메뉴 건너뛰기




Volumn 81, Issue , 2015, Pages 308-319

DDoS attack protection in the era of cloud computing and Software-Defined Networking

Author keywords

DDoS mitigation; Graphical model; Networking; Software Defined

Indexed keywords

CLOUD COMPUTING; COST EFFECTIVENESS; DENIAL-OF-SERVICE ATTACK; MOBILE SECURITY; NETWORK ARCHITECTURE; NETWORK MANAGEMENT; NETWORK SECURITY;

EID: 84925396031     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2015.02.026     Document Type: Article
Times cited : (350)

References (28)
  • 1
    • 84925414562 scopus 로고    scopus 로고
    • A multilayer overlay network architecture for enhancing IP services availability against DoS
    • ICISS, Kolkata, India, December
    • D. Geneiatakis, G. Portokalidis, A.D. Keromytis, A multilayer overlay network architecture for enhancing IP services availability against DoS, in: 7th International Conference,ICISS, Kolkata, India, December 2011.
    • (2011) 7th International Conference
    • Geneiatakis, D.1    Portokalidis, G.2    Keromytis, A.D.3
  • 2
    • 65249149520 scopus 로고    scopus 로고
    • To filter or to authorize: Network-layer DoS defense against multimillion-node botnets
    • ACM
    • X. Liu, X. Yang, and Y. Lu To filter or to authorize: network-layer DoS defense against multimillion-node botnets ACM SIGCOMM Computer Communication Review 2008 ACM
    • (2008) ACM SIGCOMM Computer Communication Review
    • Liu, X.1    Yang, X.2    Lu, Y.3
  • 5
    • 84925414560 scopus 로고    scopus 로고
    • Of-guard: A DoS Attack Prevention Extension in Software-defined Networks
    • H. Wang, L. Xu, G. Gu, Of-guard: A DoS Attack Prevention Extension in Software-defined Networks, The Open Network Summit (ONS), 2014.
    • (2014) The Open Network Summit (ONS)
    • Wang, H.1    Xu, L.2    Gu, G.3
  • 9
    • 78651432290 scopus 로고    scopus 로고
    • Intrusion detection using continuous time bayesian networks
    • J. Xu, and C.R. Shelton Intrusion detection using continuous time bayesian networks J. Artif. Intell. Res. 2010
    • (2010) J. Artif. Intell. Res.
    • Xu, J.1    Shelton, C.R.2
  • 14
    • 84933530882 scopus 로고
    • Approximating discrete probability distributions with dependence trees
    • C. Chow, and C. Liu Approximating discrete probability distributions with dependence trees IEEE Trans. Inform. Theory 1968
    • (1968) IEEE Trans. Inform. Theory
    • Chow, C.1    Liu, C.2
  • 16
    • 0031274649 scopus 로고    scopus 로고
    • Wide-area internet traffic patterns and characteristics
    • K. Thompson, G. Miller, and R. Wilder Wide-area internet traffic patterns and characteristics IEEE Netw. 1997
    • (1997) IEEE Netw.
    • Thompson, K.1    Miller, G.2    Wilder, R.3
  • 18
  • 19
    • 84925414557 scopus 로고    scopus 로고
    • Floodlight OpenFlow Controller
    • Floodlight OpenFlow Controller. < http://floodlight.openflowhub.org >.
  • 21
    • 34147099073 scopus 로고    scopus 로고
    • Survey of network-based defense mechanisms countering the dos and DDoS problems
    • T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the dos and DDoS problems ACM Comput. Surv. 1 2007
    • (2007) ACM Comput. Surv. , Issue.1
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 22
    • 84888391622 scopus 로고    scopus 로고
    • A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
    • S. Zargar, J. Joshi, and D. Tipper A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks IEEE Commun. Surv. Tutorials 2013
    • (2013) IEEE Commun. Surv. Tutorials
    • Zargar, S.1    Joshi, J.2    Tipper, D.3
  • 25
    • 84920001288 scopus 로고    scopus 로고
    • Source address validation solution with openflow/noxarchitecture
    • G. Yao, J. Bi, P. Xiao, Source address validation solution with openflow/noxarchitecture, in: IEEE ICNP, 2011.
    • (2011) IEEE ICNP
    • Yao, G.1    Bi, J.2    Xiao, P.3
  • 27
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput. Netw. 2007
    • (2007) Comput. Netw.
    • Patcha, A.1    Park, J.M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.