Toward secure software-defined networks against distributed denial of service attack
暂无分享,去创建一个
[1] Jong Hyuk Park,et al. A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions , 2019, The Journal of Supercomputing.
[2] S. K. Panda,et al. An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems , 2018, Cluster Computing.
[3] Ranjan K. Behera,et al. Distributed Denial-of-Service Threats and Defense Mechanisms in Software-Defined Networks: A Layer-Wise Review , 2018, Handbook of e-Business Security.
[4] Jin Ye,et al. A DDoS Attack Detection Method Based on SVM in Software Defined Network , 2018, Secur. Commun. Networks.
[5] Kiwon Hong,et al. SDN-Assisted Slow HTTP DDoS Attack Defense Method , 2018, IEEE Communications Letters.
[6] Prasanta K. Jana,et al. Normalization-Based Task Scheduling Algorithms for Heterogeneous Multi-Cloud Environment , 2016, Information Systems Frontiers.
[7] Fatih Alagöz,et al. Defense Mechanisms against DDoS Attacks in SDN Environment , 2017, IEEE Communications Magazine.
[8] Rongpeng Li,et al. Machine learning-based IDS for software-defined 5G network , 2017, IET Networks.
[9] Prasanta K. Jana,et al. Granularity-based workflow scheduling algorithm for cloud computing , 2017, The Journal of Supercomputing.
[10] Mark A. Gregory,et al. Multi-domain Software Defined Networking: Research status and challenges , 2017, J. Netw. Comput. Appl..
[11] Prasanta K. Jana,et al. SLA-based task scheduling algorithms for heterogeneous multi-cloud environment , 2017, The Journal of Supercomputing.
[12] Mauro Conti,et al. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks , 2017, IEEE Transactions on Network and Service Management.
[13] Hu Aiqun,et al. FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[14] Sunny Behal,et al. Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.
[15] F. R. Yu,et al. Effective software-defined networking controller scheduling method to mitigate DDoS attacks , 2017 .
[16] Gerhard P. Hancke,et al. A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements , 2017, IEEE Access.
[17] Shashank Srivastava,et al. Research Trends in Security and DDoS in SDN , 2016, Secur. Commun. Networks.
[18] Zenon Chaczko,et al. Can SDN Technology Be Transported to Software-Defined WSN/IoT? , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[19] Ahmad Y. Javaid,et al. A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN) , 2016, EAI Endorsed Trans. Security Safety.
[20] Chuang Lin,et al. On Denial of Service Attacks in Software Defined Networks , 2016, IEEE Network.
[21] Mayank Pandey,et al. SDN based implementation of publish/subscribe paradigm using OpenFlow multicast , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).
[22] Mohamed Faten Zhani,et al. SDN-Guard: DoS Attacks Mitigation in SDN Networks , 2016, 2016 5th IEEE International Conference on Cloud Networking (Cloudnet).
[23] H. Jonathan Chao,et al. SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[24] Nabajyoti Medhi,et al. FlowTrApp: An SDN based architecture for DDoS attack detection and mitigation in data centers , 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN).
[25] Amrit Lal Sangal,et al. Characterizing flash events and distributed denial-of-service attacks: an empirical investigation , 2016, Secur. Commun. Networks.
[26] Brent Byunghoon Kang,et al. Vulnerabilities of network OS and mitigation with state-based permission system , 2016, Secur. Commun. Networks.
[27] Bibhudatta Sahoo,et al. A Comprehensive Tutorial on Software Defined Network: The Driving Force for the Future Internet Technology , 2016 .
[28] Truong Thu Huong,et al. OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).
[29] Xiaojiang Du,et al. A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows , 2016, 2016 IEEE International Conference on Communications (ICC).
[30] Yang Xu,et al. DDoS attack detection under SDN context , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.
[31] Ayman I. Kayssi,et al. SDN Security Plane: An Architecture for Resilient Security Services , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).
[32] David Walker,et al. CacheFlow: Dependency-Aware Rule-Caching for Software-Defined Networks , 2016, SOSR.
[33] Nor Badrul Anuar,et al. Secure and dependable software defined networks , 2016, J. Netw. Comput. Appl..
[34] F. Richard Yu,et al. Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.
[35] Sakir Sezer,et al. A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.
[36] Prasanta K. Jana,et al. An Efficient Task Consolidation Algorithm for Cloud Computing Systems , 2016, ICDCIT.
[37] Wei-Kuan Shih,et al. Design a Hash-Based Control Mechanism in vSwitch for Software-Defined Networking Environment , 2015, 2015 IEEE International Conference on Cluster Computing.
[38] Rui Wang,et al. An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[39] Hyogon Kim,et al. Controller scheduling for continued SDN operation under DDoS attacks , 2015 .
[40] Pin Lv,et al. Control plane of software defined networks: A survey , 2015, Comput. Commun..
[41] José Soler,et al. Mitigating SDN Controller Performance Bottlenecks , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).
[42] Xiangyang Li,et al. Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN) , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops.
[43] Vyas Sekar,et al. Bohatei: Flexible and Elastic DDoS Defense , 2015, USENIX Security Symposium.
[44] Lei Xu,et al. FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.
[45] Lei Wei,et al. FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks , 2015, 2015 IEEE International Conference on Communications (ICC).
[46] Aniello Castiglione,et al. Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures , 2015, The Journal of Supercomputing.
[47] Sanjay Jha,et al. A Survey of Securing Networks Using Software Defined Networking , 2015, IEEE Transactions on Reliability.
[48] M. Khan,et al. Securing software defined networks: taxonomy, requirements, and open issues , 2015, IEEE Communications Magazine.
[49] Prasanta K. Jana,et al. Efficient task scheduling algorithms for heterogeneous multi-cloud environment , 2015, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[50] Marc St-Hilaire,et al. Early detection of DDoS attacks against SDN controllers , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[51] Sungrae Cho,et al. A feasible method to combat against DDoS attack in SDN network , 2015, 2015 International Conference on Information Networking (ICOIN).
[52] Faris Keti,et al. Emulation of Software Defined Networks Using Mininet in Different Simulation Environments , 2015, 2015 6th International Conference on Intelligent Systems, Modelling and Simulation.
[53] Prasanta K. Jana,et al. An Efficient Resource Allocation Algorithm for IaaS Cloud , 2015, ICDCIT.
[54] Fang Hao,et al. Scotch: Elastically Scaling up SDN Control-Plane using vSwitch based Overlay , 2014, CoNEXT.
[55] S. Thamarai Selvi,et al. DDoS detection and analysis in SDN-based environment using support vector machine classifier , 2014, 2014 Sixth International Conference on Advanced Computing (ICoAC).
[56] Byrav Ramamurthy,et al. OpenSec: A framework for implementing security policies using OpenFlow , 2014, 2014 IEEE Global Communications Conference.
[57] Brent Byunghoon Kang,et al. Rosemary: A Robust, Secure, and High-performance Network Operating System , 2014, CCS.
[58] Yao Zheng,et al. DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking , 2014, 2014 IEEE 22nd International Conference on Network Protocols.
[59] Gail-Joon Ahn,et al. FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.
[60] Pavlin Radoslavov,et al. ONOS: towards an open, distributed SDN OS , 2014, HotSDN.
[61] J. Rexford,et al. Dynamic scheduling of network updates , 2014, SIGCOMM.
[62] H. Kim,et al. A SDN-oriented DDoS blocking scheme for botnet-based attacks , 2014, 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN).
[63] Jan Medved,et al. OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[64] Andrei V. Gurtov,et al. Securing the control channel of software-defined mobile networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.
[65] Ailton Akira Shinoda,et al. Simulation in an SDN network scenario using the POX Controller , 2014, 2014 IEEE Colombian Conference on Communications and Computing (COLCOM).
[66] Yiming Li,et al. Software defined networking: State of the art and research challenges , 2014, Comput. Networks.
[67] Edjard de Souza Mota,et al. AgNOS: A Framework for Autonomous Control of Software-Defined Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[68] Kpatcha M. Bayarou,et al. OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).
[69] Mourad Debbabi,et al. A Survey and a Layered Taxonomy of Software-Defined Networking , 2014, IEEE Communications Surveys & Tutorials.
[70] Basil S. Maglaris,et al. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments , 2014, Comput. Networks.
[71] Jugal K. Kalita,et al. Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions , 2014, Comput. J..
[72] Andrei Vladyko,et al. A fuzzy logic-based information security management for software-defined networks , 2014, 16th International Conference on Advanced Communication Technology.
[73] Marin Litoiu,et al. Towards Mitigation of Low and Slow Application DDoS Attacks , 2014, 2014 IEEE International Conference on Cloud Engineering.
[74] Ying Zhang,et al. An adaptive flow counting method for anomaly detection in SDN , 2013, CoNEXT.
[75] Vinod Yegneswaran,et al. AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks , 2013, CCS.
[76] Paul Smith,et al. OpenFlow: A security analysis , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).
[77] Sajad Shirali-Shahreza,et al. Efficient Implementation of Security Applications in OpenFlow Controller with FleXam , 2013, 2013 IEEE 21st Annual Symposium on High-Performance Interconnects.
[78] Guofei Gu,et al. Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.
[79] David Erickson,et al. The beacon openflow controller , 2013, HotSDN '13.
[80] Fernando M. V. Ramos,et al. Towards secure and dependable software-defined networks , 2013, HotSDN '13.
[81] Ramesh Govindan,et al. Resource/accuracy tradeoffs in software-defined measurement , 2013, HotSDN '13.
[82] Yi Wang,et al. Towards a secure controller platform for openflow applications , 2013, HotSDN '13.
[83] Fang Hao,et al. Towards an elastic distributed SDN controller , 2013, HotSDN '13.
[84] Dijiang Huang,et al. NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[85] Robert M. Cannistra,et al. An SDN Approach: Quality of Service using Big Switch’s Floodlight Open-source Controller , 2013 .
[86] Saman Taghavi Zargar,et al. A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.
[87] Dijiang Huang,et al. SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment , 2013, 2013 Second GENI Research and Educational Experiment Workshop.
[88] Bing Wang,et al. Malware Detection for Mobile Devices Using Software-Defined Networking , 2013, 2013 Second GENI Research and Educational Experiment Workshop.
[89] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[90] Muttukrishnan Rajarajan,et al. A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.
[91] Guofei Gu,et al. CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).
[92] Nick McKeown,et al. Where is the debugger for my software-defined network? , 2012, HotSDN '12.
[93] Andreas Voellmy,et al. Scalable software defined network controllers , 2012, SIGCOMM '12.
[94] Mabry Tyson,et al. A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.
[95] Jun Bi,et al. Source address validation solution with OpenFlow/NOX architecture , 2011, 2011 19th IEEE International Conference on Network Protocols.
[96] Syed Ali Khayam,et al. Revisiting Traffic Anomaly Detection Using Software Defined Networking , 2011, RAID.
[97] David Walker,et al. Frenetic: a network programming language , 2011, ICFP.
[98] Steven J. Vaughan-Nichols,et al. OpenFlow: The Next Generation of the Network? , 2011, Computer.
[99] Wanlei Zhou,et al. Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.
[100] Wanlei Zhou,et al. Discriminating DDoS attack traffic from flash crowd through packet arrival patterns , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
[101] Chu YuHunag,et al. A novel design for future on-demand service and security , 2010, 2010 IEEE 12th International Conference on Communication Technology.
[102] Rodrigo Braga,et al. Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.
[103] Toshinori Sueyoshi,et al. Early DoS/DDoS Detection Method using Short-term Statistics , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.
[104] Wanlei Zhou,et al. Discriminating DDoS Flows from Flash Crowds Using Information Distance , 2009, 2009 Third International Conference on Network and System Security.
[105] Jens Grossklags,et al. Blue versus Red: Towards a Model of Distributed Security Attacks , 2009, Financial Cryptography.
[106] Wuu Yang,et al. DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.
[107] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[108] Kotagiri Ramamohanarao,et al. Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.
[109] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[110] Erol Gelenbe,et al. A self-aware approach to denial of service defence , 2007, Comput. Networks.
[111] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[112] Peter Reiher,et al. A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.
[113] Rabi N. Mahapatra,et al. TCAM architecture for IP lookup using prefix properties , 2004, IEEE Micro.
[114] Jonathan S. Turner,et al. Packet classification using extended TCAMs , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[115] Yonggang Wen,et al. “ A Survey of Software Defined Networking , 2020 .
[116] Bibhudatta Sahoo,et al. Detection of high rate DDoS attack from flash events using information metrics in software defined networks , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).
[117] Vijay Mann,et al. SPHINX: Detecting Security Attacks in Software-Defined Networks , 2015, NDSS.
[118] David Walker,et al. Composing Software Defined Networks , 2013, NSDI.
[119] David Walker,et al. Modular SDN Programming with Pyretic , 2013, login Usenix Mag..
[120] A. Voellmy,et al. Scalable software defined network controllers , 2012, CCRV.
[121] Eduardo B. Fernandez,et al. Security in Data Intensive Computing Systems , 2011 .
[122] Martín Casado,et al. Applying NOX to the Datacenter , 2009, HotNets.