-
2
-
-
47349131281
-
A fair solution to DNS amplification attacks
-
IEEE
-
G. Kambourakis, T. Moschos, D. Geneiatakis, and S. Gritzalis, "A fair solution to DNS amplification attacks;' in Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on. IEEE, 2007, pp. 38-47.
-
(2007)
Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on
, pp. 38-47
-
-
Kambourakis, G.1
Moschos, T.2
Geneiatakis, D.3
Gritzalis, S.4
-
3
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "OpenFlow: enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
4
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOXI open flow
-
IEEE
-
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS flooding attack detection using NOXI Open Flow," in Local Computer Networks (LCN), 2010 IEEE 35th Conference on. IEEE, 2010, pp. 408-415.
-
(2010)
Local Computer Networks (LCN), 2010 IEEE 35th Conference on
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
5
-
-
84866521295
-
Open flow random host mutation: Transparent moving target defense using software defined networking
-
ACM
-
l. H. Jafarian, E. Al-Shaer, and Q. Duan, "Open flow random host mutation: transparent moving target defense using software defined networking," in Proceedings of the first workshop on Hot topics in software defined networks. ACM, 2012, pp. 127-132.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 127-132
-
-
Jafarian, L.H.1
Al-Shaer, E.2
Duan, Q.3
-
6
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
Springer
-
S. A. Mehdi, J. Khalid, and S. A. Khayam, "Revisiting traffic anomaly detection using software defined networking," in Recent Advances in Intrusion Detection. Springer, 2011, pp. 161-180.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 161-180
-
-
Mehdi, S.A.1
Khalid, J.2
Khayam, S.A.3
-
7
-
-
84893570087
-
FRESCO: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson, "FRESCO: Modular composable security services for software-defined networks," in Proceedings of Network and Distributed Security Symposium, 2013.
-
(2013)
Proceedings of Network and Distributed Security Symposium
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
8
-
-
84874562245
-
CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)
-
IEEE
-
S. Shin and G. Gu, "CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)," in Network Protocols (ICNP), 2012 20th IEEE International Conference on. IEEE, 2012, pp. 1-6.
-
(2012)
Network Protocols (ICNP), 2012 20th IEEE International Conference on
, pp. 1-6
-
-
Shin, S.1
Gu, G.2
-
9
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
ACM
-
D. Kreutz, F. Ramos, and P. Verissimo, "Towards secure and dependable software-defined networks," in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013, pp. 55-60.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
12
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
ACM
-
J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang, "Is sampled data sufficient for anomaly detection?" in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM, 2006, pp. 165-176.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
13
-
-
46349085574
-
A study on detecting network anomalies using sampled flow statistics
-
IEEE
-
R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and S. Asano, "A study on detecting network anomalies using sampled flow statistics," in Applications and the lnternet Workshops, 2007. SA1NT Workshops 2007. International Symposium on. IEEE, 2007, pp. 81-81.
-
(2007)
Applications and the Lnternet Workshops, 2007. SA1NT Workshops 2007. International Symposium on
, pp. 81-81
-
-
Kawahara, R.1
Mori, T.2
Kamiyama, N.3
Harada, S.4
Asano, S.5
-
15
-
-
84962125266
-
-
[Online; accessed 01-January-2014]
-
P. Peter, "DNS Amplification Attacks," http://blog.sflow.com!20 13/1 O/dns-amplification-attacks.html, 2013, [Online; accessed 01-January-2014].
-
(2013)
DNS Amplification Attacks
-
-
Peter, P.1
-
16
-
-
2442631596
-
Sflow: Towards resource-efficient and agile service federation in service overlay networks
-
IEEE
-
M. Wang, B. Li, and Z. Li, "sflow: Towards resource-efficient and agile service federation in service overlay networks," in Distributed Computing Systems, 2004. Proceedings. 24th International Conference on. IEEE, 2004, pp. 628-635.
-
(2004)
Distributed Computing Systems, 2004. Proceedings. 24th International Conference on
, pp. 628-635
-
-
Wang, M.1
Li, B.2
Li, Z.3
-
17
-
-
67249105817
-
Efficient and low-cost hardware defense against DNS amplification attacks
-
IEEE. IEEE
-
c. Sun, B. Liu, and L. Shi, "Efficient and low-cost hardware defense against DNS amplification attacks," in Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE. IEEE, 2008, pp. 1-5.
-
(2008)
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008
, pp. 1-5
-
-
Sun, C.1
Liu, B.2
Shi, L.3
-
19
-
-
84865538933
-
A network in a laptop: Rapid prototyping for software-defined networks
-
ACM
-
B. Lantz, B. Heller, and N. McKeown, "A network in a laptop: rapid prototyping for software-defined networks," in Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks. ACM, 2010, p. 19.
-
(2010)
Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks
, pp. 19
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
20
-
-
84904205564
-
-
Oracle, [Online; accessed 01-January-]
-
Oracle, "Virtual Box," http://www.virtualbox.org/, [Online; accessed 01-January-2014].
-
(2014)
Virtual Box
-
-
-
21
-
-
84904200622
-
-
BigSwitch, [Online; accessed 01-January-2014]
-
BigSwitch, "Floodlight Controller," http://www. projectfloodlight.org/floodlight!, 2013, [Online; accessed 01-January-2014].
-
(2013)
Floodlight Controller
-
-
-
22
-
-
84955491887
-
-
NoxRepo.org, [Online; accessed 01-January-2014]
-
NoxRepo.org, "About POX," hup://www.noxrepo.org/pox/about-pox/, 2013, [Online; accessed 01-January-2014].
-
(2013)
About POX
-
-
-
24
-
-
84904179446
-
-
[Online; accessed 01-January-]
-
"Dnslib," https://pypi.python.org/pypi/dnslib, [Online; accessed 01-January-2014].
-
(2014)
Dnslib
-
-
-
25
-
-
84904163982
-
-
[Online; accessed 01-January-]
-
"Most visited websites," "https://ebizmba.com/articles/ most-popularwebsites", [Online; accessed 01-January-2014].
-
(2014)
Most Visited Websites
-
-
|