{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:24:43Z","timestamp":1766269483303,"version":"build-2065373602"},"reference-count":31,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T00:00:00Z","timestamp":1655942400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2022,9]]},"DOI":"10.1016\/j.comnet.2022.109109","type":"journal-article","created":{"date-parts":[[2022,6,17]],"date-time":"2022-06-17T11:43:33Z","timestamp":1655466213000},"page":"109109","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":2,"special_numbering":"C","title":["A deterministic approach for extracting network security intents"],"prefix":"10.1016","volume":"214","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-4196-3359","authenticated-orcid":false,"given":"Rafael Hengen","family":"Ribeiro","sequence":"first","affiliation":[]},{"given":"Arthur Selle","family":"Jacobs","sequence":"additional","affiliation":[]},{"given":"Luciano","family":"Zembruzki","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Parizotto","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-7989-5286","authenticated-orcid":false,"given":"Eder John","family":"Scheid","sequence":"additional","affiliation":[]},{"given":"Alberto Egon","family":"Schaeffer-Filho","sequence":"additional","affiliation":[]},{"given":"Lisandro Zambenedetti","family":"Granville","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-7461-7463","authenticated-orcid":false,"given":"Burkhard","family":"Stiller","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"18","key":"10.1016\/j.comnet.2022.109109_b1","doi-asserted-by":"crossref","first-page":"5803","DOI":"10.1002\/sec.1737","article-title":"Software-defined networking (SDN): A survey","volume":"9","author":"Benzekki","year":"2016","journal-title":"Secur. Commun. Netw."},{"year":"2018","series-title":"Business-Critical Services","author":"Kerravala","key":"10.1016\/j.comnet.2022.109109_b2"},{"key":"10.1016\/j.comnet.2022.109109_b3","series-title":"2017 13th International Conference on Network and Service Management (CNSM)","first-page":"1","article-title":"MD-IDN: Multi-domain intent-driven networking in software-defined infrastructures","author":"Arezoumand","year":"2017"},{"year":"2015","series-title":"Autonomic Networking: Definitions and Design Goals","author":"Behringer","key":"10.1016\/j.comnet.2022.109109_b4"},{"year":"2021","series-title":"Intent-Based Networking - Concepts and Definitions","author":"Clemm","key":"10.1016\/j.comnet.2022.109109_b5"},{"year":"2020","series-title":"Intent-Based Networking and Extending the Enterprise","author":"Cisco","key":"10.1016\/j.comnet.2022.109109_b6"},{"key":"10.1016\/j.comnet.2022.109109_b7","series-title":"Proceedings of the Afternoon Workshop on Self-Driving Networks","first-page":"15","article-title":"Refining network intents for self-driving networks","author":"Jacobs","year":"2018"},{"key":"10.1016\/j.comnet.2022.109109_b8","series-title":"Proceedings of the 2019 Conference of the ACM Special Interest Group on Data Communication","first-page":"214","article-title":"Safely and automatically updating in-network ACL configurations with intent language","author":"Tian","year":"2019"},{"key":"10.1016\/j.comnet.2022.109109_b9","series-title":"2018 IEEE European Symposium on Security and Privacy (Euro S&P)","first-page":"92","article-title":"Language-independent synthesis of firewall policies","author":"Bodei","year":"2018"},{"key":"10.1016\/j.comnet.2022.109109_b10","series-title":"2016 IFIP Networking Conference (IFIP Networking) and Workshops","first-page":"252","article-title":"Verified iptables firewall analysis","author":"Diekmann","year":"2016"},{"key":"10.1016\/j.comnet.2022.109109_b11","series-title":"Proceedings of the Workshop on Model-Driven Security","first-page":"5:1","article-title":"A model-driven approach for the extraction of network access-control policies","author":"Mart\u00ednez","year":"2012"},{"key":"10.1016\/j.comnet.2022.109109_b12","series-title":"Proceedings of the Symposium on SDN Research","first-page":"27","article-title":"Automatic inference of high-level network intents by mining forwarding patterns","author":"Kheradmand","year":"2020"},{"key":"10.1016\/j.comnet.2022.109109_b13","series-title":"2021 USENIX Annual Technical Conference (USENIX ATC 21)","article-title":"Hey, lumi! using natural language for intent-based network management","author":"Jacobs","year":"2021"},{"key":"10.1016\/j.comnet.2022.109109_b14","series-title":"Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation","first-page":"469","article-title":"A general approach to network configuration analysis","author":"Fogel","year":"2015"},{"key":"10.1016\/j.comnet.2022.109109_b15","series-title":"Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation","first-page":"437","article-title":"Network configuration synthesis with abstract topologies","author":"Beckett","year":"2017"},{"key":"10.1016\/j.comnet.2022.109109_b16","series-title":"Proceedings of the 21st Conference on Large Installation System Administration Conference","first-page":"2:1","article-title":"Inferring higher level policies from firewall rules","author":"Tongaonkar","year":"2007"},{"key":"10.1016\/j.comnet.2022.109109_b17","series-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","first-page":"609","article-title":"Net2Text: Query-guided summarization of network forwarding behaviors","author":"Birkner","year":"2018"},{"key":"10.1016\/j.comnet.2022.109109_b18","series-title":"Advanced Information Networking and Applications","first-page":"858","article-title":"A bottom-up approach for extracting network intents","author":"Ribeiro","year":"2020"},{"key":"10.1016\/j.comnet.2022.109109_b19","series-title":"A Bottom-Up Approach for Extracting Network Intents","first-page":"1","author":"Ribeiro","year":"2020"},{"key":"10.1016\/j.comnet.2022.109109_b20","series-title":"2021 IEEE 7th International Conference on Network Softwarization (NetSoft)","first-page":"312","article-title":"Mind the semantic gap: Policy intent inference from network metadata","author":"Mercian","year":"2021"},{"key":"10.1016\/j.comnet.2022.109109_b21","series-title":"2017 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM)","first-page":"186","article-title":"INSpIRE: Integrated NFV-based intent refinement environment","author":"Scheid","year":"2017"},{"year":"2021","series-title":"Service Name and Transport Protocol Port Number Registry","author":"IANA","key":"10.1016\/j.comnet.2022.109109_b22"},{"key":"10.1016\/j.comnet.2022.109109_b23","article-title":"SeCuRity intent-based extractor (SCRIBE)","author":"Ribeiro","year":"2020","journal-title":"GitHub Repos."},{"issue":"2","key":"10.1016\/j.comnet.2022.109109_b24","first-page":"173","article-title":"The science DMZ: A network design pattern for data-intensive science","volume":"22","author":"Dart","year":"2014","journal-title":"Sci. Program."},{"issue":"7","key":"10.1016\/j.comnet.2022.109109_b25","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MC.2018.3011046","article-title":"IoT as a land of opportunity for ddos hackers","volume":"51","author":"Vlajic","year":"2018","journal-title":"Computer"},{"issue":"1","key":"10.1016\/j.comnet.2022.109109_b26","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/s00779-017-1097-y","article-title":"Study of detection method for spoofed IP against ddos attacks","volume":"22","author":"Lee","year":"2018","journal-title":"Pers. Ubiquitous Comput."},{"year":"2019","series-title":"Configure Netfilter (iptables) on Linux to Protect Your Networked Devices","author":"Mind Chasers Inc","key":"10.1016\/j.comnet.2022.109109_b27"},{"key":"10.1016\/j.comnet.2022.109109_b28","article-title":"Net-network","author":"Diekmann","year":"2015","journal-title":"GitHub Repos."},{"year":"2014","series-title":"Automated Analysis and Debugging of Network Connectivity Policies","author":"Jayaraman","key":"10.1016\/j.comnet.2022.109109_b29"},{"key":"10.1016\/j.comnet.2022.109109_b30","article-title":"18.3. Options Used within iptables commands","author":"RedHat","year":"2005","journal-title":"Options Used Within Iptables Commands"},{"year":"2018","series-title":"Information technology \u2014 Syntactic metalanguage \u2014 Extended BNF","author":"14977:1996, ISO\/IEC","key":"10.1016\/j.comnet.2022.109109_b31"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128622002389?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S1389128622002389?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:20:33Z","timestamp":1761398433000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128622002389"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9]]},"references-count":31,"alternative-id":["S1389128622002389"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2022.109109","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2022,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"A deterministic approach for extracting network security intents","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.comnet.2022.109109","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 The Authors. Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"109109"}}