Handbook of Computer Networks and Cyber Security 2020
DOI: 10.1007/978-3-030-22277-2_15
|View full text |Cite
|
Sign up to set email alerts
|

Survey on DDoS Attack Techniques and Solutions in Software-Defined Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 23 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…Subsequently, it performs suitable countermeasures. Simulation outcomes represent that the introduced defending method might effectively deal with DDoS attacks in downstream servers and SDN [7]. The DDoS attack detection in SDN is shown in Fig.…”
Section: Introductionmentioning
confidence: 90%
“…Subsequently, it performs suitable countermeasures. Simulation outcomes represent that the introduced defending method might effectively deal with DDoS attacks in downstream servers and SDN [7]. The DDoS attack detection in SDN is shown in Fig.…”
Section: Introductionmentioning
confidence: 90%
“…Since then, botnets have become one of the most significant threats to the internet especially in web-based business transactions. DDoS attacks aim to interrupt the supply of services by crippling network and storage capacity of the authorized users [13]- [15]. The main challenge in network security is how to ensure safety from the attacks; moreover, several types of attacks prevent legitimate users from using the services provided to them, and these types of attacks are called DDoS.…”
Section: A Brief History Of Ddos Attacksmentioning
confidence: 99%
“…In addition, even without detecting DoS attack the prevention scenario can also stop the user from accessing the cloud resources. The prevention techniques may install different protection components on all the cloud sites such as the user system, the network controllers, the internet routers, and track the attacker site [14].…”
Section: Defense Against Ddos Attacksmentioning
confidence: 99%
“…There are also other classifications of the DDoS attacks on the cloud and the detection or prevention techniques used for these types of attacks as summarized below [14].…”
Section: After the Ddos Attackmentioning
confidence: 99%