메뉴 건너뛰기




Volumn 11, Issue 8, 2016, Pages

Adaptive suspicious prevention for defending DoS attacks in SDN-based convergent networks

Author keywords

[No Author keywords available]

Indexed keywords

BRAIN; COMPUTER PROGRAM; EXPERIMENTAL MODEL; ALGORITHM; COMPUTER NETWORK; COMPUTER SECURITY; SOFTWARE; WORKFLOW;

EID: 84983027871     PISSN: None     EISSN: 19326203     Source Type: Journal    
DOI: 10.1371/journal.pone.0160375     Document Type: Article
Times cited : (26)

References (38)
  • 1
    • 84983058783 scopus 로고    scopus 로고
    • Opennetworking.org [Internet]. California: Open networking foundation [cited 2016 May 15]
    • Opennetworking.org [Internet]. California: Open networking foundation [cited 2016 May 15]. Available: https://www.opennetworking.org/sdn-resources/openflow.
  • 2
    • 84883279264 scopus 로고    scopus 로고
    • OpenRAN: A software-defined ran architecture via virtualization
    • Aug 12 ACM
    • Yang M, Li Y, Jin D, Su L, Ma S, Zeng L. OpenRAN: a software-defined ran architecture via virtualization. InACM SIGCOMM computer communication review 2013 Aug 12 ( Vol. 43, No. 4, pp. 549-550). ACM. doi: 10.1145/2486001.2491732
    • (2013) ACM SIGCOMM Computer Communication Review , vol.43 , Issue.4 , pp. 549-550
    • Yang, M.1    Li, Y.2    Jin, D.3    Su, L.4    Ma, S.5    Zeng, L.6
  • 3
    • 84907326144 scopus 로고    scopus 로고
    • Evaluating the effect of centralization on routing convergence on a hybrid bgp-sdn emulation framework
    • Aug 17 ACM
    • Gamperli A, Kotronis V, Dimitropoulos X. Evaluating the effect of centralization on routing convergence on a hybrid bgp-sdn emulation framework. InACM SIGCOMM Computer Communication Review 2014 Aug 17 (Vol. 44, No. 4, pp. 369-370). ACM. doi: 10.1145/2740070.2631458
    • (2014) ACM SIGCOMM Computer Communication Review , vol.44 , Issue.4 , pp. 369-370
    • Gamperli, A.1    Kotronis, V.2    Dimitropoulos, X.3
  • 4
    • 84880545424 scopus 로고    scopus 로고
    • Are we ready for SDN? Implementation challenges for software-defined networks
    • IEEE. Jul
    • Sezer S, Scott-Hayward S, Chouhan PK, Fraser B, Lake D, Finnegan J, et al. Are we ready for SDN? Implementation challenges for software-defined networks. Communications Magazine, IEEE. 2013 Jul; 51(7):36-43. doi: 10.1109/MCOM.2013.6553676
    • (2013) Communications Magazine , vol.51 , Issue.7 , pp. 36-43
    • Sezer, S.1    Scott-Hayward, S.2    Chouhan, P.K.3    Fraser, B.4    Lake, D.5    Finnegan, J.6
  • 7
    • 85084163167 scopus 로고    scopus 로고
    • MULTOPS: A data-structure for bandwidth attack detection
    • Aug 13
    • Gil TM, Poletto M. MULTOPS: a data-structure for bandwidth attack detection. InUSENIX Security Symposium 2001 Aug 13 (pp. 23-38).
    • (2001) USENIX Security Symposium , pp. 23-38
    • Gil, T.M.1    Poletto, M.2
  • 10
    • 33645822113 scopus 로고    scopus 로고
    • Novel hybrid schemes employing packet marking and logging for IP traceback
    • May
    • Al-Duwairi B, Govindarasu M. Novel hybrid schemes employing packet marking and logging for IP traceback. Parallel and Distributed Systems, IEEE Transactions on. 2006 May; 17(5):403-18. doi: 10.1109/TPDS.2006.63
    • (2006) Parallel and Distributed Systems, IEEE Transactions on , vol.17 , Issue.5 , pp. 403-418
    • Al-Duwairi, B.1    Govindarasu, M.2
  • 11
    • 24644453625 scopus 로고    scopus 로고
    • Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
    • Apr 11 Springer Berlin Heidelberg
    • Jalili R, Imani-Mehr F, Amini M, Shahriari HR. Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks. InInformation Security Practice and Experience 2005 Apr 11 (pp. 192-203). Springer Berlin Heidelberg. doi: 10.1007/978-3-540-31979-5-17
    • (2005) Information Security Practice and Experience , pp. 192-203
    • Jalili, R.1    Imani-Mehr, F.2    Amini, M.3    Shahriari, H.R.4
  • 14
    • 84956680241 scopus 로고    scopus 로고
    • Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
    • May
    • Osanaiye O, Choo KK, Dlodlo M. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications. 2016 May 31; 67:147-65. doi: 10.1016/j.jnca.2016.01.001
    • (2016) Journal of Network and Computer Applications , vol.31 , Issue.67 , pp. 147-165
    • Osanaiye, O.1    Choo, K.K.2    Dlodlo, M.3
  • 17
    • 41949118967 scopus 로고    scopus 로고
    • Detecting compromised routers via packet forwarding behavior
    • IEEE. Mar
    • Mizrak AT, Savage S, Marzullo K. Detecting compromised routers via packet forwarding behavior. Network, IEEE. 2008 Mar; 22(2):34-9. doi: 10.1109/MNET.2008.4476069
    • (2008) Network , vol.22 , Issue.2 , pp. 34-39
    • Mizrak, A.T.1    Savage, S.2    Marzullo, K.3
  • 18
    • 0034776786 scopus 로고    scopus 로고
    • On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
    • Aug 27 ACM
    • Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. InACM SIGCOMM computer communication review 2001 Aug 27 (Vol. 31, No. 4, pp. 15-26). ACM. doi: 10.1145/383059.38306
    • (2001) ACM SIGCOMM Computer Communication Review , vol.31 , Issue.4 , pp. 15-26
    • Park, K.1    Lee, H.2
  • 19
    • 84964940823 scopus 로고    scopus 로고
    • A collaborative approach to facilitate intrusion detection and response against DDoS attacks
    • Oct 9 IEEE
    • Zargar ST, Joshi JB. A collaborative approach to facilitate intrusion detection and response against DDoS attacks. InCollaborative Computing: Networking, Applications and Worksharing (Collaborate-Com), 2010 6th International Conference on 2010 Oct 9 (pp. 1-8). IEEE. doi: 10.4108/icst.collaboratecom.2010.46
    • (2010) th International Conference on , pp. 1-8
    • Zargar, S.T.1    Joshi, J.B.2
  • 21
    • 0038729330 scopus 로고    scopus 로고
    • Protection from distributed denial of service attacks using history-based IP filtering
    • May 11 IEEE
    • Peng T, Leckie C, Ramamohanarao K. Protection from distributed denial of service attacks using history-based IP filtering. InCommunications, 2003. ICC'03. IEEE International Conference on 2003 May 11 (Vol. 1, pp. 482-486). IEEE. doi: 10.1109/ICC.2003.1204223
    • (2003) Communications, 2003. ICC'03. IEEE International Conference on , vol.1 , pp. 482-486
    • Peng, T.1    Leckie, C.2    Ramamohanarao, K.3
  • 22
    • 33947503628 scopus 로고    scopus 로고
    • Defense against spoofed IP traffic using hop-count filtering
    • Feb 1
    • Wang H, Jin C, Shin KG. Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Transactions on Networking (ToN). 2007 Feb 1; 15(1):40-53. doi: 10.1109/TNET.2006.890133
    • (2007) IEEE/ACM Transactions on Networking (ToN) , vol.15 , Issue.1 , pp. 40-53
    • Wang, H.1    Jin, C.2    Shin, K.G.3
  • 23
    • 33646742035 scopus 로고    scopus 로고
    • PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Apr 1
    • Kim Y, Lau WC, Chuah MC, Chao HJ. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE transactions on dependable and secure computing. 2006 Apr 1; 3(2):141. doi: 10.1109/TDSC.2006.25
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.2 , pp. 141
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 24
    • 84255175605 scopus 로고    scopus 로고
    • Defending systems against tilt DDoS attacks
    • Oct 20 IEEE
    • Liu HI, Chang KC. Defending systems against tilt DDoS attacks. InTelecommunication Systems, Services, and Applications (TSSA), 2011 6th International Conference on 2011 Oct 20 (pp. 22-27). IEEE. doi: 10.1109/TSSA.2011.6095400
    • (2011) th International Conference on , pp. 22-27
    • Liu, H.I.1    Chang, K.C.2
  • 26
    • 84921652362 scopus 로고    scopus 로고
    • Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques
    • Nov 11 IEEE
    • Ashraf J, Latif S. Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques. InSoftware Engineering Conference (NSEC), 2014 National 2014 Nov 11 (pp. 55-60). IEEE. doi: 10.1109/NSEC.2014.6998241
    • (2014) Software Engineering Conference (NSEC), 2014 National , pp. 55-60
    • Ashraf, J.1    Latif, S.2
  • 30
  • 34
    • 85006206462 scopus 로고    scopus 로고
    • Software-defined networking: The new norm for networks
    • Open Networking Foundation. Apr 13
    • Open Networking Foundation. Software-defined networking: The new norm for networks. ONF White Paper. 2012 Apr 13.
    • (2012) ONF White Paper
  • 36
  • 37
    • 84983030255 scopus 로고    scopus 로고
    • cited 2015 Nov 23
    • DDOSIM tool. [cited 2015 Nov 23]. Available: http://sourceforge.net/projects/ddosim/
    • DDOSIM Tool


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.