance of secure VPLS architectures with SDN","author":"Liyanage","year":"2016"},{"issue":"8","key":"10.1016\/j.comnet.2021.108245_b99","doi-asserted-by":"crossref","first-page":"4829","DOI":"10.1007\/s11227-019-02767-z","article-title":"Toward secure software-defined networks against distributed denial of service attack","volume":"75","author":"Sahoo","year":"2019","journal-title":"J. Supercomput."},{"key":"10.1016\/j.comnet.2021.108245_b100","series-title":"Handbook of Computer Networks and Cyber Security","first-page":"341","article-title":"Software-defined network (SDN) data plane security: Issues, solutions, and future directions","author":"Shaghaghi","year":"2020"},{"key":"10.1016\/j.comnet.2021.108245_b101","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.comnet.2017.01.007","article-title":"Secure communication channel architecture for software defined mobile networks","volume":"114","author":"Liyanage","year":"2017","journal-title":"Comput. Netw."},{"issue":"3","key":"10.1016\/j.comnet.2021.108245_b102","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1049\/iet-ifs.2014.0525","article-title":"Border gateway protocol graph: Detecting and visualising internet routing anomalies","volume":"10","author":"Papadopoulos","year":"2016","journal-title":"IET Inf. Secur."},{"issue":"1","key":"10.1016\/j.comnet.2021.108245_b103","first-page":"5","article-title":"Border gateway protocol anomaly detection using machine learning techniques","volume":"2","author":"Edwards","year":"2019","journal-title":"SMU Data Sci. Rev."},{"key":"10.1016\/j.comnet.2021.108245_b104","doi-asserted-by":"crossref","unstructured":"P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, G. Gu, A security enforcement kernel for openflow networks, in: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, 2012, pp. 121\u2013126.","DOI":"10.1145\/2342441.2342466"},{"key":"10.1016\/j.comnet.2021.108245_b105","doi-asserted-by":"crossref","unstructured":"E. Al-Shaer, S. Al-Haj, FlowChecker: Configuration analysis and verification of federated openflow infrastructures, in: Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010, pp. 37\u201344.","DOI":"10.1145\/1866898.1866905"},{"key":"10.1016\/j.comnet.2021.108245_b106","series-title":"Presented as Part of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13)","first-page":"15","article-title":"Veriflow: Verifying network-wide invariants in real time","author":"Khurshid","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b107","unstructured":"T. Feng, J. Bi, G. Yao, P. Xiao, InSAVO: Intra-AS IP source address validation solution with OpenRouter, in: Proceedings of INFOCOM, 2012."},{"key":"10.1016\/j.comnet.2021.108245_b108","series-title":"Presented as Part of the 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13)","first-page":"99","article-title":"Real time network policy checking using header space analysis","author":"Kazemian","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b109","series-title":"2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS)","first-page":"830","article-title":"Foces: Detecting forwarding anomalies in software defined networks","author":"Zhang","year":"2018"},{"issue":"6","key":"10.1016\/j.comnet.2021.108245_b110","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1109\/TDSC.2018.2810880","article-title":"Dynamic packet forwarding verification in SDN","volume":"16","author":"Li","year":"2018","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.comnet.2021.108245_b111","doi-asserted-by":"crossref","unstructured":"A. Voellmy, J. Wang, Scalable software defined network controllers, in: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, 2012, pp. 289\u2013290.","DOI":"10.1145\/2342356.2342414"},{"key":"10.1016\/j.comnet.2021.108245_b112","series-title":"2014 IEEE Network Operations and Management Symposium (NOMS)","first-page":"1","article-title":"DISCO: Distributed multi-domain SDN controllers","author":"Phemius","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b113","unstructured":"A. Tootoonchian, Y. Ganjali, Hyperflow: A distributed control plane for openflow, in: Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, Vol. 3, 2010."},{"key":"10.1016\/j.comnet.2021.108245_b114","series-title":"20th Annual Network & Distributed System Security Symposium","article-title":"Fresco: Modular composable security services for software-defined networks","author":"Shin","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b115","series-title":"INFORMATIK 2013\u2013Informatik Angepasst an Mensch, Organisation und Umwelt","article-title":"COFFEE: A concept based on openflow to filter and erase events of botnet activity at high-speed nodes","author":"Schehlmann","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b116","series-title":"Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014","first-page":"1","article-title":"Securing the control channel of software-defined mobile networks","author":"Liyanage","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b117","series-title":"Ndss, Vol. 15","first-page":"8","article-title":"SPHINX: Detecting security attacks in software-defined networks","author":"Dhawan","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b118","doi-asserted-by":"crossref","unstructured":"A. Shaghaghi, M.A. Kaafar, S. Jha, Wedgetail: An intrusion prevention system for the data plane of software defined networks, in: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017, pp. 849\u2013861.","DOI":"10.1145\/3052973.3053039"},{"key":"10.1016\/j.comnet.2021.108245_b119","series-title":"Hierarchical Virtual Private LAN Service","author":"Khandekar","year":"2002"},{"key":"10.1016\/j.comnet.2021.108245_b120","series-title":"Scalable virtual private local area network service","author":"Martini","year":"2010"},{"key":"10.1016\/j.comnet.2021.108245_b121","series-title":"21st International Conference on Advanced Information Networking and Applications Workshops (AINAW\u201907), Vol. 1","first-page":"870","article-title":"MAC address translation for enabling scalable virtual private lan services","author":"Wang","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b122","series-title":"2017 IEEE URUCON","first-page":"1","article-title":"Scalability testing of legacy MPLS-based virtual private networks","author":"L\u00f3pez","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b123","series-title":"Virtual layer 2 and mechanism to make it scalable","author":"Dunbar","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b124","series-title":"System, apparatus and method for massively scalable dynamic multipoint virtual private network using group encryption keys","author":"Ben-Shalom","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b125","series-title":"Method and apparatus for connecting a gateway router to a set of scalable virtual IP network appliances in overlay networks","author":"Hammam","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b126","series-title":"Scalable handling of BGP route information in VXLAN with EVPN control plane","author":"Dong","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b127","series-title":"2017 IEEE International Conference on Computer and Information Technology (CIT)","first-page":"192","article-title":"Fast transmission mechanism for secure VPLS architectures","author":"Liyanage","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b128","series-title":"A Framework for Defining Network Complexity","author":"Behringer","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b129","series-title":"DFN-Arbeitstagung \u00dcber Kommunikationsnetze","first-page":"289","article-title":"Virtual private networks coping with complexity","author":"Steffen","year":"2003"},{"key":"10.1016\/j.comnet.2021.108245_b130","series-title":"Reducing network configuration complexity with transparent virtual private networks","author":"Shelest","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b131","series-title":"Methods and systems for firewalling virtual private networks","author":"Keane","year":"2009"},{"key":"10.1016\/j.comnet.2021.108245_b132","series-title":"Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM 2003)(IEEE Cat. No. 03EX764)","first-page":"99","article-title":"Off-line reduced complexity layout design for MPLS networks","author":"Beker","year":"2003"},{"key":"10.1016\/j.comnet.2021.108245_b133","series-title":"Reduced complexity multi protocol label switching","author":"Duncan","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b134","series-title":"Smc 2000 Conference Proceedings. 2000 Ieee International Conference on Systems, Man and Cybernetics.\u2019Cybernetics Evolving to Systems, Humans, Organizations, and their Complex Interactions\u2019(Cat. No. 0), Vol. 3","first-page":"1972","article-title":"A work domain analysis for virtual private networks","author":"Kuo","year":"2000"},{"key":"10.1016\/j.comnet.2021.108245_b135","series-title":"Credentials management in large scale virtual private network deployment","author":"Walter","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b136","doi-asserted-by":"crossref","first-page":"7","DOI":"10.33166\/AETiC.2017.01.002","article-title":"Comparing the complexity of two network architectures","author":"Zheng","year":"2017","journal-title":"Ann. Emerg. Technol. Comput. (AETiC)"},{"key":"10.1016\/j.comnet.2021.108245_b137","series-title":"Handbook of Research on Progressive Trends in Wireless Communications and Networking","first-page":"44","article-title":"IP-based virtual private network implementations in future cellular networks","author":"Liyanage","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b138","series-title":"Tunneling scheme optimized for use in virtual private networks","author":"Aysan","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b139","series-title":"Generic Routing Encapsulation (GRE)","author":"Farinacci","year":"2000"},{"key":"10.1016\/j.comnet.2021.108245_b140","series-title":"The Secure Sockets Layer (SSL) Protocol Version 3.0","author":"Freier","year":"2011"},{"key":"10.1016\/j.comnet.2021.108245_b141","series-title":"RFC 5246-The Transport Layer Security (TLS) Protocol Version 1.2","author":"Dierks","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b142","series-title":"19th International Conference on Advanced Information Networking and Applications (AINA\u201905) Volume 1 (AINA Papers), Vol. 2","first-page":"395","article-title":"A technical comparison of IPSec and SSL","author":"Alshamsi","year":"2005"},{"issue":"9","key":"10.1016\/j.comnet.2021.108245_b143","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S1361-3723(05)70254-2","article-title":"Securing VPNS: Comparing SSL and IPsec","volume":"2005","author":"Stanton","year":"2005","journal-title":"Comput. Fraud Secur."},{"key":"10.1016\/j.comnet.2021.108245_b144","series-title":"The Transport Layer Security (TLS) Protocol Version 1.3","author":"Rescorla","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b145","doi-asserted-by":"crossref","DOI":"10.1016\/j.csi.2019.103357","article-title":"Towards a standard SDN-based IPsec management framework","author":"Lopez-Millan","year":"2019","journal-title":"Comput. Stand. Interfaces"},{"key":"10.1016\/j.comnet.2021.108245_b146","series-title":"IPSec: Securing VPNs","author":"Davis","year":"2001"},{"key":"10.1016\/j.comnet.2021.108245_b147","series-title":"Using the Encapsulating Security Payload (ESP) Transport Format with the Host Identity Protocol (HIP)","author":"Jokela","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b148","series-title":"A Bound End-to-End Tunnel (BEET) mode for ESP","first-page":"32","author":"Nikander","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b149","series-title":"Host Identity Protocol (HIP): Towards the Secure Mobile Internet, Vol. 21","author":"Gurtov","year":"2008"},{"key":"10.1016\/j.comnet.2021.108245_b150","series-title":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","first-page":"1115","article-title":"A scalable and secure VPLS architecture for provider provisioned networks","author":"Liyanage","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b151","unstructured":"O. Ponomarev, A. Gurtov, Stress testing of host identity protocol (HIP) implementations, in: Proceedings of Third International Conference on Internet Technologies and Applications, 2009."},{"key":"10.1016\/j.comnet.2021.108245_b152","series-title":"Extended layer two tunneling protocol applications and architectures","author":"Emmendorfer","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b153","series-title":"Mechanism for E-VPN interoperability with VPLS","author":"Salam","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b154","series-title":"Pseudowire tunnel redundancy","author":"Proulx","year":"2011"},{"key":"10.1016\/j.comnet.2021.108245_b155","series-title":"Methods and systems for providing redundant connectivity across a network using a tunneling protocol","author":"Frick","year":"2007"},{"key":"10.1016\/j.comnet.2021.108245_b156","series-title":"Compatibility Definition","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b157","series-title":"Virtual L2TP\/VPN tunnel network and spanning tree-based method for discovery of L2TP\/VPN tunnels and other layer-2 services","author":"Rajakarunanayake","year":"2004"},{"key":"10.1016\/j.comnet.2021.108245_b158","series-title":"Spanning tree protocol traffic in a transparent LAN","author":"Kotser","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b159","series-title":"Spanning tree protocol synchronization within virtual private networks","author":"Kompella","year":"2011"},{"key":"10.1016\/j.comnet.2021.108245_b160","series-title":"Seamless migration from multiple spanning tree protocol to ethernet ring protection switching protocol","author":"Colven","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b161","series-title":"Provider edge in virtual private LAN service network","author":"Gao","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b162","series-title":"Virtual private network implementation method and system based on traffic engineering tunnel","author":"Li","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b163","series-title":"Method for traffic engineering of connectionless virtual private network services","author":"Wright","year":"2010"},{"issue":"12","key":"10.1016\/j.comnet.2021.108245_b164","doi-asserted-by":"crossref","first-page":"2360","DOI":"10.1016\/j.comnet.2008.04.015","article-title":"Loop-free traffic engineering with path protection in MPLS VPNs","volume":"52","author":"Naraghi-Pour","year":"2008","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2021.108245_b165","series-title":"2005 Systems Communications (ICW\u201905, ICHSN\u201905, ICMCS\u201905, SENET\u201905)","first-page":"275","article-title":"Multi-path traffic engineering distributed VPLS routing algorithm","author":"AbuAli","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b166","series-title":"Method and system for quality of service provisioning for IP virtual private networks","author":"Talpade","year":"2005"},{"key":"10.1016\/j.comnet.2021.108245_b167","series-title":"2016 5th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions)(ICRITO)","first-page":"526","article-title":"Virtual private network as a service\u2014A need for discrete cloud architecture","author":"Bhat","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b168","series-title":"Methods and apparatus to configure virtual private mobile networks with virtual private networks","author":"Van Der\u00a0Merwe","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b169","series-title":"Introduction to IDN","author":"Dolan","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b170","series-title":"IDN Introduction","author":"Andrei\u00a0Gurtov","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b171","series-title":"Requirements for ETHERNET VPN (EVPN)","author":"Sajassi","year":"2014"},{"key":"10.1016\/j.comnet.2021.108245_b172","series-title":"BGP MPLS based ETHERNET VPN","author":"Sajassi","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b173","series-title":"The Illustrated Network (Second Edition)","first-page":"535","article-title":"Chapter 21 - EVPN and VXLAN","author":"Goralski","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b174","series-title":"2017 8th International Conference on Computing, Communication and Networking Technologies (ICCCNT)","first-page":"1","article-title":"VXLAN and EVPN for data center network transformation","author":"Singh","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b175","series-title":"Handbook of Fiber Optic Data Communication (Fourth Edition)","first-page":"321","article-title":"Chapter 13 - network architectures and overlay networks","author":"DeCusatis","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b176","doi-asserted-by":"crossref","unstructured":"Y. Nakagawa, K. Hyoudou, T. Shimizu, A management method of IP multicast in overlay networks using openflow, in: Proceedings of the First Workshop on Hot Topics in Software Defined Networks, 2012, pp. 91\u201396.","DOI":"10.1145\/2342441.2342460"},{"key":"10.1016\/j.comnet.2021.108245_b177","series-title":"Communication between endpoints in different VXLAN networks","author":"Zhang","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b178","series-title":"2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM)","first-page":"782","article-title":"ViNO: SDN overlay to allow seamless migration across heterogeneous infrastructure","author":"Bemby","year":"2015"},{"issue":"4","key":"10.1016\/j.comnet.2021.108245_b179","first-page":"1058","article-title":"Secure communication and data processing challenges in the industrial internet","volume":"4","author":"Gurtov","year":"2016","journal-title":"Balt. J. Mod. Comput."},{"key":"10.1016\/j.comnet.2021.108245_b180","series-title":"Guide to Disaster-Resilient Communication Networks","first-page":"219","article-title":"Secure and resilient communications in the industrial internet","author":"Borhani","year":"2020"},{"key":"10.1016\/j.comnet.2021.108245_b181","series-title":"2012 IEEE Vehicular Technology Conference (VTC Fall)","first-page":"1","article-title":"Secured VPN models for LTE backhaul networks","author":"Liyanage","year":"2012"},{"issue":"10","key":"10.1016\/j.comnet.2021.108245_b182","doi-asserted-by":"crossref","first-page":"1198","DOI":"10.1002\/sec.1411","article-title":"Novel secure VPN architectures for LTE backhaul networks","volume":"9","author":"Liyanage","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"10.1016\/j.comnet.2021.108245_b183","series-title":"2015 IEEE 10th International Conference on Industrial and Information Systems (ICIIS)","first-page":"220","article-title":"Leveraging LTE security with SDN and NFV","author":"Liyanage","year":"2015"},{"key":"10.1016\/j.comnet.2021.108245_b184","series-title":"2006 Canadian Conference on Electrical and Computer Engineering","first-page":"995","article-title":"A minimum-cost resilient tree-based VPLS for digital TV broadcast services","author":"Raahemi","year":"2006"},{"key":"10.1016\/j.comnet.2021.108245_b185","series-title":"International Congress on Ultra Modern Telecommunications and Control Systems","first-page":"576","article-title":"Experimental implementation of an IPTV architecture based on content delivery network managed by VPLS technique","author":"Pompei","year":"2010"},{"key":"10.1016\/j.comnet.2021.108245_b186","series-title":"SIGMONA Project","year":"2013"},{"key":"10.1016\/j.comnet.2021.108245_b187","series-title":"TDP Project","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b188","series-title":"SecureConnect Project","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b189","series-title":"TDP Project","year":"2017"},{"key":"10.1016\/j.comnet.2021.108245_b190","series-title":"TWAREN Project","year":"2020"},{"key":"10.1016\/j.comnet.2021.108245_b191","series-title":"International GENI","year":"2018"},{"key":"10.1016\/j.comnet.2021.108245_b192","series-title":"MEVICO Project","year":"2010"},{"key":"10.1016\/j.comnet.2021.108245_b193","series-title":"CELTIC Project","year":"2010"},{"issue":"13","key":"10.1016\/j.comnet.2021.108245_b194","doi-asserted-by":"crossref","DOI":"10.1002\/cpe.4138","article-title":"PRAGMA-ENT: An international SDN testbed for cyberinfrastructure in the Pacific Rim","volume":"29","author":"Ichikawa","year":"2017","journal-title":"Concurr. Comput.: Pract. Exper."},{"key":"10.1016\/j.comnet.2021.108245_b195","series-title":"2016 30th International Conference on Advanced Information Networking and Applications Workshops (WAINA)","first-page":"861","article-title":"L2OVX: An on-demand VPLS service with software-defined networks","author":"Hu","year":"2016"},{"key":"10.1016\/j.comnet.2021.108245_b196","series-title":"SDN for End-to-end Networked Science at the Exascale (SENSE)-Final Technical Report","author":"Yang","year":"2019"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128621002814?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128621002814?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:13:10Z","timestamp":1761397990000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128621002814"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":196,"alternative-id":["S1389128621002814"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2021.108245","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2021,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A Survey of Virtual Private LAN Services (VPLS): Past, Present and Future","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2021.108245","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"108245"}}