- P. Goransson and C. Black, “Software Defined Networks:
- A Comprehensive Approach,” Elsevier, 2014.
- M. McCauley, “About pox,” URL: http://www.noxrepo.
- org/pox/about-pox/. Online, 2013.
- D. Moore, G. M. Voelker, and S. Savage, “Inferring
- internet denial-of-service attack,” In Proceedings of
- USENIX Security Symposium, 2001.
- C. Meadows, “A formal framework and evaluation method
- for network denial of service,” In Computer Security
- Foundations Workshop, 1999. Proceedings of the 12th
- IEEE, pp. 4-13, 1999.
- C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A.
- Sundaram, and D. Zamboni, “Analysis of a denial of
- service attack on TCP,” In Security and Privacy, 1997
- Proceedings, 1997 IEEE Symposium on, pp. 208-223,
- U. D. Protocol, “RFC 768 J. Postel ISI 28 August 1980,”
- Isi, 1980.
- “ UDP flood attack”
- https://en.wikipedia.org/wiki/UDP_flood_attack.
- “Alert (TA14-017A) UDP-based Amplification Attacks,”
- US-CERT, 2014.
- P. Froutan, “How to defend against DDoS attacks,” URL :
- http://www. computerworld. com/s/article/94014/How_to
- _defend_against_DDoS_attacks, 2004.
- N. McKeown et al., “OpenFlow: enabling innovation in
- campus networks,” ACM SIGCOMM Computer
- Communication Review, vol. 38, pp. 69-74, 2008.
- T. Peng, C. Leckie, and K. Ramamohanarao, “Survey of
- network-based defense mechanisms countering the DoS and
- DDoS problems,” ACM Computing Surveys (CSUR), vol.
- , p. 3, 2007.
- S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense
- mechanisms against distributed denial of service (DDoS)
- flooding attacks,” Communications Surveys & Tutorials,
- IEEE, vol. 15, pp. 2046-2069, 2013.
- S. Fichera, L. Galluccio, S. C. Grancagnolo, G. Morabito,
- and S. Palazzo, “OPERETTA: An OPEnflow-based
- REmedy to mitigate TCP SYNFLOOD Attacks against web
- servers,” Computer Networks, vol. 92, pp. 89-100, 2015.
- B. Hang and R. Hu, “A novel SYN Cookie method for TCP
- layer DDoS attack,” In BioMedical Information
- Engineering, 2009. FBIE 2009. International Conference on
- Future, pp. 445-448, 2009.
- J. Lemon, “Resisting SYN Flood DoS Attacks with a SYN
- Cache,” In BSDCon, pp. 89-97, 2002.
- E. Borcoci, “Software Defined Networking and
- Architectures,” In Fifth International Conference on
- Advances in Future Internet (AFIN 2013), 2013.
- A. Hakiri, A. Gokhale, P. Berthou, D. C. Schmidt, and T.
- Gayraud, “Software-defined networking: challenges and
- research opportunities for future internet,” Computer
- Networks, vol. 75, pp. 453-471, 2014.
- T. N. Subedi, K. K. Nguyen, and M. Cheriet, “OpenFlowbased
- in-network Layer-2 adaptive multipath aggregation in
- data centers,” Computer Communications, vol. 61, pp. 58-
- , 2015.
- M. Kobayashi et al., “Maturing of OpenFlow and Softwaredefined
- Networking through deployments,” Computer
- Networks, vol. 61, pp. 151-175, 2014.
- “Improved hardware limitations,”
- http://www.xinguard.com/en/content.aspx?id=70
- A. Tavakoli, “Exploring a centralized/distributed hybrid
- routing protocol for low power wireless networks and largescale
- datacenters,” University of California, Berkeley,
- “ OpenFlow,”
- http://wiki.mikrotik.com/wiki/Manual:OpenFlow.
- “ Google shared details on its production use of OpenFlow
- in its SDN network at this spring's Open Networking
- Summit,”
- http://www.networkcomputing.com/networking/insidegoogles-
- software-defined-network/a/d-id/1234201.
- “Software Defined Networking at Scale,” Research at
- Google.
- https://research.google.com/pubs/archive/42948.pdf.
- H. Solomon, “Alcatel Now Supports OpenFlow,”
- OpenStack on Switches, 2013.
- S. Sondur, “|Software Defined Networking for Beginners,”
- J. H. Jafarian, E. Al- Shaer, and Q. Duan, “Openflow
- random host mutation: transparent moving target defense
- using software defined networking,” In Proceedings of the
- first workshop on Hot topics in software defined networks,
- pp. 127-132, 2012.
- P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson,
- and G. Gu, “A security enforcement kernel for OpenFlow
- networks,” In Proceedings of the first workshop on Hot
- topics in software defined networks, pp. 121-126, 2012.
- G. Yao, J. Bi, and P. Xiao, “Source address validation
- solution with OpenFlow/NOX architecture,” In Network
- Protocols (ICNP), 2011 19th IEEE International Conference
- on, pp. 7-12, 2011.
- R. Braga, E. Mota, and A. Passito, “Lightweight DDoS
- flooding attack detection using NOX/OpenFlow,” in Local
- Computer Networks (LCN), 2010 IEEE 35th Conference
- on, pp. 408-415, 2010.
- B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, “DDoS attack
- protection in the era of cloud computing and Software-
- Defined Networking,” Computer Networks, vol. 81, pp.
- -319, 2015.
- S. H .Yeganeh, A. Tootoonchian, and Y. Ganjali, “On
- scalability of software-defined networking,”
- Communications Magazine, IEEE, vol. 51, pp. 136-141,
- A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and
- R. Sherwood, “On controller performance in softwaredefined
- networks,” in USENIX Workshop on Hot Topics in
- Management of Internet, Cloud, and Enterprise Networks
- and Services (Hot-ICE), 2012.
- G. Bojadziev and M. Bojadziev, “Fuzzy logic for business,”
- finance, and management: World Scientific Publishing Co.,
- Inc., 2007.
- K. Lee, J. Kim, K. H. Kwon, Y. Han, and S. Kim, “DDoS
- attack detection method using cluster analysis,” Expert
- Systems with Applications, vol. 34, pp. 1659-1665, 2008.
- L. Feinstein, D. Schnackenberg, R. Balupari, and D.
- Kindred, “Statistical approaches to DDoS attack detection
- and response,” In DARPA Information Survivability
- Conference and Exposition, 2003. Proceedings, pp. 303-
- , 2003.
- “Htop Documentation,” http://hisham.hm/htop.
- “Iperf Documentation,” http//:iperf.fr.
- J. Li, Y. Liu, and L. Gu, “DDoS attack detection based on
- neural network,” In Aware Computing (ISAC), 2010 2nd
- International Symposium on, pp. 196-199, 2010.
|