Improving DDoS Detection Accuracy Using Six-Sigma in SDN Environment
How to cite (IJASEIT) :
B. B. Gupta, Manoj Misra, R. C. Joshi, An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach, 2008.
Mousavi, S.M “Early Detection of DDoS Attacks in Software Defined Networks Controller”. Carleton University. Canada. https://curve.carleton.ca/system/files/etd/. 2014.
Yadav, A., Radadiya, M., Tilva, M., Rohokale, V. “SDN Control Plan Security in Cloud Computing Against DDOS Attack”. www.ijariie.com. 2016.
C. Dillon, M. Berkelaar , “OpenFlow (D)DoS Mitigation”, 2014
S. Das, G. Parulkar, N. McKeown, “Unifying Packet and Circuit Networks”, Below IP Networking (BIPN), November 2009. (S, G, & N, 2009)
Alvaro Garcia de la Villa, Tuomas Aura, Aapo Kalliola, Distributed Denial of Service Attacks defenses and OpenFlow: Implementing denial-of-service defense mechanisms with software defined networking, 2014.
Saurav Das, Guru Parulkar, Nick McKeown. Unifying Packet and Circuit Switched Networks with OpenFlow. 2009
Siamak Azodolmolky, software defined network with OpenFlow, 2013
Varun Tiwari, Rushit Parekh and Vishal Patel. A Survey on Vulnerabilities of OpenFlow Network and its Impact on SDN/OpenFlow Controller. in World Academics Journal of Engineering Sciences 2014
Wolfgang Braun, Michael Menth, Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices, 2014.
Chun-Yu Hsu, Pang-Wei Tsai, Hou-Yi Chou, Mon-Yen Luo,Chu-Sing Yang, 1A Flow-based Method to Measure Traffic Statistics in Software Defined Network, 2014.
S. Akbar Mehdi, J. Khalid, and S. Ali Khayam, Revisiting Traffic Anomaly Detection using Software-Defined Networkinging, 2011
Open Networking Foundation, OpenFlow Switch Speci_cation v1.0, 2009
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).