{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T11:06:31Z","timestamp":1769943991597,"version":"3.49.0"},"reference-count":58,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,1]],"date-time":"2022-10-01T00:00:00Z","timestamp":1664582400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1016\/j.comnet.2022.109267","type":"journal-article","created":{"date-parts":[[2022,8,6]],"date-time":"2022-08-06T19:21:30Z","timestamp":1659813690000},"page":"109267","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":9,"special_numbering":"C","title":["Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain"],"prefix":"10.1016","volume":"216","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0993-2395","authenticated-orcid":false,"given":"Aldo","family":"Febro","sequence":"first","affiliation":[]},{"given":"Hannan","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Spring","sequence":"additional","affiliation":[]},{"given":"Bruce","family":"Christianson","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.comnet.2022.109267_bib0001","unstructured":"D. J. Trump, \u201cPresidential executive order on strengthening the cybersecurity of federal networks and critical infrastructure.\u201d https:\/\/www.whitehouse.gov\/presidential-actions\/presidential-executive-order-strengthening-cybersecurity-federal-networks-critical-infrastructure\/, 2017."},{"key":"10.1016\/j.comnet.2022.109267_bib0002","series-title":"A Report to the President on Enhancing the Resilience of the Internet and Communications Ecosystem Against Botnets and Other Automated, Distributed Threats","year":"2018"},{"key":"10.1016\/j.comnet.2022.109267_bib0003","series-title":"A Road Map Toward Resilience Against Botnets","year":"2018"},{"key":"10.1016\/j.comnet.2022.109267_bib0004","series-title":"NISTIR 8228 Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks","first-page":"44","author":"Boeckl","year":"2019"},{"key":"10.1016\/j.comnet.2022.109267_bib0005","first-page":"41","article-title":"Security review of consumer home IoT products","author":"Fagan","year":"2019","journal-title":"Nist"},{"key":"10.1016\/j.comnet.2022.109267_bib0006","series-title":"Foundational cybersecurity activities for IoT device manufacturers","author":"Fagan","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0007","series-title":"NIST SPECIAL PUBLICATION 1800-15C Securing Small-Business and Home Internet of Things (IoT) Devices","author":"Lear","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0008","article-title":"RFC 8520: manufacturer usage description specification","author":"Lear","year":"2019","journal-title":"Internet Eng. Task Force"},{"key":"10.1016\/j.comnet.2022.109267_bib0009","series-title":"The Yang 1.1 Data Modeling Language","author":"Bjorklund","year":"2016"},{"key":"10.1016\/j.comnet.2022.109267_bib0010","series-title":"The Javascript Object Notation (json) Data Interchange Format","author":"Bray","year":"2017"},{"key":"10.1016\/j.comnet.2022.109267_bib0011","series-title":"Yang Data Model for Network Access Control Lists (acls)","author":"Jethanandani","year":"2019"},{"key":"10.1016\/j.comnet.2022.109267_bib0012","series-title":"Json Encoding of Data Modeled with Yang","author":"Lhotka","year":"2016"},{"key":"10.1016\/j.comnet.2022.109267_bib0013","series-title":"Cryptographic Message Syntax (cms)","author":"Housley","year":"2009"},{"key":"10.1016\/j.comnet.2022.109267_bib0014","series-title":"Draft NIST CSWP, Methodology for Characterizing Network Behavior of Internet of Things Devices","author":"Watrobski","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0015","series-title":"Trusted Internet of Things (IoT) Device Network-Layer Onboarding and Lifecycle Management (Draft)","author":"Symington","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0016","series-title":"Remote Triggered Black hole Filtering with Unicast Reverse path Forwarding (urpf)","author":"Kumari","year":"2009"},{"key":"10.1016\/j.comnet.2022.109267_bib0017","series-title":"Dissemination of Flow Specification Rules","author":"Marques","year":"2009"},{"key":"10.1016\/j.comnet.2022.109267_bib0018","series-title":"Ingress Filtering for multihomed networks","author":"Baker","year":"2004"},{"key":"10.1016\/j.comnet.2022.109267_bib0019","article-title":"Enhanced feasible-path unicast reverse path forwarding","volume":"84","author":"Sriram","year":"2020","journal-title":"RFC Editor"},{"key":"10.1016\/j.comnet.2022.109267_bib0020","series-title":"Proc. IETF 93 Prague","article-title":"DDoS open threat signaling (dots) working group operational requirements","author":"Morrow","year":"2015"},{"issue":"8","key":"10.1016\/j.comnet.2022.109267_bib0021","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MC.2020.2993330","article-title":"21 years of distributed denial-of-service: a call to action","volume":"53","author":"Osterweil","year":"2020","journal-title":"Computer"},{"key":"10.1016\/j.comnet.2022.109267_bib0022","series-title":"Proceedings of the Internet Measurement Conference, IMC \u201919, (New York, NY, USA)","first-page":"435","article-title":"Down the black hole: Dismantling operational practices of BGP black-holing at ixps","author":"Nawrocki","year":"2019"},{"key":"10.1016\/j.comnet.2022.109267_bib0023","series-title":"Proceedings of the 2017 Internet Measurement Conference, IMC \u201917, (New York, NY, USA)","article-title":"Inferring BGP blackholing activity in the internet","author":"Giotsas","year":"2017"},{"key":"10.1016\/j.comnet.2022.109267_bib0024","series-title":"Proceedings of the 14th International Conference on Emerging Networking EXperiments and Technologies, CoNEXT \u201918, (New York, NY, USA)","first-page":"152","article-title":"Stellar: network attack mitigation using advanced blackholing","author":"Dietzel","year":"2018"},{"key":"10.1016\/j.comnet.2022.109267_bib0025","series-title":"Proceedings of the 2019 ACM Symposium on SDN Research, SOSR \u201919, (New York, NY, USA)","first-page":"36","article-title":"Detecting volumetric attacks on lot devices via SDN-based monitoring of mud activity","author":"Hamza","year":"2019"},{"key":"10.1016\/j.comnet.2022.109267_bib0026","series-title":"Proceedings of the 2018 Workshop on IoT Security and Privacy, IoT Samp;P \u201918, (New York, NY, USA)","first-page":"1","article-title":"Combining mud policies with SDN for IoT intrusion detection","author":"Hamza","year":"2018"},{"key":"10.1016\/j.comnet.2022.109267_bib0027","series-title":"NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"NFV-based IoT security for home networks using mud","author":"Afek","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0028","series-title":"NOMS 2020-2020 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"NFV-based IoT security at the ISP level","author":"Afek","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0029","series-title":"2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud)","first-page":"157","article-title":"Flow based security for IoT devices using an SDN gateway","author":"Bull","year":"2016"},{"key":"10.1016\/j.comnet.2022.109267_bib0030","series-title":"17th IEEE International Conference on Computer and Information Technology","article-title":"Software-defined edge Defense against IoT-based DDoS","author":"Ozcelik","year":"2017"},{"key":"10.1016\/j.comnet.2022.109267_bib0031","series-title":"2017 27th International Telecommunication Networks and Applications Conference (ITNAC)","first-page":"1","article-title":"Dynamic attack detection and mitigation in IoT using SDN","author":"Bhunia","year":"2017"},{"issue":"5","key":"10.1016\/j.comnet.2022.109267_bib0032","doi-asserted-by":"crossref","first-page":"e2038","DOI":"10.1002\/nem.2038","article-title":"Enhancing IoT security through network Softwarization and virtual security appliances","volume":"28","author":"Molina Zarca","year":"2018","journal-title":"Int. J. Netw. Manag."},{"issue":"2","key":"10.1016\/j.comnet.2022.109267_bib0033","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MCOM.2018.1700621","article-title":"A multi-level DDoS mitigation framework for the industrial internet of things","volume":"56","author":"Yan","year":"2018","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/j.comnet.2022.109267_bib0034","doi-asserted-by":"crossref","first-page":"24694","DOI":"10.1109\/ACCESS.2018.2831284","article-title":"A DDoS attack detection and mitigation with software-defined internet of things framework","volume":"6","author":"Yin","year":"2018","journal-title":"IEEE Access"},{"issue":"7","key":"10.1016\/j.comnet.2022.109267_bib0035","doi-asserted-by":"crossref","first-page":"2809","DOI":"10.1007\/s12652-019-01387-y","article-title":"Unsupervised intelligent system based on one class support vector machine and grey wolf optimization for IoT botnet detection","volume":"11","author":"Al Shorman","year":"2019","journal-title":"J. Ambient Intell. Humaniz. Comput."},{"key":"10.1016\/j.comnet.2022.109267_bib0036","series-title":"NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium","first-page":"1","article-title":"Demo: NFV-based IoT security at the ISP level","author":"Afek","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0037","series-title":"Annual Computer Security Applications Conference, ACSAC, (New York, NY, USA)","first-page":"337","article-title":"Is visualization enough? Evaluating the efficacy of mud-visualizer in enabling ease of deployment for manufacturer usage description (mud)","author":"Andalibi","year":"2021"},{"key":"10.1016\/j.comnet.2022.109267_bib0038","series-title":"Framework for Improving Critical Infrastructure Cybersecurity Version 1.1, NIST Cybersecurity Framework,[online]","author":"Barret","year":"2018"},{"issue":"1","key":"10.1016\/j.comnet.2022.109267_bib0039","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1109\/COMST.2017.2782482","article-title":"Distributed SDN control: survey, taxonomy, and challenges","volume":"20","author":"Bannour","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"3","key":"10.1016\/j.comnet.2022.109267_bib0040","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2656877.2656890","article-title":"P4: programming protocol-independent packet processors","volume":"44","author":"Bosshart","year":"2014","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10.1016\/j.comnet.2022.109267_bib0041","unstructured":"Netbergtw. https:\/\/netbergtw.com\/products\/aurora-710\/, 2020."},{"key":"10.1016\/j.comnet.2022.109267_bib0042","unstructured":"Netronome. https:\/\/www.netronome.com\/products\/agilio-cx\/, 2020."},{"key":"10.1016\/j.comnet.2022.109267_bib0043","series-title":"Pensando dsc-25 Distributed Services Card","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0044","series-title":"Cisco Silicon one","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0045","article-title":"SDN history","author":"Casado","year":"2019","journal-title":"tech. rep."},{"key":"10.1016\/j.comnet.2022.109267_bib0046","series-title":"Memory Operations","first-page":"293","author":"U\u00a8 nsalan","year":"2022"},{"key":"10.1016\/j.comnet.2022.109267_bib0047","series-title":"Ddos Attacks in q2 2020","author":"Kupreev","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0048","unstructured":"Mininet. https:\/\/mininet.org\/, 2020."},{"key":"10.1016\/j.comnet.2022.109267_bib0049","series-title":"Github - p4lang\/Behavioral-Model: The Reference p4 Software Switch","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0050","unstructured":"OpenJS Foundation. https:\/\/nodejs.org\/en\/, 2020."},{"key":"10.1016\/j.comnet.2022.109267_bib0051","series-title":"Azure Functions serverless Compute \u2014 Microsoft azure","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0052","series-title":"Amazon","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0053","series-title":"Cloud Functions \u2014 Google Cloud","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0054","series-title":"Sqlite Home Page","year":"2020"},{"key":"10.1016\/j.comnet.2022.109267_bib0055","series-title":"Ethereum API \u2014 IPFS API amp; Gateway \u2014 ETH Nodes as a Service \u2014 Infura","year":"2022"},{"key":"10.1016\/j.comnet.2022.109267_bib0056","doi-asserted-by":"crossref","DOI":"10.1016\/j.comnet.2021.108698","article-title":"Edge security for sip-enabled IoT devices with p4","volume":"203","author":"Febro","year":"2022","journal-title":"Comput. Netw."},{"key":"10.1016\/j.comnet.2022.109267_bib0057","article-title":"Ethereum plans to cut its absurd energy consumption by 99 percent","volume":"2","author":"Fairley","year":"2019","journal-title":"IEEE Spectr."},{"key":"10.1016\/j.comnet.2022.109267_bib0058","unstructured":"\u201cGood Practices for Security of IoT - Secure Software Development Lifecycle.\u201d https:\/\/www.enisa.europa.eu\/publications\/good-practices-for-security-of-iot-1. Web. Accessed 30 Apr. 2022."}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622003310?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622003310?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:20:32Z","timestamp":1761398432000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128622003310"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10]]},"references-count":58,"alternative-id":["S1389128622003310"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109267","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2022,10]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Synchronizing DDoS defense at network edge with P4, SDN, and Blockchain","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109267","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109267"}}