2017
DOI: 10.1007/978-3-319-54978-1_19
|View full text |Cite
|
Sign up to set email alerts
|

A Software-Defined Networking (SDN) Approach to Mitigating DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 16 publications
(7 citation statements)
references
References 30 publications
0
7
0
Order By: Relevance
“…Also, Jazi et al [63] proposed a technique for detecting HTTP-based DoS attacks at the application layers of web servers using sampling techniques, while Behal et al [64] reviews existing strategies and methods for characterising and isolating Distributed Denial of Service (DDoS) attacks, even in the midst of flash events. Lonea [65] proposed a quantitative method for detecting DDoS attacks in cloud environments by analysing intrusion detection system alerts, while D'Cruze [66] proposed an efficient and flexible Software-Defined Networking (SDN) solution to mitigate DDoS attacks on Internet Service Provider (ISP) networks. Furthermore, machine learning-based detection techniques have also been proposed for the detection of DDoS attacks that are widely known to feature botnets as the primary threat agent.…”
Section: Botnet Countermeasuresmentioning
confidence: 99%
“…Also, Jazi et al [63] proposed a technique for detecting HTTP-based DoS attacks at the application layers of web servers using sampling techniques, while Behal et al [64] reviews existing strategies and methods for characterising and isolating Distributed Denial of Service (DDoS) attacks, even in the midst of flash events. Lonea [65] proposed a quantitative method for detecting DDoS attacks in cloud environments by analysing intrusion detection system alerts, while D'Cruze [66] proposed an efficient and flexible Software-Defined Networking (SDN) solution to mitigate DDoS attacks on Internet Service Provider (ISP) networks. Furthermore, machine learning-based detection techniques have also been proposed for the detection of DDoS attacks that are widely known to feature botnets as the primary threat agent.…”
Section: Botnet Countermeasuresmentioning
confidence: 99%
“…A classic example of this type of attack is the Ping of Death [11]. With the rise of effective defense techniques against this type of attack, the attackers have redefined it into DDoS which is capable of blocking the resources of the target machine such as the connection link [12], applications [13,14] and/or hardware resources [15]. DDoS attacks aim at making the old one-to-one attack into a new and more elaborate many-to-one attack, recruiting as many infected computers as possible and creating a botnet (robot network) in order to send a huge amount of data traffic towards the target machine.…”
Section: Introductionmentioning
confidence: 99%
“…Trojan horses, backdoors, or worms are usually used to recruit zombies [8], [9]. The second step involves the attacker use these zombies to activate flooding attacks by exhausting a server or network resources including bandwidth, memory, router's processing capacities, disk/database [6]. The DDoS attack disrupts the attacked system and the services that are provided by the system to legitimate users.…”
Section: Introductionmentioning
confidence: 99%