2018
DOI: 10.3233/jifs-169833
|View full text |Cite
|
Sign up to set email alerts
|

Strategies for detecting and mitigating DDoS attacks in SDN: A survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 62 publications
0
5
0
1
Order By: Relevance
“…Initial specifications were published by Stanford's clean slate initiative; the open network foundation (ONF) now maintains them. The third layer of SDN is the application layer, which contains application program that communicate with the SDN controller to support the operation of forwarding process [20]. An application can aggregate information from the controller to create an abstract network view for decision-making.…”
Section: Software Defined Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Initial specifications were published by Stanford's clean slate initiative; the open network foundation (ONF) now maintains them. The third layer of SDN is the application layer, which contains application program that communicate with the SDN controller to support the operation of forwarding process [20]. An application can aggregate information from the controller to create an abstract network view for decision-making.…”
Section: Software Defined Networkmentioning
confidence: 99%
“…The impact of successful DDoS attacks is a result of the growing need for the internet. Multiple workstations launch DDoS attacks against a single server by flooding its IP address with a lot of traffic [20]. Using the internet principle, this attack attempts to disrupt the targeted system thus overwhelming legitimate users by denying them access to the system resources.…”
Section: Distributed Denial Of Service Attacksmentioning
confidence: 99%
“…The proposed entropy mechanism compared the entropy ow values of source and destination IP addresses that are detected by the SDN controller to prede ned entropy threshold values that change adaptively based on network dynamics [26]. In this regard, some of the entropy-based DDoS attack detection solutions are located at [17], [21], [22], [29][30][31][32][33].…”
Section: Introductionmentioning
confidence: 99%
“…Several review papers are available in the literature, 3,12‐29 but no one has specifically addressed distributed processing framework‐based DDoS attack detection mechanisms. In this paper, we presented a comprehensive study with the review of distributed processing frameworks‐based mechanisms, taxonomy, characterization of various distributed processing frameworks, set of evaluation metrics, discussion on available datasets, etc.…”
Section: Introductionmentioning
confidence: 99%