2022
DOI: 10.1007/978-3-031-11633-9_16
|View full text |Cite
|
Sign up to set email alerts
|

Emulation and Analysis of Software-Defined Networks for the Detection of DDoS Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 20 publications
0
1
0
Order By: Relevance
“…They are not well suited to counteract DDoS attacks. When the sFlow collector (Prasad et al, 2022) identifies certain traffic as an attacker, the OpenFlow controller modifies the rule in the OpenFlow table. Therefore, we can immediately detect and prevent flooding attacks by combining aggregate flow using sFlow and blocking traffic using OpenFlow.…”
Section: Methodsmentioning
confidence: 99%
“…They are not well suited to counteract DDoS attacks. When the sFlow collector (Prasad et al, 2022) identifies certain traffic as an attacker, the OpenFlow controller modifies the rule in the OpenFlow table. Therefore, we can immediately detect and prevent flooding attacks by combining aggregate flow using sFlow and blocking traffic using OpenFlow.…”
Section: Methodsmentioning
confidence: 99%