Adaptive Suspicious Prevention for Defending DoS Attacks in SDN-Based Convergent Networks
暂无分享,去创建一个
Joongheon Kim | Minho Park | Sungrae Cho | Nhu-Ngoc Dao | Joongheon Kim | Sungrae Cho | Nhu-Ngoc Dao | Minho Park
[1] Ali Dehghantanha,et al. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing , 2016, EURASIP Journal on Wireless Communications and Networking.
[2] Kim-Kwang Raymond Choo,et al. Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework , 2016, J. Netw. Comput. Appl..
[3] Kotagiri Ramamohanarao,et al. Protection from distributed denial of service attacks using history-based IP filtering , 2003, IEEE International Conference on Communications, 2003. ICC '03..
[4] Guofei Gu,et al. Attacking software-defined networks: a first feasibility study , 2013, HotSDN '13.
[5] Sakir Sezer,et al. Queen ' s University Belfast-Research Portal Are We Ready for SDN ? Implementation Challenges for Software-Defined Networks , 2016 .
[6] Rasool Jalili,et al. Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks , 2005, ISPEC.
[7] Yasuo Okabe,et al. A packet-in message filtering mechanism for protection of control plane in openflow networks , 2014, 2014 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS).
[8] Cheng Jin,et al. Defense Against Spoofed IP Traffic Using Hop-Count Filtering , 2007, IEEE/ACM Transactions on Networking.
[9] Wuu Yang,et al. DDoS detection and traceback with decision tree and grey relational analysis , 2011, Int. J. Ad Hoc Ubiquitous Comput..
[10] Christopher Leckie,et al. An efficient filter for denial-of-service bandwidth attacks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).
[11] Yi Wang,et al. Towards a secure controller platform for openflow applications , 2013, HotSDN '13.
[12] Huey-Ing Liu,et al. Defending systems Against Tilt DDoS attacks , 2011, 2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA).
[13] G. Manimaran,et al. Novel hybrid schemes employing packet marking and logging for IP traceback , 2006, IEEE Transactions on Parallel and Distributed Systems.
[14] Mohd Anwar,et al. A trust-based approach against IP-spoofing attacks , 2011, 2011 Ninth Annual International Conference on Privacy, Security and Trust.
[15] H. Jonathan Chao,et al. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks , 2006, IEEE Transactions on Dependable and Secure Computing.
[16] Jelena Mirkovic,et al. Source-end DDoS defense , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[17] Brent Byunghoon Kang,et al. Rosemary: A Robust, Secure, and High-performance Network Operating System , 2014, CCS.
[18] Xenofontas A. Dimitropoulos,et al. Evaluating the effect of centralization on routing convergence on a hybrid BGP-SDN emulation framework , 2014, SIGCOMM.
[19] James B. D. Joshi,et al. A collaborative approach to facilitate intrusion detection and response against DDoS attacks. , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).
[20] Xiapu Luo,et al. STor: Social Network based Anonymous Communication in Tor , 2011, ArXiv.
[21] Mabry Tyson,et al. FRESCO: Modular Composable Security Services for Software-Defined Networks , 2013, NDSS.
[22] Vinod Yegneswaran,et al. AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks , 2013, CCS.
[23] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM 2001.
[24] Luc Vandendorpe,et al. Adaptive coding and modulation using imperfect CSI in cognitive BIC-OFDM systems , 2016, EURASIP J. Wirel. Commun. Netw..
[25] Mabry Tyson,et al. A security enforcement kernel for OpenFlow networks , 2012, HotSDN '12.
[26] Fernando M. V. Ramos,et al. Towards secure and dependable software-defined networks , 2013, HotSDN '13.
[27] Li Su,et al. OpenRAN: a software-defined ran architecture via virtualization , 2013, SIGCOMM.
[28] M. Uysal,et al. DDoS-Shield: DDoS-Resilient Scheduling to Counter Application Layer Attacks , 2009, IEEE/ACM Transactions on Networking.
[29] T Sivakumar,et al. DDoS: Survey of Traceback Methods , 2009 .
[30] Thomer M. Gil,et al. MULTOPS: A Data-Structure for Bandwidth Attack Detection , 2001, USENIX Security Symposium.
[31] Stefan Savage,et al. Detecting compromised routers via packet forwarding behavior , 2008, IEEE Network.
[32] Heejo Lee,et al. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets , 2001, SIGCOMM '01.
[33] M. Abliz. Internet Denial of Service Attacks and Defense Mechanisms , 2011 .
[34] Seemab Latif,et al. Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques , 2014, 2014 National Software Engineering Conference.