2017
DOI: 10.1007/s13369-017-2414-5
|View full text |Cite
|
Sign up to set email alerts
|

DDoS Attack Detection and Mitigation Using SDN: Methods, Practices, and Solutions

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
89
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 304 publications
(107 citation statements)
references
References 65 publications
0
89
0
1
Order By: Relevance
“…By adapting SDN's programmability and its dynamic nature, adaptive distributed DoS (DDoS) protection mechanisms and intrusion detection systems can be implemented to improved SDN‐IoT structure. Thus, this helps in improving security aspects of IoT …”
Section: Software‐defined Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…By adapting SDN's programmability and its dynamic nature, adaptive distributed DoS (DDoS) protection mechanisms and intrusion detection systems can be implemented to improved SDN‐IoT structure. Thus, this helps in improving security aspects of IoT …”
Section: Software‐defined Networkmentioning
confidence: 99%
“…Thus, this helps in improving security aspects of IoT. 10 SDN structure can be divided into three layers as shown in Figure 3. This is similar to the three-layered architecture of IoT.…”
Section: Software-defined Networkmentioning
confidence: 99%
“…Some of the proposed literatures related to our proposed model are reviewed in this section. Methods, practices and solution to the DDoS attack detection and mitigation on SDN [11] in this proposal author clarify solutions and findings for detection and mitigation. They propose and present a proactive framework which is SDN based defense mechanism.…”
Section: Artificial Neural Network (Ann) Based Ddos Attack Detection mentioning
confidence: 99%
“…To mitigate these risks, the cloud providers adopted many methods and techniques [11], [12] that can be used to prevent, detect and respond to attacks against the cloud. But in the other hand, as cloud strengthens its defense, the attackers find more creative and sophisticated ways targeting the cloud by using or creating loopholes in the cloud defense system.…”
Section: Figure 2 a Typical Architecture Of Ddos/edos Attacksmentioning
confidence: 99%