GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017
DOI: 10.1109/glocom.2017.8254079
|View full text |Cite
|
Sign up to set email alerts
|

SDN-Based DDoS Attack Detection with Cross-Plane Collaboration and Lightweight Flow Monitoring

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
17
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(18 citation statements)
references
References 9 publications
0
17
0
1
Order By: Relevance
“…Therefore, in this section, we introduce how we implement OverWatch into a typical SDN controller (Ryu controller [33]) and FPGA-based OpenFlow switches [18]. To describe the workflow of our OverWatch prototype clearly, we divide the working process of OverWatch into two phases: detection phase and reaction phase.…”
Section: Detection Phase Of Overwatchmentioning
confidence: 99%
“…Therefore, in this section, we introduce how we implement OverWatch into a typical SDN controller (Ryu controller [33]) and FPGA-based OpenFlow switches [18]. To describe the workflow of our OverWatch prototype clearly, we divide the working process of OverWatch into two phases: detection phase and reaction phase.…”
Section: Detection Phase Of Overwatchmentioning
confidence: 99%
“…In [7], Sufian Hameed et al present a new collaborative DDoS mitigation with a new protocol that allows the SDN controller lying in different autonomous systems to securely communicate and transfer attack information with each other. In [13], the authors present an SDN-based DDoS attack detection framework which performs a two-stage granularity filtering procedure between coarse-grained detection data plane and fine-grained detection control plane for abnormal flows. It leverages the capacity of the SDN-enabled switch and controller.…”
Section: Related Workmentioning
confidence: 99%
“…This makes SDN architecture flexible as the network administrator can use programming languages such as Python, Java, or others to add new functionality in the controller, including security functions. The deployment of SDN in network security has gained special attention recently [4][5][6][7][8][9][10][11][12][13][14][15][16]. Therefore, in this work, we make use of the SDN technology in oder to mitigate DDoS attacks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Obviously, DDoS attack can lead to legal users no longer being able to visit the services provided by the attacked server. To avoid being attacked, the DDoS detection has always been a hot research field [24]. Taking DDoS detection as an example, this section makes an illustration for the monitoring request definition in FlexMonitor.…”
Section: Examplementioning
confidence: 99%