-
1
-
-
72849145549
-
Intrusion Detection System Using Self-Organizing Maps
-
In: IEEE Proceedings of the 3rd International Conference on Network and System Security; p.397-402.
-
Alsulaiman, M., Alyahya, A., Alkharboush, R., Alghafis, N., 2009. Intrusion Detection System Using Self-Organizing Maps. In: IEEE Proceedings of the 3rd International Conference on Network and System Security; p.397-402.
-
(2009)
-
-
Alsulaiman, M.1
Alyahya, A.2
Alkharboush, R.3
Alghafis, N.4
-
2
-
-
85019167711
-
-
the DDoS Botnet Simulator, 〈〉.
-
BoNeSi. the DDoS Botnet Simulator, 〈 https://github.com/markus-go/bonesi〉.
-
-
-
BoNeSi1
-
3
-
-
79955041204
-
Lightweight DDoS Flooding Attack Detection Using NOX/OpenFlow
-
In: Denver, Colorado
-
Braga, Rodrigo, Mota, Edjard, Passito, Alexandre, 2010. Lightweight DDoS Flooding Attack Detection Using NOX/OpenFlow. In: Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, Denver, Colorado; p.408-415.
-
(2010)
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks
, pp. 408-415
-
-
Rodrigo, B.1
Edjard, M.2
Alexandre, P.3
-
4
-
-
85019078905
-
-
DDoS Attack, 〈〉.
-
CAIDA Dataset. DDoS Attack 2007, 〈 https://data.caida.org/datasets/security/ddos-20070804/〉.
-
(2007)
-
-
CAIDA Dataset1
-
5
-
-
85019105716
-
-
Anonymized Internet Traces, 〈〉.
-
CAIDA Dataset. Anonymized Internet Traces 2015, 〈 https://data.caida.org/datasets/passive-2015/〉.
-
(2015)
-
-
CAIDA Dataset1
-
6
-
-
85019148438
-
-
Cisco IOS Embedded Event Manager (EEM) 〈 http://www.cisco.com/c/en/us/products/ios-nx-os-software/ios-embedded-event-managereem/〉.
-
-
-
-
7
-
-
85019070387
-
-
Data. 〈〉.
-
KDD Cup 1999 Data. 〈 http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html〉.
-
(1999)
-
-
KDD Cup1
-
8
-
-
84901454848
-
Fingerprinting Internet DNS Amplification DDoS Activities
-
Fachkha, Claude, Bou-Harb, Elias, Debbabi, Mourad, 2014. Fingerprinting Internet DNS Amplification DDoS Activities. In: Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS); p.1-5.
-
(2014)
Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS)
, pp. 1-5
-
-
Claude, F.1
Bou-Harb, E.2
Mourad, D.3
-
9
-
-
85019066137
-
-
Big Switch Networks Launches Mature Hardware-Centric Data Centre SDN Solution, July 2014. 〈〉.
-
FERRO, G. Big Switch Networks Launches Mature Hardware-Centric Data Centre SDN Solution, July 2014. 〈 http://etherealmind.com/big-switchnetworks-launches-hardware-centre-mature-data-centre-sdn-solution/〉.
-
-
-
FERRO, G.1
-
10
-
-
85019067755
-
-
Floodlight is an Open SDN Controller, 〈〉.
-
Floodlight is an Open SDN Controller, 2017. 〈 http://www.projectfloodlight.org/floodlight/〉.
-
(2017)
-
-
-
11
-
-
84864245314
-
A replication component for resilient OpenFlow-based networking
-
In: IEEE Network Operations and Management Symposium (NOMS); p.933-939.
-
Fonseca, P., Bennesby, R., Mota, E., Passito, A., 2012. A replication component for resilient OpenFlow-based networking. In: IEEE Network Operations and Management Symposium (NOMS); p.933-939.
-
(2012)
-
-
Fonseca, P.1
Bennesby, R.2
Mota, E.3
Passito, A.4
-
13
-
-
84886218857
-
-
Denial of Service Attacks, John Wiley and Sons,Part II (in book: Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications).
-
Gu, Qijun, Liu, Peng, 2012. Denial of Service Attacks, John Wiley and Sons, p.454-468, Part II (in book: Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications).
-
(2012)
, pp. 454-468
-
-
Qijun, G.1
Peng, L.2
-
14
-
-
33947251166
-
A hierarchical SOMbased intrusion detection system
-
Gunes Kayacik, H., Zincir-Heywood, N., A hierarchical SOMbased intrusion detection system. Eng. Appl. Artif. Intell. 20:4 (2007), 439–451.
-
(2007)
Eng. Appl. Artif. Intell.
, vol.20
, Issue.4
, pp. 439-451
-
-
Gunes Kayacik, H.1
Zincir-Heywood, N.2
-
15
-
-
84866524064
-
Kadoo: A Framework for Efficient and Scalable Offloading of Control Application
-
Hassas Yeganeh, S., Ganjali, Y., 2012. Kadoo: A Framework for Efficient and Scalable Offloading of Control Application. In: Proceeding HotSDN Conference; p.19-24.
-
(2012)
Proceeding HotSDN Conference
, pp. 19-24
-
-
Yeganeh, S.H.1
Ganjali, Y.2
-
16
-
-
85019102579
-
-
Switch Series. 〈〉.
-
HP 3800 Switch Series. 〈 https://www.hpe.com/h20195/v2/getpdf.aspx/c04111485.pdf?Ver=19〉.
-
-
-
HP1
-
17
-
-
84891618095
-
B4: Experience with a Globally-Deployed Software Defined WAN
-
Jain et al., S., 2013. B4: Experience with a Globally-Deployed Software Defined WAN. In: Proceeding ACM SIGCOMM 2013 Conference; p.3-14.
-
(2013)
Proceeding ACM SIGCOMM 2013 Conference
, pp. 3-14
-
-
Jain, S.1
-
18
-
-
84952935201
-
Intrusion detection in software defined networks with self-organized maps
-
Jankowski, D., Amanowicz, M., Intrusion detection in software defined networks with self-organized maps. J. Telecommun. Inf. Technol. 1:4 (2015), 3–9.
-
(2015)
J. Telecommun. Inf. Technol.
, vol.1
, Issue.4
, pp. 3-9
-
-
Jankowski, D.1
Amanowicz, M.2
-
19
-
-
74049128211
-
Research on Intrusion Detection Based on an Improved SOM Neural Network
-
In: IEEE Proceedings of the Fifth International Conference on Information Assurance and Security; p.400-403.
-
Jiang, D., Yang, Y., Xia, M., 2009. Research on Intrusion Detection Based on an Improved SOM Neural Network. In: IEEE Proceedings of the Fifth International Conference on Information Assurance and Security; p.400-403.
-
(2009)
-
-
Jiang, D.1
Yang, Y.2
Xia, M.3
-
20
-
-
85019074514
-
-
DDoS Attacks Advancing and Enduring: A SANS Survey 〈〉.
-
John Pescatore. DDoS Attacks Advancing and Enduring: A SANS Survey 2014, 〈 https://www.sans.org/reading-room/whitepapers/analyst/ddos-attacks-advancing-enduring-survey-34700〉.
-
(2014)
-
-
Pescatore, J.1
-
21
-
-
85019091217
-
-
Statistics on botnet-assisted DDoS attacks in Q1 2015, Technical Report
-
Kaspersky Lab. Statistics on botnet-assisted DDoS attacks in Q1 2015, Technical Report, 2015, https://securelist.com/blog/research/70071/statistics-on-botnet-assisted-ddos-attacks-in-q1-2015.
-
(2015)
-
-
Kaspersky Lab1
-
22
-
-
85019133972
-
Network traffic classification with Self Organizing Maps
-
In: Proceedings of the 22nd International symposium on computer and information sciences; p.1-5.
-
Kiziloren, T., Germen, E., 2007. Network traffic classification with Self Organizing Maps. In: Proceedings of the 22nd International symposium on computer and information sciences; p.1-5.
-
(2007)
-
-
Kiziloren, T.1
Germen, E.2
-
23
-
-
0025489075
-
The self-organizing map
-
In: Proceedings of the IEEE, p.1464–1480.
-
Kohonen, T., 1990. The self-organizing map. In: Proceedings of the IEEE, p.1464–1480.
-
(1990)
-
-
Kohonen, T.1
-
24
-
-
85019091493
-
-
The Basic SOM. Springer-Verlag Berlin Heidelberg, p.105-176, Chapter 3 (in book: Self-Organizing Maps).
-
Kohonen, Teuvo, 2001. The Basic SOM. Springer-Verlag Berlin Heidelberg, p.105-176, Chapter 3 (in book: Self-Organizing Maps).
-
(2001)
-
-
Teuvo, K.1
-
25
-
-
84857207112
-
Onix: A Distributed Control Platform for Large-Scale Production Networks
-
In: Proceeding OSDI Conference
-
Koponen et al., T., 2010. Onix: A Distributed Control Platform for Large-Scale Production Networks. In: Proceeding OSDI Conference; p.1-6.
-
(2010)
, pp. 1-6
-
-
Koponen, T.1
-
26
-
-
85019061447
-
-
DDoS attack-20091105. 〈〉.
-
LANDER:DARPA 2009 DDoS attack-20091105. 〈 https://ant.isi.edu/datasets/readmes/DARPA-2009-DDoS-attack-20091105.README.txt〉.
-
(2009)
-
-
LANDER:DARPA1
-
27
-
-
67650462942
-
A Self-Organizing Map and its Modeling for Discovering Malignant Network Traffic
-
In: IEEE Symposium onComputational Intelligence in Cyber Security; p.122-129.
-
Langin, C., Zhou, H., Rahimi, S., Gupta, B., Zargham, M., Sayeh, M., 2009. A Self-Organizing Map and its Modeling for Discovering Malignant Network Traffic. In: IEEE Symposium onComputational Intelligence in Cyber Security; p.122-129.
-
(2009)
-
-
Langin, C.1
Zhou, H.2
Rahimi, S.3
Gupta, B.4
Zargham, M.5
Sayeh, M.6
-
28
-
-
84963865232
-
Software defined networks: a survey
-
Masoudi, Rahim, Ghaffari, Ali, Software defined networks: a survey. J. Netw. Comput. Appl. 1:67 (2016), 1–25, 10.1016/j.jnca.2016.03.016.
-
(2016)
J. Netw. Comput. Appl.
, vol.1
, Issue.67
, pp. 1-25
-
-
Masoudi, R.1
Ghaffari, A.2
-
29
-
-
36649037824
-
Network Routing: Algorithms, Protocols, and Architectures
-
1st ed. Morgan Kaufmann
-
Medhi, D., Network Routing: Algorithms, Protocols, and Architectures. 1st ed., 2007, Morgan Kaufmann.
-
(2007)
-
-
Medhi, D.1
-
31
-
-
33846985968
-
Detecting denial of service attacks using emergent self-organizing maps
-
In: IEEE Signal Processing and Information Technology; p.375-380.
-
Mitrokotsa, A., Douligeris, C., 2005. Detecting denial of service attacks using emergent self-organizing maps. In: IEEE Signal Processing and Information Technology; p.375-380.
-
(2005)
-
-
Mitrokotsa, A.1
Douligeris, C.2
-
32
-
-
77954334703
-
Delegating network security with more information
-
In: Proceedings of the 1st ACM workshop on Research on enterprise networking; p.19-26.
-
Naous, J., Stutsman, R., Mazieres, D., McKeown, N., Zeldovich, N., 2009. Delegating network security with more information. In: Proceedings of the 1st ACM workshop on Research on enterprise networking; p.19-26.
-
(2009)
-
-
Naous, J.1
Stutsman, R.2
Mazieres, D.3
McKeown, N.4
Zeldovich, N.5
-
33
-
-
85019128865
-
A Hybrid Model for Network Traffic Identification Based on Association Rules and Self-Organizing Maps (SOM)
-
In: Proceedings of the Ninth International Conference on Networking and Services; p.213-219.
-
Nascimento, Z., Sadok, D., Fernandes, S., 2013. A Hybrid Model for Network Traffic Identification Based on Association Rules and Self-Organizing Maps (SOM). In: Proceedings of the Ninth International Conference on Networking and Services; p.213-219.
-
(2013)
-
-
Nascimento, Z.1
Sadok, D.2
Fernandes, S.3
-
36
-
-
85019087958
-
-
Open network linux, 2017 〈 http://opennetlinux.org〉.
-
(2017)
-
-
-
37
-
-
85019090967
-
-
OpenFlow Switch Specification Version 1.4.0, 〈〉.
-
OpenFlow. OpenFlow Switch Specification Version 1.4.0, 2013 〈 https://www.opennetworking.org/images/stories/downloads/sdn-resources/onf-specifications/op-enflow/openflow-spec-v1.4.0.pdf〉.
-
(2013)
-
-
OpenFlow1
-
38
-
-
85019127582
-
-
OpenvSwitch version 2.3.0, 〈〉.
-
OpenvSwitch. OpenvSwitch version 2.3.0, 2014 〈 http://openvswitch.org/releases/openvswitch-2.3.0.tar.gz〉.
-
(2014)
-
-
OpenvSwitch1
-
39
-
-
84966668140
-
UNISAFE: A Union of Security Actions for Software Switches
-
In: the SDN-NFVSec Workshop, p.13–18.
-
Park, T., Kim, Y., Shin, S., 2016. UNISAFE: A Union of Security Actions for Software Switches. In: the SDN-NFVSec Workshop, p.13–18.
-
(2016)
-
-
Park, T.1
Kim, Y.2
Shin, S.3
-
40
-
-
85019096227
-
-
〈〉.
-
Pica os white box switch os, 2017. 〈 http://www.pica8.com/white-box-switches/white-box-switch-os.php〉.
-
(2017)
-
-
Pica os white box switch os1
-
41
-
-
35248842651
-
Detecting anomalous network traffic with self-organizing maps, Recent Advances in Intrusion Detection, Springer-Verlag Berlin Heidelberg, p
-
36–54, Chapter 1 (in book: Recent Advances in Intrusion Dection).
-
Ramadas, M., Ostermann, S., Tjaden, B., 2003. Detecting anomalous network traffic with self-organizing maps, Recent Advances in Intrusion Detection, Springer-Verlag Berlin Heidelberg, p.36–54, Chapter 1 (in book: Recent Advances in Intrusion Dection).
-
(2003)
-
-
Ramadas, M.1
Ostermann, S.2
Tjaden, B.3
-
42
-
-
84889062725
-
AVANT-GUARD: scalable and vigilant switch flow managament in software-defined networks
-
In: Proceeding of the 2013 ACM SIGSAC Conference on Computer and Commications Security; p.413-424.
-
Shin, S., Yegneswaran, V., Porras, P., Gu, G., 2013. AVANT-GUARD: scalable and vigilant switch flow managament in software-defined networks. In: Proceeding of the 2013 ACM SIGSAC Conference on Computer and Commications Security; p.413-424.
-
(2013)
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
43
-
-
85019068261
-
-
Aviv, Adam J., Keller, E., Smith, M., 2016. Enabling Practical Software-defined Networking Security Applications with OFX. In: The Network and Distributed System Security Symposium (NDSS); p.181-195.
-
Sonchack, J., Aviv, Adam J., Keller, E., Smith, M., 2016. Enabling Practical Software-defined Networking Security Applications with OFX. In: The Network and Distributed System Security Symposium (NDSS); p.181-195.
-
-
-
Sonchack, J.1
-
44
-
-
84962402837
-
Implementation of Content-oriented Networking Architecture (CONA): A Focus on DDoS Countermeasure
-
In: European NetFPGA Developers Workshop.
-
Suh, J., Choi, H., Yoon, W., You, T., Kwon, T., Choi, Y., 2010. Implementation of Content-oriented Networking Architecture (CONA): A Focus on DDoS Countermeasure. In: European NetFPGA Developers Workshop.
-
(2010)
-
-
Suh, J.1
Choi, H.2
Yoon, W.3
You, T.4
Kwon, T.5
Choi, Y.6
-
45
-
-
0036647190
-
An efficient k-means clustering algorithm: analysis and Implementation
-
Kanungo, Tapas, Mount, David M., Netanyahu, Nathan S., Piatko, Christine D., Silverman, Ruth, Wu, Angela Y., An efficient k-means clustering algorithm: analysis and Implementation. IEEE Trans. Pat. Ana Ma Intel. 24:7 (2002), 881–892.
-
(2002)
IEEE Trans. Pat. Ana Ma Intel.
, vol.24
, Issue.7
, pp. 881-892
-
-
Kanungo, T.1
Mount, D.M.2
Netanyahu, N.S.3
Piatko, C.D.4
Silverman, R.5
Wu, A.Y.6
-
46
-
-
78651413712
-
Network Traffic Classification Based on Kernel Self-Organizing Maps
-
In: International Conference on Intelligent Computing and Integrated Systems; p.310-314.
-
Ting, B., Yong, W., Xiaoling, T., 2010. Network Traffic Classification Based on Kernel Self-Organizing Maps. In: International Conference on Intelligent Computing and Integrated Systems; p.310-314.
-
(2010)
-
-
Ting, B.1
Yong, W.2
Xiaoling, T.3
-
47
-
-
84988864881
-
OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks
-
In: IEEE
-
Trung, V.Phan, Van Toan, T., Van Tuyen, D., Huong, T.T., Thanh, N.H.,. OpenFlowSIA: An optimized protection scheme for software-defined networks from flooding attacks. In: Proceedings of the Sixth International Conference on Communications and Electronics, IEEE, p. 13-18.
-
Proceedings of the Sixth International Conference on Communications and Electronics
, pp. 13-18
-
-
Trung, V.P.1
Van Toan, T.2
Van Tuyen, D.3
Huong, T.T.4
Thanh, N.H.5
-
49
-
-
70349577765
-
Grey self-organizing map based intrusion detection
-
Wang, C., Yu, H., Wang, H., Grey self-organizing map based intrusion detection. Optoelectron. Lett. 5:1 (2009), 64–68.
-
(2009)
Optoelectron. Lett.
, vol.5
, Issue.1
, pp. 64-68
-
-
Wang, C.1
Yu, H.2
Wang, H.3
-
50
-
-
84950135398
-
FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks
-
In: Proceeding IEEE/IFIP Proceedings of the 45th International Conference on Dependable Systems and Networks (DSN); p.239-250.
-
Wang, H., Xu, L., Gu, G., 2015. FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In: Proceeding IEEE/IFIP Proceedings of the 45th International Conference on Dependable Systems and Networks (DSN); p.239-250.
-
(2015)
-
-
Wang, H.1
Xu, L.2
Gu, G.3
-
51
-
-
84055179019
-
Source address validation solution with OpenFlow/NOX architecture
-
In: Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP); p.7–12.
-
Yao, G., Bi, J., Xiao, P., 2011. Source address validation solution with OpenFlow/NOX architecture. In: Proceedings of the 19th IEEE International Conference on Network Protocols (ICNP); p.7–12.
-
(2011)
-
-
Yao, G.1
Bi, J.2
Xiao, P.3
-
52
-
-
79951760230
-
A novel design for future on-demand service and security
-
In: IEEE International Conference Communication Technology (ICCT); p.385-388.
-
YuHunag, C., MinChi, T., YaoTing, C., YuChieh, C., YanRen, C., 2010. A novel design for future on-demand service and security. In: IEEE International Conference Communication Technology (ICCT); p.385-388.
-
(2010)
-
-
YuHunag, C.1
MinChi, T.2
YaoTing, C.3
YuChieh, C.4
YanRen, C.5
-
53
-
-
84964374650
-
SD-Anti-DDoS: Fast and Efficient DDoS Defense in Software-Defined Networks
-
Yunhe Cui, Yan, Lianshan, Li, Saifei, Xing, Huanlai, Pan, Wei, Zhu, Jian, Zheng, Xiaoyang, 2016. SD-Anti-DDoS: Fast and Efficient DDoS Defense in Software-Defined Networks. Journal of of Network and Computer Applications, doi:10.1016/j.jnca.2016.04.005.
-
(2016)
Journal of of Network and Computer Applications
-
-
Cui, Y.1
Lianshan, Y.2
Saifei, L.3
Huanlai, X.4
Wei, P.5
Jian, Z.6
Xiaoyang, Z.7
|