-
3
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., Cho, K., 2009. Seven years and one day: sketching the evolution of internet traffic. In: Proceedings of INFOCOM, pp. 711-719.
-
(2009)
Proceedings of INFOCOM
, pp. 711-719
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
4
-
-
84865800505
-
A tool for the generation of realistic network workload for emerging networking scenarios
-
A. Botta, A. Dainotti, and A. Pescap A tool for the generation of realistic network workload for emerging networking scenarios Comput. Netw. 56 October (15) 2012 3531 3547
-
(2012)
Comput. Netw.
, vol.56
, Issue.15 October
, pp. 3531-3547
-
-
Botta, A.1
Dainotti, A.2
Pescap, A.3
-
5
-
-
79955041204
-
A lightweight ddos flooding attack detection using nox/openflow
-
IEEE
-
Braga, R., Mota, E., Passito, A., 2010. A lightweight ddos flooding attack detection using nox/openflow. In: Proceedings of LCN, IEEE, pp. 408-415.
-
(2010)
Proceedings of LCN
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
6
-
-
28444433714
-
A unified framework for monitoring data streams in real time
-
IEEE
-
Bulut, A., Singh, A., 2005. A unified framework for monitoring data streams in real time. In: Proceedings of ICDE, IEEE, pp. 44-55.
-
(2005)
Proceedings of ICDE
, pp. 44-55
-
-
Bulut, A.1
Singh, A.2
-
7
-
-
84920030027
-
An openflow-based prototype of sdn-oriented stateful hardware firewalls
-
Raleigh, USA, IEEE
-
Collings, J., Liu, J., 2014. An openflow-based prototype of sdn-oriented stateful hardware firewalls. In: Proceedings of ICNP, Raleigh, USA, IEEE, pp. 525-528.
-
(2014)
Proceedings of ICNP
, pp. 525-528
-
-
Collings, J.1
Liu, J.2
-
8
-
-
29844455221
-
What's new: Finding significant differences in network data streams
-
G. Cormode, and S. Muthukrishnan What's new: finding significant differences in network data streams IEEE/ACM Trans. Netw. 13 6 2005 1219 1232
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, Issue.6
, pp. 1219-1232
-
-
Cormode, G.1
Muthukrishnan, S.2
-
10
-
-
84897109717
-
Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments
-
K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris Combining openflow and sflow for an effective and scalable anomaly detection and mitigation mechanism on sdn environments Comput. Netw. 62 April (7) 2014 122 136
-
(2014)
Comput. Netw.
, vol.62
, Issue.7 April
, pp. 122-136
-
-
Giotis, K.1
Argyropoulos, C.2
Androulidakis, G.3
Kalogeras, D.4
Maglaris, V.5
-
11
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
USENIX
-
Gu, Y., McCallum, A., Towsley, D., 2005. Detecting anomalies in network traffic using maximum entropy estimation. In: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, USENIX, pp. 32-32.
-
(2005)
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement
, pp. 32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
12
-
-
84883290864
-
B4: Experience with a globally-deployed software defined wan
-
Hong Kong, China, ACM
-
Jain, S., Kumar, A., Mandal, S., Ong, J., Poutievski, L., Singh, A., Venkata, S., Wanderer, J., Zhou, J., Zhu, M., Zolla, M., Holzle, U., Stuart, S., Vahda, A., 2013. B4: experience with a globally-deployed software defined wan. In: Proceedings of SIGCOMM, Hong Kong, China, ACM, pp. 3-14.
-
(2013)
Proceedings of SIGCOMM
, pp. 3-14
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhu, M.10
Zolla, M.11
Holzle, U.12
Stuart, S.13
Vahda, A.14
-
13
-
-
35048831757
-
Fast detection of scanning worm infections
-
Sophia Antipolis, France, Springer
-
Jung, J., Schechter, S., Berger, A., 2004. Fast detection of scanning worm infections. In: Proceedings of RAID, Sophia Antipolis, France, Springer, pp. 59-81.
-
(2004)
Proceedings of RAID
, pp. 59-81
-
-
Jung, J.1
Schechter, S.2
Berger, A.3
-
14
-
-
84908887667
-
Sdn-based solutions for moving target defense network protection
-
IEEE, 2014
-
Kampanakis, P., Perros, H., Beyene, T., 2014. Sdn-based solutions for moving target defense network protection. In: Proceedings of WoWMoM, IEEE, 2014, pp. 1-6.
-
(2014)
Proceedings of WoWMoM
, pp. 1-6
-
-
Kampanakis, P.1
Perros, H.2
Beyene, T.3
-
15
-
-
84883671159
-
Towards secure and dependable software-defined networks
-
ACM
-
Kreutz, D., Ramos, F., Verissimo, P., 2013. Towards secure and dependable software-defined networks. In: Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, ACM, pp. 55-60.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 55-60
-
-
Kreutz, D.1
Ramos, F.2
Verissimo, P.3
-
16
-
-
84864255134
-
A network in a laptop: Rapid prototyping for software-defined networks
-
Monterey, CA, USA, ACM
-
Lantz, B., Heller, B., McKeown, N., 2010. A network in a laptop: rapid prototyping for software-defined networks. In: Proc. Hotnets, Monterey, CA, USA, ACM, page 19.
-
(2010)
Proc. Hotnets
, pp. 19
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
17
-
-
84907322188
-
Drawbridge: Software-defined ddos-resistant traffic engineering
-
Chicago, USA, ACM
-
Li, J., Berg, S., Zhang, M., Reiher, P., Wei, T., 2014. Drawbridge: software-defined ddos-resistant traffic engineering. In: Proceedings of SIGCOMM, Chicago, USA, ACM, pp. 591-592.
-
(2014)
Proceedings of SIGCOMM
, pp. 591-592
-
-
Li, J.1
Berg, S.2
Zhang, M.3
Reiher, P.4
Wei, T.5
-
18
-
-
84870572145
-
Sensor openflow: Enabling software-defined wireless sensor networks
-
T. Luo, H.P. Tan, and T.Q.S. Quek Sensor openflow: enabling software-defined wireless sensor networks IEEE Commun. Lett. 16 November (11) 2012 1896 1899
-
(2012)
IEEE Commun. Lett.
, vol.16
, Issue.11 November
, pp. 1896
-
-
Luo, T.1
Tan, H.P.2
Quek, T.Q.S.3
-
20
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner Openflow: enabling innovation in campus networks ACM SIGCOMM Comput. Commun. Rev. 35 April (2) 2008 69 74
-
(2008)
ACM SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.2 April
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
21
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
Menlo Park, USA, Springer
-
Mehdi, S., Khalid, J., Khayam, S., 2011. Revisiting traffic anomaly detection using software defined networking. In: Proceedings of RAID, Menlo Park, USA, Springer, pp. 165-180.
-
(2011)
Proceedings of RAID
, pp. 165-180
-
-
Mehdi, S.1
Khalid, J.2
Khayam, S.3
-
22
-
-
84907363142
-
Nimbus: Cloud-scale attack detection and mitigation
-
Chicago, IL, USA, ACM
-
Miao, R., Yu, M., Jain, N., 2014. Nimbus: cloud-scale attack detection and mitigation. In: Proceedings of SIGCOMM, Chicago, IL, USA, ACM, pp. 121-122.
-
(2014)
Proceedings of SIGCOMM
, pp. 121-122
-
-
Miao, R.1
Yu, M.2
Jain, N.3
-
24
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
J. Mirkovic, and P. Reiher A taxonomy of ddos attack and ddos defense mechanisms ACM SIGCOMM Comput. Commun. Rev. 34 April (2) 2014 39 53
-
(2014)
ACM SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2 April
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
25
-
-
84939562333
-
Detecting ddos attacks against data center with correlation analysis
-
Peng Xiao, Wenyu Qu, Heng Qu, and Zhiyang Li Detecting ddos attacks against data center with correlation analysis Comput. Commun. 67 August (1) 2015 66 74
-
(2015)
Comput. Commun.
, vol.67
, Issue.1 August
, pp. 66-74
-
-
Xiao, P.1
Qu, W.2
Qu, H.3
Li, Z.4
-
26
-
-
0022471098
-
Learning representations by back-propagating errors
-
D. Rumelhart, G. Hinton, and R. Williams Learning representations by back-propagating errors Nature 323 October (2) 1986 533 536
-
(1986)
Nature
, vol.323
, Issue.2 October
, pp. 533-536
-
-
Rumelhart, D.1
Hinton, G.2
Williams, R.3
-
27
-
-
84904151768
-
-
Ryu sdn framework. Website. < http://osrg.github.io/ryu/ >.
-
Ryu Sdn Framework
-
-
-
28
-
-
84880545424
-
Are we ready for sdn? Implementation challenges for software-defined networks
-
S. Sezer, S. Scott-Hayward, P. Chouhan, B. Fraser, D. Lake, J. Finnegan, N. Viljoen, M. Miller, and N. Rao Are we ready for sdn? Implementation challenges for software-defined networks IEEE Commun. Mag. 51 July (7) 2013 36 43
-
(2013)
IEEE Commun. Mag.
, vol.51
, Issue.7 July
, pp. 36-43
-
-
Sezer, S.1
Scott-Hayward, S.2
Chouhan, P.3
Fraser, B.4
Lake, D.5
Finnegan, J.6
Viljoen, N.7
Miller, M.8
Rao, N.9
-
29
-
-
84883687346
-
Attacking software defined networks: A first feasibility study
-
Hong Kong, China, ACM
-
Shin, S., Gu, G., 2013. Attacking software defined networks: a first feasibility study. In: Proceedings of HotSDN, Hong Kong, China, ACM, pp. 165-166.
-
(2013)
Proceedings of HotSDN
, pp. 165-166
-
-
Shin, S.1
Gu, G.2
-
30
-
-
84889062725
-
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
-
Berlin, Germany, ACM
-
Shin, S., Yegneswaran, V., Porras, P., Gu, G., 2013. Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of CCS, Berlin, Germany, ACM, pp. 413-424.
-
(2013)
Proceedings of CCS
, pp. 413-424
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
33
-
-
84860603040
-
Implementing and testing a virus throttle
-
Washington, DC, USA, USENIX
-
Twycross, J., Williamson, M., 2003. Implementing and testing a virus throttle. In: Proceedings of the 12th Conference on USENIX Security Symposium, Washington, DC, USA, USENIX, pp. 20-20.
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, pp. 20
-
-
Twycross, J.1
Williamson, M.2
-
34
-
-
3142717571
-
Identifying similarities, periodicities and bursts for online search queries
-
ACM
-
Vlachos, M., Meek, C., Vagena, Z., Gunopulos, D., 2004. Identifying similarities, periodicities and bursts for online search queries. In: Proceedings of SIGMOD, ACM, pp. 131-142.
-
(2004)
Proceedings of SIGMOD
, pp. 131-142
-
-
Vlachos, M.1
Meek, C.2
Vagena, Z.3
Gunopulos, D.4
-
35
-
-
84925396031
-
Ddos attack protection in the era of cloud computing and software-defined networking
-
B. Wang, Y. Zheng, and W. Lou Ddos attack protection in the era of cloud computing and software-defined networking Comput. Netw. 81 April (22) 2015 308 319
-
(2015)
Comput. Netw.
, vol.81
, Issue.22 April
, pp. 308-319
-
-
Wang, B.1
Zheng, Y.2
Lou, W.3
-
36
-
-
84949623975
-
An energy-efficient sdn based sleep scheduling algorithm for wsns
-
Y. Wang, H. Chen, X. Wu, and L. Shu An energy-efficient sdn based sleep scheduling algorithm for wsns J. Netw. Comput. Appl. 59 January 2016 39 45
-
(2016)
J. Netw. Comput. Appl.
, vol.59
, Issue.January
, pp. 39-45
-
-
Wang, Y.1
Chen, H.2
Wu, X.3
Shu, L.4
-
37
-
-
84927760095
-
Distributed denial of service attacks in software-defined networking with cloud computing
-
Q. Yan, and F. Yu Distributed denial of service attacks in software-defined networking with cloud computing IEEE Commun. Mag. 53 April (4) 2015 52 59
-
(2015)
IEEE Commun. Mag.
, vol.53
, Issue.4 April
, pp. 52-59
-
-
Yan, Q.1
Yu, F.2
-
39
-
-
77952383186
-
Efficient elastic burst detection in data streams
-
ACM
-
Zhu, Y., Shasha, D., 2003. Efficient elastic burst detection in data streams. In: Proceedings of SIGKDD, ACM, pp. 336-345.
-
(2003)
Proceedings of SIGKDD
, pp. 336-345
-
-
Zhu, Y.1
Shasha, D.2
|