메뉴 건너뛰기




Volumn , Issue , 2014, Pages 85-90

Leveraging SDN for efficient anomaly detection and mitigation on legacy networks

Author keywords

Anomaly detection; Attack mitigation; DDoS; OpenFlow; RTBH; SDN; SFlow; Software defined networking

Indexed keywords

DENIAL-OF-SERVICE ATTACK; NETWORK SECURITY; SOFTWARE DEFINED NETWORKING;

EID: 84921033120     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/EWSDN.2014.24     Document Type: Conference Paper
Times cited : (53)

References (24)
  • 1
    • 0003375670 scopus 로고    scopus 로고
    • An analysis of using reflectors for distributed denialof-service attacks
    • July
    • V. Paxson, An Analysis of Using Reflectors for Distributed Denialof-Service Attacks, ACM SIGCOMM, Vol. 31 Issue 3, July 2001.
    • (2001) ACM SIGCOMM , vol.31 , Issue.3
    • Paxson, V.1
  • 7
    • 84897109717 scopus 로고    scopus 로고
    • Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
    • April
    • K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris. 2014. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Comput. Netw. 62 (April 2014), 122-136
    • (2014) Comput. Netw. , vol.62 , pp. 122-136
    • Giotis, K.1    Argyropoulos, C.2    Androulidakis, G.3    Kalogeras, D.4    Maglaris, V.5
  • 9
    • 68649129121 scopus 로고    scopus 로고
    • OpenFlow: Enabling innovation in campus networks
    • April
    • N. McKeown, et al., OpenFlow: enabling innovation in campus networks, ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, April 2008.
    • (2008) ACM SIGCOMM Computer Communication Review , vol.38 , Issue.2 , pp. 69-74
    • McKeown, N.1
  • 11
    • 84857255431 scopus 로고    scopus 로고
    • Revisiting traffic anomaly detection using software defined networking
    • S. A. Mehdi, J. Khalid, and S. A. Khayam, Revisiting traffic anomaly detection using software defined networking. In RAID'11. 161-180, 2011
    • (2011) RAID'11 , pp. 161-180
    • Mehdi, S.A.1    Khalid, J.2    Khayam, S.A.3
  • 14
    • 84255199997 scopus 로고    scopus 로고
    • A scalable ddos detection framework with victim pinpoint capability
    • Dec
    • H. Liu, Y. Sun, M. S. Kim, A Scalable DDoS Detection Framework with Victim Pinpoint Capability, Journal of Communications, Vol 6, No 9 (2011), 660-670, Dec 2011
    • (2011) Journal of Communications , vol.6 , Issue.9 , pp. 660-670
    • Liu, H.1    Sun, Y.2    Kim, M.S.3
  • 15
    • 0004317693 scopus 로고    scopus 로고
    • Quicksand: Quick summary and analysis of network data
    • Tech. Rep. 2011-43
    • A. C. Gilbert, Y. Kotidis, S. Muthukrishnan, and M. J. Strauss, "Quicksand: Quick summary and analysis of network data," DIMACS, Tech. Rep. 2011-43, 2001
    • (2001) DIMACS
    • Gilbert, A.C.1    Kotidis, Y.2    Muthukrishnan, S.3    Strauss, M.J.4
  • 20
    • 84921055786 scopus 로고    scopus 로고
    • Pox website, Available at http://www. noxrepo. org/pox/about-pox
    • Pox Website
  • 22
    • 84915796374 scopus 로고    scopus 로고
    • Retrieved: April
    • Vyatta Core, http://www. vyatta. org/, Retrieved: April 2014
    • (2014) Vyatta Core
  • 23
    • 84921064981 scopus 로고    scopus 로고
    • ExaBGP, Available at https://github. com/Exa-Networks/exabgp
    • ExaBGP
  • 24
    • 84871145229 scopus 로고    scopus 로고
    • The CAIDA UCSD
    • The CAIDA UCSD "DDoS Attack 2007 Dataset", Available at http://www. caida. org/data/passive/ddos-20070804-dataset. xml
    • DDoS Attack 2007 Dataset


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.