2016 IEEE NetSoft Conference and Workshops (NetSoft) 2016
DOI: 10.1109/netsoft.2016.7502489
|View full text |Cite
|
Sign up to set email alerts
|

Interactive analysis of SDN-driven defence against distributed denial of service attacks

Abstract: You will be contacted as soon as possible.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(15 citation statements)
references
References 9 publications
0
12
0
Order By: Relevance
“…Finally, we found that the approach proposed by Koning et al 76 can be considered interdependent, since it offers a platform for orchestrating external cloud resources (OpenStack), SDNs (OpenFlow), and network circuits. Daemons are used to monitor and control external nodes and maintain secure connections between nodes and the network controller over TLS secured connections.…”
Section: Cooperation Degreementioning
confidence: 99%
See 3 more Smart Citations
“…Finally, we found that the approach proposed by Koning et al 76 can be considered interdependent, since it offers a platform for orchestrating external cloud resources (OpenStack), SDNs (OpenFlow), and network circuits. Daemons are used to monitor and control external nodes and maintain secure connections between nodes and the network controller over TLS secured connections.…”
Section: Cooperation Degreementioning
confidence: 99%
“…Finally, we found that the approach proposed by Koning et al 76 . can be considered interdependent, since it offers a platform for orchestrating external cloud resources (OpenStack), SDNs (OpenFlow), and network circuits.…”
Section: Solutions Focused On the Application Planementioning
confidence: 99%
See 2 more Smart Citations
“…Though the classifier in [87] is trained only for the DNS amplification attack, both DNS and NTP amplification attacks are blocked with great accuracy. Koning et al [103] concludes that in the SDN architecture it is possible to achieve high effectiveness of response by carefully choosing a relatively minor number of actions.…”
Section: ) Network Attacks Detectionmentioning
confidence: 99%