-
1
-
-
84983058783
-
-
Opennetworking.org [Internet]. California: Open networking foundation [cited 2016 May 15]
-
Opennetworking.org [Internet]. California: Open networking foundation [cited 2016 May 15]. Available: https://www.opennetworking.org/sdn-resources/openflow.
-
-
-
-
2
-
-
84883279264
-
OpenRAN: A software-defined ran architecture via virtualization
-
Aug 12 ACM
-
Yang M, Li Y, Jin D, Su L, Ma S, Zeng L. OpenRAN: a software-defined ran architecture via virtualization. InACM SIGCOMM computer communication review 2013 Aug 12 ( Vol. 43, No. 4, pp. 549-550). ACM. doi: 10.1145/2486001.2491732
-
(2013)
ACM SIGCOMM Computer Communication Review
, vol.43
, Issue.4
, pp. 549-550
-
-
Yang, M.1
Li, Y.2
Jin, D.3
Su, L.4
Ma, S.5
Zeng, L.6
-
3
-
-
84907326144
-
Evaluating the effect of centralization on routing convergence on a hybrid bgp-sdn emulation framework
-
Aug 17 ACM
-
Gamperli A, Kotronis V, Dimitropoulos X. Evaluating the effect of centralization on routing convergence on a hybrid bgp-sdn emulation framework. InACM SIGCOMM Computer Communication Review 2014 Aug 17 (Vol. 44, No. 4, pp. 369-370). ACM. doi: 10.1145/2740070.2631458
-
(2014)
ACM SIGCOMM Computer Communication Review
, vol.44
, Issue.4
, pp. 369-370
-
-
Gamperli, A.1
Kotronis, V.2
Dimitropoulos, X.3
-
4
-
-
84880545424
-
Are we ready for SDN? Implementation challenges for software-defined networks
-
IEEE. Jul
-
Sezer S, Scott-Hayward S, Chouhan PK, Fraser B, Lake D, Finnegan J, et al. Are we ready for SDN? Implementation challenges for software-defined networks. Communications Magazine, IEEE. 2013 Jul; 51(7):36-43. doi: 10.1109/MCOM.2013.6553676
-
(2013)
Communications Magazine
, vol.51
, Issue.7
, pp. 36-43
-
-
Sezer, S.1
Scott-Hayward, S.2
Chouhan, P.K.3
Fraser, B.4
Lake, D.5
Finnegan, J.6
-
6
-
-
0842332412
-
An efficient filter for denial-of-service bandwidth attacks
-
IEEE Dec 1 IEEE
-
Abdelsayed S, Glimsholt D, Leckie C, Ryan S, Shami S. An efficient filter for denial-of-service bandwidth attacks. InGlobal Telecommunications Conference, 2003. GLOBECOM'03. IEEE 2003 Dec 1 (Vol. 3, pp. 1353-1357). IEEE. doi: 10.1109/GLOCOM.2003.1258459
-
(2003)
Global Telecommunications Conference, 2003. GLOBECOM'03
, vol.3
, pp. 1353-1357
-
-
Abdelsayed, S.1
Glimsholt, D.2
Leckie, C.3
Ryan, S.4
Shami, S.5
-
7
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Aug 13
-
Gil TM, Poletto M. MULTOPS: a data-structure for bandwidth attack detection. InUSENIX Security Symposium 2001 Aug 13 (pp. 23-38).
-
(2001)
USENIX Security Symposium
, pp. 23-38
-
-
Gil, T.M.1
Poletto, M.2
-
10
-
-
33645822113
-
Novel hybrid schemes employing packet marking and logging for IP traceback
-
May
-
Al-Duwairi B, Govindarasu M. Novel hybrid schemes employing packet marking and logging for IP traceback. Parallel and Distributed Systems, IEEE Transactions on. 2006 May; 17(5):403-18. doi: 10.1109/TPDS.2006.63
-
(2006)
Parallel and Distributed Systems, IEEE Transactions on
, vol.17
, Issue.5
, pp. 403-418
-
-
Al-Duwairi, B.1
Govindarasu, M.2
-
11
-
-
24644453625
-
Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks
-
Apr 11 Springer Berlin Heidelberg
-
Jalili R, Imani-Mehr F, Amini M, Shahriari HR. Detection of distributed denial of service attacks using statistical pre-processor and unsupervised neural networks. InInformation Security Practice and Experience 2005 Apr 11 (pp. 192-203). Springer Berlin Heidelberg. doi: 10.1007/978-3-540-31979-5-17
-
(2005)
Information Security Practice and Experience
, pp. 192-203
-
-
Jalili, R.1
Imani-Mehr, F.2
Amini, M.3
Shahriari, H.R.4
-
13
-
-
79952585972
-
DDoS detection and traceback with decision tree and grey relational analysis
-
Jan 1
-
Wu YC, Tseng HR, Yang W, Jan RH. DDoS detection and traceback with decision tree and grey relational analysis. International Journal of Ad Hoc and Ubiquitous Computing. 2011 Jan 1; 7(2):121-36. doi: 10.1504/IJAHUC.2011.038998
-
(2011)
International Journal of Ad Hoc and Ubiquitous Computing
, vol.7
, Issue.2
, pp. 121-136
-
-
Wu, Y.C.1
Tseng, H.R.2
Yang, W.3
Jan, R.H.4
-
14
-
-
84956680241
-
Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework
-
May
-
Osanaiye O, Choo KK, Dlodlo M. Distributed denial of service (DDoS) resilience in cloud: review and conceptual cloud DDoS mitigation framework. Journal of Network and Computer Applications. 2016 May 31; 67:147-65. doi: 10.1016/j.jnca.2016.01.001
-
(2016)
Journal of Network and Computer Applications
, vol.31
, Issue.67
, pp. 147-165
-
-
Osanaiye, O.1
Choo, K.K.2
Dlodlo, M.3
-
15
-
-
84969794985
-
Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing
-
May 10
-
Osanaiye O, Cai H, Choo KK, Dehghantanha A, Xu Z, Dlodlo M. Ensemble-based multi-filter feature selection method for DDoS detection in cloud computing. EURASIP Journal on Wireless Communications and Networking. 2016 May 10; 2016(1):1. doi: 10.1186/s13638-016-0623-3
-
(2016)
EURASIP Journal on Wireless Communications and Networking
, vol.2016
, Issue.1
, pp. 1
-
-
Osanaiye, O.1
Cai, H.2
Choo, K.K.3
Dehghantanha, A.4
Xu, Z.5
Dlodlo, M.6
-
16
-
-
80052081335
-
A trust-based approach against IP-spoofing attacks
-
Jul 19 IEEE
-
Gonzalez JM, Anwar M, Joshi JB. A trust-based approach against IP-spoofing attacks. InPrivacy, Security and Trust (PST), 2011 Ninth Annual International Conference on 2011 Jul 19 (pp. 63-70). IEEE. doi: 10.1109/PST.2011.5971965
-
(2011)
Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on
, pp. 63-70
-
-
Gonzalez, J.M.1
Anwar, M.2
Joshi, J.B.3
-
17
-
-
41949118967
-
Detecting compromised routers via packet forwarding behavior
-
IEEE. Mar
-
Mizrak AT, Savage S, Marzullo K. Detecting compromised routers via packet forwarding behavior. Network, IEEE. 2008 Mar; 22(2):34-9. doi: 10.1109/MNET.2008.4476069
-
(2008)
Network
, vol.22
, Issue.2
, pp. 34-39
-
-
Mizrak, A.T.1
Savage, S.2
Marzullo, K.3
-
18
-
-
0034776786
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
Aug 27 ACM
-
Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. InACM SIGCOMM computer communication review 2001 Aug 27 (Vol. 31, No. 4, pp. 15-26). ACM. doi: 10.1145/383059.38306
-
(2001)
ACM SIGCOMM Computer Communication Review
, vol.31
, Issue.4
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
19
-
-
84964940823
-
A collaborative approach to facilitate intrusion detection and response against DDoS attacks
-
Oct 9 IEEE
-
Zargar ST, Joshi JB. A collaborative approach to facilitate intrusion detection and response against DDoS attacks. InCollaborative Computing: Networking, Applications and Worksharing (Collaborate-Com), 2010 6th International Conference on 2010 Oct 9 (pp. 1-8). IEEE. doi: 10.4108/icst.collaboratecom.2010.46
-
(2010)
th International Conference on
, pp. 1-8
-
-
Zargar, S.T.1
Joshi, J.B.2
-
21
-
-
0038729330
-
Protection from distributed denial of service attacks using history-based IP filtering
-
May 11 IEEE
-
Peng T, Leckie C, Ramamohanarao K. Protection from distributed denial of service attacks using history-based IP filtering. InCommunications, 2003. ICC'03. IEEE International Conference on 2003 May 11 (Vol. 1, pp. 482-486). IEEE. doi: 10.1109/ICC.2003.1204223
-
(2003)
Communications, 2003. ICC'03. IEEE International Conference on
, vol.1
, pp. 482-486
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
22
-
-
33947503628
-
Defense against spoofed IP traffic using hop-count filtering
-
Feb 1
-
Wang H, Jin C, Shin KG. Defense against spoofed IP traffic using hop-count filtering. IEEE/ACM Transactions on Networking (ToN). 2007 Feb 1; 15(1):40-53. doi: 10.1109/TNET.2006.890133
-
(2007)
IEEE/ACM Transactions on Networking (ToN)
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
23
-
-
33646742035
-
PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Apr 1
-
Kim Y, Lau WC, Chuah MC, Chao HJ. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE transactions on dependable and secure computing. 2006 Apr 1; 3(2):141. doi: 10.1109/TDSC.2006.25
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 141
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
24
-
-
84255175605
-
Defending systems against tilt DDoS attacks
-
Oct 20 IEEE
-
Liu HI, Chang KC. Defending systems against tilt DDoS attacks. InTelecommunication Systems, Services, and Applications (TSSA), 2011 6th International Conference on 2011 Oct 20 (pp. 22-27). IEEE. doi: 10.1109/TSSA.2011.6095400
-
(2011)
th International Conference on
, pp. 22-27
-
-
Liu, H.I.1
Chang, K.C.2
-
25
-
-
61449207953
-
DDoS-shield: DDoS-resilient scheduling to counter application layer attacks
-
Feb 1
-
Ranjan S, Swaminathan R, Uysal M, Nucci A, Knightly E. DDoS-shield: DDoS-resilient scheduling to counter application layer attacks. IEEE/ACM Transactions on Networking (TON). 2009 Feb 1; 17(1):26-39. doi: 10.1109/TNET.2008.926503
-
(2009)
IEEE/ACM Transactions on Networking (TON)
, vol.17
, Issue.1
, pp. 26-39
-
-
Ranjan, S.1
Swaminathan, R.2
Uysal, M.3
Nucci, A.4
Knightly, E.5
-
26
-
-
84921652362
-
Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques
-
Nov 11 IEEE
-
Ashraf J, Latif S. Handling intrusion and DDoS attacks in Software Defined Networks using machine learning techniques. InSoftware Engineering Conference (NSEC), 2014 National 2014 Nov 11 (pp. 55-60). IEEE. doi: 10.1109/NSEC.2014.6998241
-
(2014)
Software Engineering Conference (NSEC), 2014 National
, pp. 55-60
-
-
Ashraf, J.1
Latif, S.2
-
28
-
-
84910659073
-
Rosemary: A robust, secure, and high-performance network operating system
-
Nov 3 ACM
-
Shin S, Song Y, Lee T, Lee S, Chung J, Porras P, et al. Rosemary: A robust, secure, and high-performance network operating system. InProceedings of the 2014 ACM SIGSAC conference on computer and communications security 2014 Nov 3 (pp. 78-89). ACM. doi: 10.1145/2660267.2660353
-
(2014)
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
, pp. 78-89
-
-
Shin, S.1
Song, Y.2
Lee, T.3
Lee, S.4
Chung, J.5
Porras, P.6
-
29
-
-
84866518191
-
A security enforcement kernel for OpenFlow networks
-
2012 Aug 13 ACM
-
Porras P, Shin S, Yegneswaran V, Fong M, Tyson M, Gu G. A security enforcement kernel for OpenFlow networks. InProceedings of the first workshop on Hot topics in software defined networks 2012 Aug 13 (pp. 121-126). ACM. doi: 10.1145/2342441.2342466
-
Proceedings of the First Workshop on Hot Topics in Software Defined Networks
, pp. 121-126
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
30
-
-
84907325242
-
FRESCO: Modular Composable Security Services for Software-Defined Networks
-
Feb
-
Shin S, Porras PA, Yegneswaran V, Fong MW, Gu G, Tyson M. FRESCO: Modular Composable Security Services for Software-Defined Networks. InNDSS 2013 Feb.
-
(2013)
NDSS
-
-
Shin, S.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Gu, G.5
Tyson, M.6
-
31
-
-
84883723129
-
Towards a secure controller platform for openflow applications
-
Aug 16 ACM
-
Wen X, Chen Y, Hu C, Shi C, Wang Y. Towards a secure controller platform for openflow applications. InProceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking 2013 Aug 16 (pp. 171-172). ACM. doi: 10.1145/2491185.2491212
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
, pp. 171-172
-
-
Wen, X.1
Chen, Y.2
Hu, C.3
Shi, C.4
Wang, Y.5
-
34
-
-
85006206462
-
Software-defined networking: The new norm for networks
-
Open Networking Foundation. Apr 13
-
Open Networking Foundation. Software-defined networking: The new norm for networks. ONF White Paper. 2012 Apr 13.
-
(2012)
ONF White Paper
-
-
-
36
-
-
84983030276
-
-
Open Networking Foundation. Mar
-
Open Networking Foundation. Specification OS Version 1.5.1. 2015 Mar.
-
(2015)
Specification OS Version 1.5.1
-
-
-
37
-
-
84983030255
-
-
cited 2015 Nov 23
-
DDOSIM tool. [cited 2015 Nov 23]. Available: http://sourceforge.net/projects/ddosim/
-
DDOSIM Tool
-
-
|