|
[1] Angiulli, F., & Fassetti, F. (2007, November). Detecting distance-based outliers in streams of data. In Proceedings of the sixteenth ACM conference on Conference on information and knowledge management (pp. 811-820). ACM. [2] Borgnat, P., Dewaele, G., Fukuda, K., Abry, P., & Cho, K. (2009, April). Seven years and one day: Sketching the evolution of internet traffic. In INFOCOM 2009, IEEE (pp. 711-719). IEEE. [3] Braga, R., Mota, E., & Passito, A. (2010, October). Lightweight DDoS flooding attack detection using NOX/OpenFlow. In Local Computer Networks (LCN), 2010 IEEE 35th Conference on (pp. 408-415). IEEE. [4] Cui, Y., Yan, L., Li, S., Xing, H., Pan, W., Zhu, J., & Zheng, X. (2016). SD-Anti-DDoS: Fast and efficient DDoS defense in software-defined networks. Journal of Network and Computer Applications, 68, 65-79. [5] D-ITG. 2013. Retrieved from http://www.grid.unina.it/software/ITG/ [6] DARPA 2000 Scenario Specific dataset. Retrieved from http://www.ll.mit.edu/ideval/data/2000/LLS_DDOS_1.0.html [7] Hall, M. A. (1999). Correlation-based feature selection for machine learning. [8] Kokila, R. T., Selvi, S. T., & Govindarajan, K. (2014, December). DDoS detection and analysis in SDN-based environment using support vector machine classifier. In Advanced Computing (ICoAC), 2014 Sixth International Conference on (pp. 205-210). IEEE. [9] McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., et al. (2008). OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2), 69-74. [10] Mininet. 2013. Retrieved from http://mininet.org/ [11] Ryu. 2012. Retrieved from http://osrg.github.io/ryu/ [12] Shin, S., Yegneswaran, V., Porras, P., & Gu, G. (2013, November). Avant-guard: Scalable and vigilant switch flow management in software-defined networks. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security (pp. 413-424). ACM. [13] Wang, H., Xu, L., & Gu, G. (2015, June). Floodguard: A dos attack prevention extension in software-defined networks. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on (pp. 239-250). IEEE. [14] Wang, R., Jia, Z., & Ju, L. (2015, August). An entropy-based distributed DDoS detection mechanism in software-defined networking. In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 310-317). IEEE. [15] Xiao, P., Qu, W., Qi, H., & Li, Z. (2015). Detecting DDoS attacks against data center with correlation analysis. Computer Communications, 67, 66-74. [16] Zhang, P., Wang, H., Hu, C., & Lin, C. (2016). On Denial of Service Attacks in Software Defined Networks. IEEE Network, 30(6), 28-33. [17] Stacheldraht. 2009. Retrieved from https://staff.washington.edu/dittrich/misc/stacheldraht.analysis
|