2021
DOI: 10.1016/j.comnet.2021.107813
|View full text |Cite
|
Sign up to set email alerts
|

SD-WAN Flood Tracer: Tracking the entry points of DDoS attack flows in WAN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 7 publications
0
7
0
Order By: Relevance
“…Sahay et al [31] addressed the problem of traceability tracing in a multicontroller scenario by dealing with traffic identification in ISP networks. Dayal and Srivastava [16] solved the problem of cross-domain and intradomain traceability for SD-WAN scenarios.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Sahay et al [31] addressed the problem of traceability tracing in a multicontroller scenario by dealing with traffic identification in ISP networks. Dayal and Srivastava [16] solved the problem of cross-domain and intradomain traceability for SD-WAN scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…e unique information architecture provides scholars with a new idea of IP traceback. SDNbased logging traceback schemes [15][16][17] utilize the control plane to centralize DDoS attacks and identify the attackers. However, there is a key challenge in this scenario, where the existing traceability tasks are overly focused on the control plane.…”
Section: Introductionmentioning
confidence: 99%
“…Dayal et al [6] propose a trigger-based traceback mechanism called SD-WAN Flood Tracer to facilitate tracing attack sources in Software-Defined Wide Area Network (SD-WAN). The proposed solution can be used to monitor internal traces in the vicinity of a single controller and external traces in the vicinity of another controller.…”
Section: Network Securitymentioning
confidence: 99%
“…Traceback is a mitigation technique for determining the packet source or flow by tracing the path taken by it. One such work by Dayal and Srivastava 10 proposed the mitigation of DDoS attack using a traceback mechanism in SDN wide area networks using floodlight controller. Their work comprises two traceback mechanisms: internal and external, to trace the attack sources and prevent the attack, thereby protecting the genuine network.…”
Section: Introductionmentioning
confidence: 99%