2011
DOI: 10.1007/978-3-642-23644-0_9
|View full text |Cite
|
Sign up to set email alerts
|

Revisiting Traffic Anomaly Detection Using Software Defined Networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
164
0
5

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 272 publications
(171 citation statements)
references
References 9 publications
2
164
0
5
Order By: Relevance
“…Perhaps we also need to shift research focus back to traffic analysis and malware detection techniques. The new paradigm of software-defined networking (SDN) may hold some promise: there is already research suggesting SDN assists significantly in detecting malwarerelated anomalies at the network level [35].…”
Section: Discussionmentioning
confidence: 99%
“…Perhaps we also need to shift research focus back to traffic analysis and malware detection techniques. The new paradigm of software-defined networking (SDN) may hold some promise: there is already research suggesting SDN assists significantly in detecting malwarerelated anomalies at the network level [35].…”
Section: Discussionmentioning
confidence: 99%
“…Shin and Gu in [18] presented a very similar design focused on SDN in the cloud. In [19], they proposed using SDN to provide intrusion detection in a small office/home. The opportunity for the improvement and simplification of system security using the SDN architecture is manifested in this body of research.…”
Section: Previous Research On Sdnmentioning
confidence: 99%
“…SnortFlow [72] is an extension to Snort with SDN capabilities that enables the detection of intrusions and malicious activities in cloud environments. Detection mechanisms are traditionally based on Machine Learning [86], Signatures [87] and Entropy [88]. Shin et al [81] group several security needs and deliver a complete framework for security implementation, sharing and composition of detection modules and mitigation in a SDN.…”
Section: Securitymentioning
confidence: 99%
“…According to Mehdi et al [87], the deployment of an anomaly detection system in the traditional network core is difficult mainly due to the low detection rate that these systems can provide with limited network information. In SDN, however, the control plane has a comprehensive view of the network, which facilitates the implementation of detection mechanisms.…”
Section: Ddos Attacksmentioning
confidence: 99%
See 1 more Smart Citation