2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS) 2017
DOI: 10.1109/icecds.2017.8390193
|View full text |Cite
|
Sign up to set email alerts
|

DDOS detection and denial using third party application in SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
11
0

Year Published

2019
2019
2025
2025

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(11 citation statements)
references
References 3 publications
0
11
0
Order By: Relevance
“…The experiment was carried out in real environment using 5 PCs that had Ubuntu 18.04 installed and applied a tree topology to the network architecture design consisting of 1 RYU controller [20], 3 Mikrotik switches [21] and 4 hosts with Core i3 4GB RAM specifications. In addition, the protocol used to connect controllers and switches is OpenFlow [4]. The topology is depicted in Figure 1.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…The experiment was carried out in real environment using 5 PCs that had Ubuntu 18.04 installed and applied a tree topology to the network architecture design consisting of 1 RYU controller [20], 3 Mikrotik switches [21] and 4 hosts with Core i3 4GB RAM specifications. In addition, the protocol used to connect controllers and switches is OpenFlow [4]. The topology is depicted in Figure 1.…”
Section: Methodsmentioning
confidence: 99%
“…In SDN there are three infrastructure layers, which in the control and data layer are connected using the southbound interface, namely OpenFlow. OpenFlow itself is one of the protocol standards in the SDN network that is used to communicate securely [4]. However, it does not prevent an occurrence of vulnerability.…”
Section: Introductionmentioning
confidence: 99%
“…The controller layer contains configurations based on rules that have been made which will be applied in the data plane. Whereas in the data plane consists of network devices such as routers and switches that are used to forward data packets [8]. SDN architecture is divided into three layers, namely the application layer, the control layer, and the infrastructure layer [4] [7].…”
Section: Introductionmentioning
confidence: 99%
“…The controller layer contains a configuration based on rules that have been created that will be applied to data fields. Whereas in the field of data consists of network devices such as routers and switches that are used to forward data packets [8]. To connect between layers using an API consisting of two types, namely the API to the north to connect the control layer with the application layer and the API to the south is used to connect the control layer with the infrastructure layer [9].…”
Section: Introductionmentioning
confidence: 99%
“…Both papers in [2] and [8] talk only about DDoS detection by using POX and ONOS controllers. In [9], a firewall will block the addresses forwarded by the server. DDoS detection method checks the incoming traffic and analyzes it.…”
mentioning
confidence: 99%