-
1
-
-
84947721748
-
-
last accessed on January 28
-
Akamai - Q4 2014 State of the Internet Security Report, http://www.stateoftheinternet.com/resources-web-security-2014-q4-internetsecurity- report.html (last accessed on January 28, 2015)
-
(2015)
-
-
-
2
-
-
84947800606
-
-
Arbor Networks - Worldwide Infrastructure Security Report (2014), http://pages.arbornetworks.com/rs/arbor/images/WISR2014.pdf
-
(2014)
-
-
-
3
-
-
84947747992
-
-
last accessed on January 28
-
Bro Network Security Monitor, http://www.bro.org/ (last accessed on January 28, 2015)
-
(2015)
-
-
-
4
-
-
84947741226
-
-
last accessed on January 28
-
Cloudflare, Inc., https://www.cloudflare.com/ (last accessed on January 28, 2015)
-
(2015)
-
-
-
5
-
-
84947709320
-
-
last accessed on January 28
-
Franklin Morris, Infographic: SMB Cloud Adoption Trends in (2014), http://www.pcworld.com/article/2685792/infographic-smb-cloud-adoptiontrends- in-2014.html (last accessed on January 28, 2015)
-
(2014)
-
-
-
6
-
-
84947797552
-
-
last accessed on January, 28
-
Snort, https://www.snort.org/ (last accessed on January, 28 2015)
-
(2015)
-
-
-
7
-
-
84947805947
-
-
last accessed on January 28
-
Suricata IDS/IPS, http://www.suricata-ids.org/ (last accessed on January 28, 2015)
-
(2015)
-
-
-
9
-
-
79955041204
-
Lightweight DDoS flooding attack detection using NOX/OpenFlow
-
IEEE
-
Braga, R., Mota, E., Passito, A.: Lightweight DDoS flooding attack detection using NOX/OpenFlow. In: 2010 IEEE 35th Conference on Local Computer Networks (LCN), pp. 408–415. IEEE (2010)
-
(2010)
2010 IEEE 35Th Conference on Local Computer Networks (LCN)
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
11
-
-
85119162382
-
Network Security through Software Defined Networking: A Survey
-
François, J., Dolberg, L., Festor, O., Engel, T.: Network Security through Software Defined Networking: a Survey. In: IIT Real-Time Communications (RTC) Conference-Principles, Systems and Applications of IP Telecommunications (IPTComm). ACM
-
In: IIT Real-Time Communications (RTC) Conference-Principles, Systems and Applications of IP Telecommunications (Iptcomm). ACM
-
-
François, J.1
Dolberg, L.2
Festor, O.3
Engel, T.4
-
13
-
-
84897109717
-
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments
-
Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., Maglaris, V.: Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Computer Networks 62, 122–136 (2014)
-
(2014)
Computer Networks
, vol.62
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Roulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
14
-
-
84883671159
-
Towards secure and dependable softwaredefined networks
-
ACM
-
Kreutz, D., Ramos, F., Verissimo, P.: Towards secure and dependable softwaredefined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in software Defined Networking, pp. 55–60. ACM (2013)
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
15
-
-
85016581151
-
COFFEE: A Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes
-
Schehlmann, L., Baier, H.: COFFEE: A Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes. In: GI-Jahrestagung, pp. 2225–2239 (2013)
-
(2013)
Gi-Jahrestagung
, pp. 2225-2239
-
-
Schehlmann, L.1
Baier, H.2
-
16
-
-
84893626159
-
SDN security: A survey
-
IEEE
-
Scott-Hayward, S., O’Callaghan, G., Sezer, S.: SDN security: A survey. In: 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp. 1–7. IEEE (2013)
-
(2013)
2013 IEEE SDN for Future Networks and Services (SDN4FNS)
, pp. 1-7
-
-
Scott-Hayward, S.1
O’Callaghan, G.2
Sezer, S.3
-
17
-
-
77955469676
-
An Overview of IP Flow-Based Intrusion Detection
-
Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys Tutorials 12(3), 343–356 (2010)
-
(2010)
IEEE Communications Surveys Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
|