메뉴 건너뛰기




Volumn 2016-January, Issue , 2016, Pages 308-313

A multi-criteria-based DDoS-attack prevention solution using software defined networking

Author keywords

DDoS attack; Fuzzy Logic; OpenFlow SDN

Indexed keywords

FUZZY INFERENCE; FUZZY LOGIC; NETWORK ARCHITECTURE; NETWORK SECURITY; SOFTWARE DEFINED NETWORKING;

EID: 84961827987     PISSN: 21621039     EISSN: 21621020     Source Type: Conference Proceeding    
DOI: 10.1109/ATC.2015.7388340     Document Type: Conference Paper
Times cited : (37)

References (21)
  • 2
    • 84961854168 scopus 로고    scopus 로고
    • http: //archive. openflow.org/documents/openflow-wp-latest. pdf
  • 4
    • 84921652362 scopus 로고    scopus 로고
    • Handling intrusion and ddos attacks in software defined networks using machine learning techniques
    • Rawalpindi, Nov
    • Javed Ashraf, Seemab Latif, "Handling Intrusion and DDoS Attacks in Software Defined Networks Using Machine Learning Techniques", Software Engineering Conference (NSEC), pp. 55-60, Rawalpindi, Nov 2014.
    • (2014) Software Engineering Conference (NSEC) , pp. 55-60
    • Ashraf, J.1    Latif, S.2
  • 5
    • 70350134739 scopus 로고    scopus 로고
    • The use of computational intelligence in intrusion Prevention systems: A review
    • S. X. Wu and W. Banzhaf. The use of computational intelligence in intrusion Prevention systems: A review. Applied Soft Computing, 10: 1-35, 2010.
    • (2010) Applied Soft Computing , vol.10 , pp. 1-35
    • Wu, S.X.1    Banzhaf, W.2
  • 6
    • 84874993569 scopus 로고    scopus 로고
    • Baseline profile stability for network anomaly detection
    • Jan
    • Y. Kim, J. Y. Jo, and K. K. Suh, "Baseline profile stability for network anomaly detection", International Journal of Network Security, vol. 6, No. 1, pp. 60-66, Jan 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.1 , pp. 60-66
    • Kim, Y.1    Jo, J.Y.2    Suh, K.K.3
  • 8
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP networks
    • Aug.
    • Thottan, M. and Ji, C. Y., "Anomaly Detection in IP networks, " IEEE Transactions on Signal Processing, vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
    • (2003) IEEE Transactions on Signal Processing , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.Y.2
  • 10
    • 84893749338 scopus 로고    scopus 로고
    • DDoS prevention method based on chaos analysis of network traffic entropy
    • January
    • Xinlei Ma, Yonghong Chen, "DDoS Prevention Method Based on Chaos Analysis of Network Traffic Entropy", IEEE Communication Letters, Vol. 18, No. 1, pp. 114-117, January 2014.
    • (2014) IEEE Communication Letters , vol.18 , Issue.1 , pp. 114-117
    • Ma, X.1    Chen, Y.2
  • 17
    • 0035360372 scopus 로고    scopus 로고
    • Designing fuzzy inference systems from data: An interpretability-oriented review
    • June
    • Serge Guillaume, "Designing Fuzzy Inference Systems from Data: An Interpretability-Oriented Review", IEEE Transactions on Fuzzy Systems, Vol. 9, No. 3, June 2001.
    • (2001) IEEE Transactions on Fuzzy Systems , vol.9 , Issue.3
    • Guillaume, S.1
  • 20
    • 84961856643 scopus 로고    scopus 로고
    • https: //www. juniper. net/documentation/en-US/junos13. 2/topics/conce pt/port-mirroring-qfx-series-understanding. html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.