Strategies for detecting and mitigating DDoS attacks in SDN: A survey
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Joelle, Misenga Mumpela | - |
dc.contributor.author | Park, Young-Hoon | - |
dc.date.available | 2021-02-22T07:46:18Z | - |
dc.date.issued | 2018-12 | - |
dc.identifier.issn | 1064-1246 | - |
dc.identifier.issn | 1875-8967 | - |
dc.identifier.uri | https://scholarworks.sookmyung.ac.kr/handle/2020.sw.sookmyung/4137 | - |
dc.description.abstract | Software Defined Networking (SDN) is an emerging paradigm, which brings the network innovation and attracts both the industries and researchers. SDNis a programmable network model that separates the control logic from the forwarding plane. The centralize control plane takes care of all networking resources. The attackers target the SDN controller, to paralyze the logic plane that is considered as the brain of the network which provides a lot of benefits. However, due to the characteristics the control plane becomes the attractive target of security attacks for the adversaries. One of the most known threats is Distributed Denial-of-Service (DDoS) attacks with the goal to exhausting network resources by sending heavy traffic to them, causing network congestion. Since SDN was proposed, DDoS attack has become a popular research field in SDN security and many researchers have been presented DDoS attacks detection, prevention and mitigation solutions in SDN environment using different methods. This paper surveys the previous researches in DDoS attacks detection and mitigation based methods available in SDN environment. | - |
dc.format.extent | 13 | - |
dc.language | 영어 | - |
dc.language.iso | ENG | - |
dc.publisher | IOS PRESS | - |
dc.title | Strategies for detecting and mitigating DDoS attacks in SDN: A survey | - |
dc.type | Article | - |
dc.publisher.location | 네델란드 | - |
dc.identifier.doi | 10.3233/JIFS-169833 | - |
dc.identifier.scopusid | 2-s2.0-85059443122 | - |
dc.identifier.wosid | 000459214900012 | - |
dc.identifier.bibliographicCitation | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, v.35, no.6, pp 5913 - 5925 | - |
dc.citation.title | JOURNAL OF INTELLIGENT & FUZZY SYSTEMS | - |
dc.citation.volume | 35 | - |
dc.citation.number | 6 | - |
dc.citation.startPage | 5913 | - |
dc.citation.endPage | 5925 | - |
dc.type.docType | Article; Proceedings Paper | - |
dc.description.isOpenAccess | N | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Artificial Intelligence | - |
dc.subject.keywordPlus | SOFTWARE-DEFINED NETWORKING | - |
dc.subject.keywordPlus | SECURITY | - |
dc.subject.keywordAuthor | SDN | - |
dc.subject.keywordAuthor | DDoS attacks | - |
dc.subject.keywordAuthor | detection and mitigation methods | - |
dc.identifier.url | https://content.iospress.com/articles/journal-of-intelligent-and-fuzzy-systems/ifs169833 | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
Sookmyung Women's University. Cheongpa-ro 47-gil 100 (Cheongpa-dong 2ga), Yongsan-gu, Seoul, 04310, Korea02-710-9127
Copyright©Sookmyung Women's University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.