|
A. Tootoonchian, S. Gorbunov, Y. Ganjali, M. Casado, and R. Sherwood, “On Controller Performance in Software-defined Networks,” in Proceedings of 2nd USENIX Workshop on Hot Topics in Management of Internet Cloud and Enterprise Networks and Services, pp. 10, 2012
|
|
H. Y. Lou and J. Dou, “Research on DoS Attacks Against Control Level in OpenFlow-based SDN,” Computer Science, No. S2, pp. 341-344, 2015
|
|
M. M. Wang, J. W. Liu, J. Chen, J. Mao, and K. F. Mao, “Software Defined Networking: Security Model, Threats and Mechanism,” Journal of Software, Vol. 27, No. 4, pp. 969-992, 2016
|
|
F. Xiao, J. Q. Ma, X. S. Huang, and R. C. Wang, “DDoS Attack Detection based on KNN in Software Defined Networks,” Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), No. 1, pp. 84-88, 2015
|
|
R. Braga, E. Mota, and A. Passito, “Lightweight DDoS Flooding Attack Detection using NOX/OpenFlow,” in Proceedings of IEEE 35th Conference on Local Computer Networks, pp. 408-415, Denver, USA, October 2010
|
|
H. F. Li, “Research on DDoS Detection and Mitigation based on Software,” Thesis, East China Normal University, 2015
|
|
Q. Y. Zuo, M. Chen, X. L. Wang, and B. Liu, “Online Traffic Anomaly Detection Method for SDN,” Journal of Xidian University, No. 1, pp. 155-160, 2015
|
|
S. X. Zhang, J. Liu, Y. X. Lai, Y. He, and P. Yang, “DoS/DDoS Attack Detection and Defense System based on SDN Architectures,” Application of Electronic Technique, No. 12, pp. 113-115, 119, 2015
|
|
Y. E. Oktian, S. Lee, and H. Lee, “Mitigating Denial of Service (DoS) Attacks in OpenFlow Networks,” in Proceedings of 2014 International Conference on Information and Communication Technology Convergence, pp. 325-330, 2014
|
|
N. I. G. Dharma, M. F. Muthohar, J. D. A. Prayuda, K. Priagung, and D. Choi, “Time-based DDoS Detection and Mitigation for SDN Controller,” in Proceedings of 17th Asia-Pacific Network Operations and Management Symposium, pp. 550-553, 2015
|
|
M. Kuerban, Y. Tian, Q. Yang, Y. Jia, B. Huebert, and D. Poss, “FlowSec: DoS Attack Mitigation Strategy on SDN Controller,” in Proceedings of 2016 IEEE International Conference on Networking, Architecture and Storage, pp. 1-2, 2016
|
|
C. Y. Yang and W. Cai, “Extenics,” Science Press, Beijing, Simplified Chinese version, 2014
|
|
L. X. Li, C. Y. Yang, and H. W. Li, “Extension Strategy Generation System,” Science Press, Beijing, Simplified Chinese version, 2006
|