Toward secure software-defined networks against distributed denial of service attack

[1]  Jong Hyuk Park,et al.  A comprehensive study on APT attacks and countermeasures for future networks and communications: challenges and solutions , 2019, The Journal of Supercomputing.

[2]  S. K. Panda,et al.  An energy-efficient task scheduling algorithm for heterogeneous cloud computing systems , 2018, Cluster Computing.

[3]  Ranjan K. Behera,et al.  Distributed Denial-of-Service Threats and Defense Mechanisms in Software-Defined Networks: A Layer-Wise Review , 2018, Handbook of e-Business Security.

[4]  Jin Ye,et al.  A DDoS Attack Detection Method Based on SVM in Software Defined Network , 2018, Secur. Commun. Networks.

[5]  Kiwon Hong,et al.  SDN-Assisted Slow HTTP DDoS Attack Defense Method , 2018, IEEE Communications Letters.

[6]  Prasanta K. Jana,et al.  Normalization-Based Task Scheduling Algorithms for Heterogeneous Multi-Cloud Environment , 2016, Information Systems Frontiers.

[7]  Fatih Alagöz,et al.  Defense Mechanisms against DDoS Attacks in SDN Environment , 2017, IEEE Communications Magazine.

[8]  Rongpeng Li,et al.  Machine learning-based IDS for software-defined 5G network , 2017, IET Networks.

[9]  Prasanta K. Jana,et al.  Granularity-based workflow scheduling algorithm for cloud computing , 2017, The Journal of Supercomputing.

[10]  Mark A. Gregory,et al.  Multi-domain Software Defined Networking: Research status and challenges , 2017, J. Netw. Comput. Appl..

[11]  Prasanta K. Jana,et al.  SLA-based task scheduling algorithms for heterogeneous multi-cloud environment , 2017, The Journal of Supercomputing.

[12]  Mauro Conti,et al.  SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks , 2017, IEEE Transactions on Network and Service Management.

[13]  Hu Aiqun,et al.  FloodDefender: Protecting data and control plane resources under SDN-aimed DoS attacks , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[14]  Sunny Behal,et al.  Detection of DDoS attacks and flash events using novel information theory metrics , 2017, Comput. Networks.

[15]  F. R. Yu,et al.  Effective software-defined networking controller scheduling method to mitigate DDoS attacks , 2017 .

[16]  Gerhard P. Hancke,et al.  A Survey on Software-Defined Wireless Sensor Networks: Challenges and Design Requirements , 2017, IEEE Access.

[17]  Shashank Srivastava,et al.  Research Trends in Security and DDoS in SDN , 2016, Secur. Commun. Networks.

[18]  Zenon Chaczko,et al.  Can SDN Technology Be Transported to Software-Defined WSN/IoT? , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).

[19]  Ahmad Y. Javaid,et al.  A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN) , 2016, EAI Endorsed Trans. Security Safety.

[20]  Chuang Lin,et al.  On Denial of Service Attacks in Software Defined Networks , 2016, IEEE Network.

[21]  Mayank Pandey,et al.  SDN based implementation of publish/subscribe paradigm using OpenFlow multicast , 2016, 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS).

[22]  Mohamed Faten Zhani,et al.  SDN-Guard: DoS Attacks Mitigation in SDN Networks , 2016, 2016 5th IEEE International Conference on Cloud Networking (Cloudnet).

[23]  H. Jonathan Chao,et al.  SDNShield: Towards more comprehensive defense against DDoS attacks on SDN control plane , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[24]  Nabajyoti Medhi,et al.  FlowTrApp: An SDN based architecture for DDoS attack detection and mitigation in data centers , 2016, 2016 3rd International Conference on Signal Processing and Integrated Networks (SPIN).

[25]  Amrit Lal Sangal,et al.  Characterizing flash events and distributed denial-of-service attacks: an empirical investigation , 2016, Secur. Commun. Networks.

[26]  Brent Byunghoon Kang,et al.  Vulnerabilities of network OS and mitigation with state-based permission system , 2016, Secur. Commun. Networks.

[27]  Bibhudatta Sahoo,et al.  A Comprehensive Tutorial on Software Defined Network: The Driving Force for the Future Internet Technology , 2016 .

[28]  Truong Thu Huong,et al.  OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks , 2016, 2016 IEEE Sixth International Conference on Communications and Electronics (ICCE).

[29]  Xiaojiang Du,et al.  A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows , 2016, 2016 IEEE International Conference on Communications (ICC).

[30]  Yang Xu,et al.  DDoS attack detection under SDN context , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[31]  Ayman I. Kayssi,et al.  SDN Security Plane: An Architecture for Resilient Security Services , 2016, 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW).

[32]  David Walker,et al.  CacheFlow: Dependency-Aware Rule-Caching for Software-Defined Networks , 2016, SOSR.

[33]  Nor Badrul Anuar,et al.  Secure and dependable software defined networks , 2016, J. Netw. Comput. Appl..

[34]  F. Richard Yu,et al.  Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[35]  Sakir Sezer,et al.  A Survey of Security in Software Defined Networks , 2016, IEEE Communications Surveys & Tutorials.

[36]  Prasanta K. Jana,et al.  An Efficient Task Consolidation Algorithm for Cloud Computing Systems , 2016, ICDCIT.

[37]  Wei-Kuan Shih,et al.  Design a Hash-Based Control Mechanism in vSwitch for Software-Defined Networking Environment , 2015, 2015 IEEE International Conference on Cluster Computing.

[38]  Rui Wang,et al.  An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[39]  Hyogon Kim,et al.  Controller scheduling for continued SDN operation under DDoS attacks , 2015 .

[40]  Pin Lv,et al.  Control plane of software defined networks: A survey , 2015, Comput. Commun..

[41]  José Soler,et al.  Mitigating SDN Controller Performance Bottlenecks , 2015, 2015 24th International Conference on Computer Communication and Networks (ICCCN).

[42]  Xiangyang Li,et al.  Selective Packet Inspection to Detect DoS Flooding Using Software Defined Networking (SDN) , 2015, 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops.

[43]  Vyas Sekar,et al.  Bohatei: Flexible and Elastic DDoS Defense , 2015, USENIX Security Symposium.

[44]  Lei Xu,et al.  FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks , 2015, 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.

[45]  Lei Wei,et al.  FlowRanger: A request prioritizing algorithm for controller DoS attacks in Software Defined Networks , 2015, 2015 IEEE International Conference on Communications (ICC).

[46]  Aniello Castiglione,et al.  Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures , 2015, The Journal of Supercomputing.

[47]  Sanjay Jha,et al.  A Survey of Securing Networks Using Software Defined Networking , 2015, IEEE Transactions on Reliability.

[48]  M. Khan,et al.  Securing software defined networks: taxonomy, requirements, and open issues , 2015, IEEE Communications Magazine.

[49]  Prasanta K. Jana,et al.  Efficient task scheduling algorithms for heterogeneous multi-cloud environment , 2015, 2014 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[50]  Marc St-Hilaire,et al.  Early detection of DDoS attacks against SDN controllers , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).

[51]  Sungrae Cho,et al.  A feasible method to combat against DDoS attack in SDN network , 2015, 2015 International Conference on Information Networking (ICOIN).

[52]  Faris Keti,et al.  Emulation of Software Defined Networks Using Mininet in Different Simulation Environments , 2015, 2015 6th International Conference on Intelligent Systems, Modelling and Simulation.

[53]  Prasanta K. Jana,et al.  An Efficient Resource Allocation Algorithm for IaaS Cloud , 2015, ICDCIT.

[54]  Fang Hao,et al.  Scotch: Elastically Scaling up SDN Control-Plane using vSwitch based Overlay , 2014, CoNEXT.

[55]  S. Thamarai Selvi,et al.  DDoS detection and analysis in SDN-based environment using support vector machine classifier , 2014, 2014 Sixth International Conference on Advanced Computing (ICoAC).

[56]  Byrav Ramamurthy,et al.  OpenSec: A framework for implementing security policies using OpenFlow , 2014, 2014 IEEE Global Communications Conference.

[57]  Brent Byunghoon Kang,et al.  Rosemary: A Robust, Secure, and High-performance Network Operating System , 2014, CCS.

[58]  Yao Zheng,et al.  DDoS Attack Protection in the Era of Cloud Computing and Software-Defined Networking , 2014, 2014 IEEE 22nd International Conference on Network Protocols.

[59]  Gail-Joon Ahn,et al.  FLOWGUARD: building robust firewalls for software-defined networks , 2014, HotSDN.

[60]  Pavlin Radoslavov,et al.  ONOS: towards an open, distributed SDN OS , 2014, HotSDN.

[61]  J. Rexford,et al.  Dynamic scheduling of network updates , 2014, SIGCOMM.

[62]  H. Kim,et al.  A SDN-oriented DDoS blocking scheme for botnet-based attacks , 2014, 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN).

[63]  Jan Medved,et al.  OpenDaylight: Towards a Model-Driven SDN Controller architecture , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[64]  Andrei V. Gurtov,et al.  Securing the control channel of software-defined mobile networks , 2014, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014.

[65]  Ailton Akira Shinoda,et al.  Simulation in an SDN network scenario using the POX Controller , 2014, 2014 IEEE Colombian Conference on Communications and Computing (COLCOM).

[66]  Yiming Li,et al.  Software defined networking: State of the art and research challenges , 2014, Comput. Networks.

[67]  Edjard de Souza Mota,et al.  AgNOS: A Framework for Autonomous Control of Software-Defined Networks , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.

[68]  Kpatcha M. Bayarou,et al.  OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions , 2014, 2014 IEEE Network Operations and Management Symposium (NOMS).

[69]  Mourad Debbabi,et al.  A Survey and a Layered Taxonomy of Software-Defined Networking , 2014, IEEE Communications Surveys & Tutorials.

[70]  Basil S. Maglaris,et al.  Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments , 2014, Comput. Networks.

[71]  Jugal K. Kalita,et al.  Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions , 2014, Comput. J..

[72]  Andrei Vladyko,et al.  A fuzzy logic-based information security management for software-defined networks , 2014, 16th International Conference on Advanced Communication Technology.

[73]  Marin Litoiu,et al.  Towards Mitigation of Low and Slow Application DDoS Attacks , 2014, 2014 IEEE International Conference on Cloud Engineering.

[74]  Ying Zhang,et al.  An adaptive flow counting method for anomaly detection in SDN , 2013, CoNEXT.

[75]  Vinod Yegneswaran,et al.  AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks , 2013, CCS.

[76]  Paul Smith,et al.  OpenFlow: A security analysis , 2013, 2013 21st IEEE International Conference on Network Protocols (ICNP).

[77]  Sajad Shirali-Shahreza,et al.  Efficient Implementation of Security Applications in OpenFlow Controller with FleXam , 2013, 2013 IEEE 21st Annual Symposium on High-Performance Interconnects.

[78]  Guofei Gu,et al.  Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.

[79]  David Erickson,et al.  The beacon openflow controller , 2013, HotSDN '13.

[80]  Fernando M. V. Ramos,et al.  Towards secure and dependable software-defined networks , 2013, HotSDN '13.

[81]  Ramesh Govindan,et al.  Resource/accuracy tradeoffs in software-defined measurement , 2013, HotSDN '13.

[82]  Yi Wang,et al.  Towards a secure controller platform for openflow applications , 2013, HotSDN '13.

[83]  Fang Hao,et al.  Towards an elastic distributed SDN controller , 2013, HotSDN '13.

[84]  Dijiang Huang,et al.  NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[85]  Robert M. Cannistra,et al.  An SDN Approach: Quality of Service using Big Switch’s Floodlight Open-source Controller , 2013 .

[86]  Saman Taghavi Zargar,et al.  A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks , 2013, IEEE Communications Surveys & Tutorials.

[87]  Dijiang Huang,et al.  SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment , 2013, 2013 Second GENI Research and Educational Experiment Workshop.

[88]  Bing Wang,et al.  Malware Detection for Mobile Devices Using Software-Defined Networking , 2013, 2013 Second GENI Research and Educational Experiment Workshop.

[89]  Mabry Tyson,et al.  FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.

[90]  Muttukrishnan Rajarajan,et al.  A survey on security issues and solutions at different layers of Cloud computing , 2012, The Journal of Supercomputing.

[91]  Guofei Gu,et al.  CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?) , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[92]  Nick McKeown,et al.  Where is the debugger for my software-defined network? , 2012, HotSDN '12.

[93]  Andreas Voellmy,et al.  Scalable software defined network controllers , 2012, SIGCOMM '12.

[94]  Mabry Tyson,et al.  A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.

[95]  Jun Bi,et al.  Source address validation solution with OpenFlow/NOX architecture , 2011, 2011 19th IEEE International Conference on Network Protocols.

[96]  Syed Ali Khayam,et al.  Revisiting Traffic Anomaly Detection Using Software Defined Networking , 2011, RAID.

[97]  David Walker,et al.  Frenetic: a network programming language , 2011, ICFP.

[98]  Steven J. Vaughan-Nichols,et al.  OpenFlow: The Next Generation of the Network? , 2011, Computer.

[99]  Wanlei Zhou,et al.  Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics , 2011, IEEE Transactions on Information Forensics and Security.

[100]  Wanlei Zhou,et al.  Discriminating DDoS attack traffic from flash crowd through packet arrival patterns , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[101]  Chu YuHunag,et al.  A novel design for future on-demand service and security , 2010, 2010 IEEE 12th International Conference on Communication Technology.

[102]  Rodrigo Braga,et al.  Lightweight DDoS flooding attack detection using NOX/OpenFlow , 2010, IEEE Local Computer Network Conference.

[103]  Toshinori Sueyoshi,et al.  Early DoS/DDoS Detection Method using Short-term Statistics , 2010, 2010 International Conference on Complex, Intelligent and Software Intensive Systems.

[104]  Wanlei Zhou,et al.  Discriminating DDoS Flows from Flash Crowds Using Information Distance , 2009, 2009 Third International Conference on Network and System Security.

[105]  Jens Grossklags,et al.  Blue versus Red: Towards a Model of Distributed Security Attacks , 2009, Financial Cryptography.

[106]  Wuu Yang,et al.  DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis , 2009, 2009 Third International Conference on Multimedia and Ubiquitous Engineering.

[107]  Vyas Sekar,et al.  An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.

[108]  Kotagiri Ramamohanarao,et al.  Survey of network-based defense mechanisms countering the DoS and DDoS problems , 2007, CSUR.

[109]  Johann van der Merwe,et al.  A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.

[110]  Erol Gelenbe,et al.  A self-aware approach to denial of service defence , 2007, Comput. Networks.

[111]  Donald F. Towsley,et al.  Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.

[112]  Peter Reiher,et al.  A taxonomy of DDoS attack and DDoS defense mechanisms , 2004, CCRV.

[113]  Rabi N. Mahapatra,et al.  TCAM architecture for IP lookup using prefix properties , 2004, IEEE Micro.

[114]  Jonathan S. Turner,et al.  Packet classification using extended TCAMs , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[115]  Yonggang Wen,et al.  “ A Survey of Software Defined Networking , 2020 .

[116]  Bibhudatta Sahoo,et al.  Detection of high rate DDoS attack from flash events using information metrics in software defined networks , 2018, 2018 10th International Conference on Communication Systems & Networks (COMSNETS).

[117]  Vijay Mann,et al.  SPHINX: Detecting Security Attacks in Software-Defined Networks , 2015, NDSS.

[118]  David Walker,et al.  Composing Software Defined Networks , 2013, NSDI.

[119]  David Walker,et al.  Modular SDN Programming with Pyretic , 2013, login Usenix Mag..

[120]  A. Voellmy,et al.  Scalable software defined network controllers , 2012, CCRV.

[121]  Eduardo B. Fernandez,et al.  Security in Data Intensive Computing Systems , 2011 .

[122]  Martín Casado,et al.  Applying NOX to the Datacenter , 2009, HotNets.