2015 International Conference on Advanced Technologies for Communications (ATC) 2015
DOI: 10.1109/atc.2015.7388340
|View full text |Cite
|
Sign up to set email alerts
|

A multi-criteria-based DDoS-attack prevention solution using software defined networking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 34 publications
(11 citation statements)
references
References 9 publications
0
11
0
Order By: Relevance
“…In order to improve the scalability of native OpenFlow, a new method combining OpenFlow and sFlow has been proposed in [16] for an effective and scalable anomaly detection and mitigation mechanism in an SDN environment. Trung et al [17] combine hard thresholds of detection and fuzzy inference system (FIS) to detect risk of DDoS attacks based on the real traffic characteristic under normal and attack states. Three features are chosen for detecting the attack: Distribution of Interarrival Time, Distribution of packet quantity per flow and Flow quantity to a server.…”
Section: Previous Workmentioning
confidence: 99%
“…In order to improve the scalability of native OpenFlow, a new method combining OpenFlow and sFlow has been proposed in [16] for an effective and scalable anomaly detection and mitigation mechanism in an SDN environment. Trung et al [17] combine hard thresholds of detection and fuzzy inference system (FIS) to detect risk of DDoS attacks based on the real traffic characteristic under normal and attack states. Three features are chosen for detecting the attack: Distribution of Interarrival Time, Distribution of packet quantity per flow and Flow quantity to a server.…”
Section: Previous Workmentioning
confidence: 99%
“…The entropy will drop dramatically when any attack happens. Trung et al [23] combined hard thresholds of detection and a fuzzy inference system to detect the risk of DDoS attacks based on the real traffic characteristics (Distribution of Inter-arrival Time, Distribution of packet quantity per flow and Flow quantity to a server) under normal and attack states.…”
Section: Related Workmentioning
confidence: 99%
“…An anomaly-based scheme can be found in [11] that uses Fuzzy Interference System to detect anomalies based on traffic pattern. This solution can detect if an attack happens no matter what type of attack is it.…”
Section: Related Workmentioning
confidence: 99%