REFERENCES
Ahmed, M. E., & Kim, H (2016). DDoS Attack Mitigation in Internet of Things
Using Software Defined Networking.
Alaidaros, H., Mahmuddin, M., & Al-Mazari, A. (2011). An overview of flow-
based and packet-based intrusion detection performance in high speed networks.
Ali, S. T., Sivaraman, V., Radford, A., & Jha, S. (2015). A survey of securing
networks using software defined networking. IEEE transactions on
reliability, 64(3), 1086-1097.
Bawany, N. Z., Shamsi, J. A., & Salah, K. (2017). DDoS attack detection and
mitigation using SDN: Methods, practices, and solutions. Arabian Journal for
Science and Engineering, 42(2), 425-441.
Behal, S., & Kumar, K. (2016). Trends in validation of ddos research. Procedia
Computer Science, 85, 7-15.
Bhattacharyya, D. K., & Kalita, J. K. (2016). DDoS attacks: evolution, detection,
prevention, reaction, and tolerance. Chapman and Hall/CRC.
Bhushan, K., & Gupta, B. B. (2018, February). Detecting DDoS Attack using
Software Defined Network (SDN) in Cloud Computing Environment. In 2018 5th
International Conference on Signal Processing and Integrated Networks
(SPIN) (pp. 872-877). IEEE.
Braga, R., Mota, E., & Passito, A. (2010, October). Lightweight DDoS flooding
attack detection using NOX/OpenFlow. In Local Computer Networks (LCN),
2010 IEEE 35th Conference on (pp. 408-415). IEEE.
Brian, L. MiniEdit. (Online posting). . Accessed: 27 April 2016.
Cvitić, I., Peraković, D., Periša, M., & Musa, M. (2017, November). Network
parameters applicable in detection of infrastructure level DDoS attacks. In 2017
25th Telecommunication Forum (TELFOR) (pp. 1-4). IEEE.
Chin, T., Mountrouidou, X., Li, X., & Xiong, K. (2015, June). Selective packet
inspection to detect DoS flooding using software defined networking (SDN).
In Distributed Computing Systems Workshops (ICDCSW), 2015 IEEE 35th
International Conference on (pp. 95-99). IEEE.
Chung, C. J., Khatkar, P., Xing, T., Lee, J., & Huang, D. (2013). NICE: Network
intrusion detection and countermeasure selection in virtual network
systems. IEEE transactions on dependable and secure computing, 10(4), 198-211.
Cui, Y., Yan, L., Li, S., Xing, H., Pan, W., Zhu, J., & Zheng, X. (2016). SD-Anti-
DDoS: Fast and efficient DDoS defense in software-defined networks. Journal of
Network and Computer Applications, 68, 65-79.
Davis, J. P., Eisenhardt, K. M., & Bingham, C. B. (2007). Developing theory
through simulation methods. Academy of Management Review, 32(2), 480-499.
Dharma, N. G., Muthohar, M. F., Prayuda, J. A., Priagung, K., & Choi, D. (2015,
August). Time-based DDoS detection and mitigation for SDN controller. In 2015
17th Asia-Pacific Network Operations and Management Symposium
(APNOMS) (pp. 550-553). IEEE.
Dillon, C., & Berkelaar, M. (2014). OpenFlow (D) DoS Mitigation. Technical
report (February 2014), http://www. delaat. net/rp/2013-2014/p42/report. pdf.
Dong, P., Du, X., Zhang, H., & Xu, T. (2016, May). A detection method for a
novel DDoS attack against SDN controllers by vast new low-traffic flows. In
2016 IEEE International Conference on Communications (ICC) (pp. 1-6). IEEE.
Doria, A., Salim, J. H., Haas, R., Khosravi, H., Wang, W., Dong, L., & Halpern,
J. (2010). Forwarding and control element separation (ForCES) protocol
specification (No. RFC 5810).
Dotcenko, S., Vladyko, A., & Letenko, I. (2014, February). A fuzzy logic-based
information security management for software-defined networks. In Advanced
Communication Technology (ICACT), 2014 16th International Conference on
(pp. 167-171). IEEE.
Feng, Y., Guo, R., Wang, D., & Zhang, B. (2009, August). Research on the active
DDoS filtering algorithm based on IP flow. In Natural Computation, 2009.
ICNC'09. Fifth International Conference on (Vol. 4, pp. 628-632). IEEE.
Fernandez, M. (2013, January). Evaluating OpenFlow controller paradigms.
In ICN 2013, The Twelfth International Conference on Networks (pp. 151-157).
Fundation, O. N. (2012). Software-defined networking: The new norm for
networks. ONF White Paper Available at:
https://www.opennetworking.org/images/stories/downloads/sdnresources/white-
papers/wp-sdn-newnorm.pdf. Accessed: 22/11/2015.
Fu, M. C., Glover, F. W., & April, J. (2005, December). Simulation optimization:
a review, new developments, and applications. In Proceedings of the Winter
Simulation Conference, 2005. (pp. 13-pp). IEEE.
Gao, M., Zhang, K., & Lu, J. (2006, April). Efficient packet matching for gigabit
network intrusion detection using TCAMs. In Advanced Information Networking
and Applications, 2006. AINA 2006. 20th International Conference on (Vol. 1,
pp. 6-pp). IEEE.
Gao, S., & Chen, W. (2016). A partition-based random search for stochastic
constrained optimization via simulation. IEEE Transactions on Automatic
Control, 62(2), 740-752.
Giotis, K., Argyropoulos, C., Androulidakis, G., Kalogeras, D., & Maglaris, V.
(2014). Combining OpenFlow and sFlow for an effective and scalable anomaly
detection and mitigation mechanism on SDN environments. Computer
Networks, 62, 122-136.
Gu, Y., McCallum, A., & Towsley, D. (2005, October). Detecting anomalies in
network traffic using maximum entropy estimation. In Proceedings of the 5th
ACM SIGCOMM conference on Internet Measurement (pp. 32-32). USENIX
Association.
Guha, A., Reitblatt, M., & Foster, N. (2013, June). Machine-verified network
controllers. In ACM SIGPLAN Notices (Vol. 48, No. 6, pp. 483-494). ACM.
Hoque, N., Bhattacharyya, D. K., & Kalita, J. K. (2015). Botnet in DDoS attacks:
trends and challenges. IEEE Communications Surveys & Tutorials, 17(4), 2242-
2270.
Hu, F. (2014). Network Innovation through OpenFlow and SDN: Principles and
Design. CRC Press.
Ince, N., & Bragg, A. (Eds.). (2007). Recent advances in modeling and simulation
tools for communication networks and services. Springer Science & Business
Media.
Ivanov, D. (2017). Simulation-based ripple effect modelling in the supply chain.
International Journal of Production Research, 55(7), 2083-2101.
Jain, R. (2015). Art of Computer Systems Performance Analysis: Techniques for
Experimental Design Measurements Simulation and Modeling (2nd ed.).
NewYork: Wiley.
Jain, S., Kumar, A., Mandal, S., Ong, J., Poutievski, L., Singh, A., & Zolla, J.
(2013, August). B4: Experience with a globally-deployed software defined WAN.
In ACM SIGCOMM Computer Communication Review (Vol. 43, No. 4, pp. 3-
14). ACM.
Javed, M., Ashfaq, A. B., Shafiq, M. Z., & Khayam, S. A. (2009, September). On
the Inefficient Use of Entropy for Anomaly Detection. In RAID (pp. 369-370).
Katta, N., Alipourfard, O., Rexford, J., & Walker, D. (2016, March). Cacheflow:
Dependency-aware rule-caching for software-defined networks. In Proceedings of
the Symposium on SDN Research(p. 6). ACM.
Keshav, S. (1991). Congestion Control in Computer Networks PhD Thesis. UC
Berkeley TR-654.
Kia, M. (2015). Early Detection and Mitigation of DDoS Attacks In Software
Defined Networks(Doctoral dissertation, Ryerson University).
Kim, J., Firoozjaei, M. D., Jeong, J. P., Kim, H., & Park, J. S. (2015, October).
SDN-based security services using interface to network security functions.
In Information and Communication Technology Convergence (ICTC), 2015
International Conference on (pp. 526-529). IEEE.
Kim, M. S., Kong, H. J., Hong, S. C., Chung, S. H., & Hong, J. W. (2004, April).
A flow-based method for abnormal network traffic detection. In Network
operations and management symposium, 2004. NOMS 2004. IEEE/IFIP (Vol. 1,
pp. 599-612). IEEE.
Lai, H., Cai, S., Huang, H., Xie, J., & Li, H. (2004, June). A parallel intrusion
detection system for high-speed networks. In International Conference on Applied
Cryptography and Network Security(pp. 439-451). Springer, Berlin, Heidelberg.
Lakhina, A., Crovella, M., & Diot, C. (2005, August). Mining using traffic
feature distributions. In ACM SIGCOMM Computer Communication
Review (Vol. 35, No. 4, pp. 217-228). ACM.
Law, A. & Kelton, W. (1991). Simulation modeling and analysis (2nd ed.).
McGraw-Hill.
Law, A. (2007). McGraw-Hill series in industrial engineering and management
science. Simulation modeling and analysis, 19, 768-768.
Lee, D. (2015). Improving detection capability of flow-based IDS in SDN.
Lim, S., Ha, J., Kim, H., Kim, Y., & Yang, S. (2014, July). A SDN-oriented
DDoS blocking scheme for botnet-based attacks. In Ubiquitous and Future
Networks (ICUFN), 2014 Sixth International Conf on (pp. 63-68). IEEE.
Mahoney, M. V. (2003, March). Network traffic anomaly detection based on
packet bytes. In Proceedings of the 2003 ACM symposium on Applied computing
(pp. 346-350). ACM.
Malik, M. S., Montanari, M., Huh, J. H., Bobba, R. B., & Campbell, R. H. (2013,
June). Towards SDN enabled network control delegation in clouds.
In Dependable Systems and Networks (DSN), 2013 43rd Annual IEEE/IFIP
International Conference on (pp. 1-6). IEEE.L.
McCauley, M. (2014). NOXRepo. Online: http://www. noxrepo. org.
Meena, D. L., & Jadon, R. S. (2014). Distributed Denial of Service Attacks and
Their Suggested Defense Remedial Approaches. International Journal, 2(4).
Mehdi, S. A., Khalid, J., & Khayam, S. A. (2011, September). Revisiting traffic
anomaly detection using software defined networking. In International workshop
on recent advances in intrusion detection (pp. 161-180). Springer, Berlin,
Heidelberg.
Mininet. Vers. 2.2.1. Accessed: 25 February
2016.
Mousavi, S. M. (2014). Early detection of DDoS attacks in software defined
networks controller(Doctoral dissertation, Carleton University).
Mukherjee, S. (2014). Analytical modeling of heterogeneous cellular networks.
Cambridge University Press.
Myint Oo, M., Kamolphiwong, S., Kamolphiwong, T., & Vasupongayya, S.
(2019). Advanced Support Vector Machine-(ASVM-) Based Detection for
Distributed Denial of Service (DDoS) Attack on Software Defined Networking
(SDN). Journal of Computer Networks and Communications, 2019.
Nishtha & M. Sood, "Software defined network - architectures," PDGC- 2014,
2014.
Niyaz, Q., Sun, W., & Javaid, A. Y. (2017). A deep learning based DDoS
detection system in software-defined networking (SDN). arXiv preprint
arXiv:1611.07400.
Noble, G., & Sujitha, M. (2015). Flow Based Solutions for DoS and DDoS Attack
Detection. International Journal of Advanced Research in Computer Engineering
& Technology (IJARCET) Volume 4 Issue 3, March 2015.
Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T.
(2014). A survey of software-defined networking: Past, present, and future of
programmable networks. IEEE Communications Surveys & Tutorials, 16(3),
1617-1634.
Paroutis, S., Bennett, M., & Heracleous, L. (2014). A strategic view on smart city
technology: The case of IBM Smarter Cities during a recession. Technological
Forecasting and Social Change, 89, 262-272.
McCauley, M. POX Controller (Online posting).
Accessed: 13 March
2016.
Prete, L. R., Schweitzer, C. M., Shinoda, A. A., & de Oliveira, R. L. S. (2014,
June). Simulation in an SDN network scenario using the POX Controller.
In Communications and Computing (COLCOM), 2014 IEEE Colombian
Conference on (pp. 1-6). IEEE.
Saboor, A., & Aslam, B. (2015, January). Analyses of flow based techniques to
detect distributed denial of service attacks. In Applied Sciences and Technology
(IBCAST), 2015 12th International Bhurban Conference on (pp. 354-362). IEEE.
Sahoo, K. S., Puthal, D., Tiwary, M., Rodrigues, J. J., Sahoo, B., & Dash, R.
(2018). An early detection of low rate DDoS attack to SDN based data center
networks using information distance metrics, Future Generation Computer
Systems, https://doi.org/10.1016/j.
Schmidt, D., Suriadi, S., Tickle, A., Clark, A., Mohay, G., Ahmed, E., & Mackie,
J. (2010). A distributed denial of service testbed. In What Kind of Information
Society? Governance, Virtuality, Surveillance, Sustainability, Resilience (pp. 338-
349). Springer, Berlin, Heidelberg.
Schechter, S. E., Jung, J., & Berger, A. W. (2004, September). Fast detection of
scanning worm infections. In International Workshop on Recent Advances in
Intrusion Detection (pp. 59-81). Springer, Berlin, Heidelberg.
Securelist. 2019. “DDOS attacks in Q1 2019”. (Online posting). <
https://securelist.com/ddos-report-q1-2019/90792/>. Accessed: 25 May 2019.
Scott-Hayward, S., O'Callaghan, G., & Sezer, S. (2013, November). SDN
security: A survey. In Future Networks and Services (SDN4FNS), 2013 IEEE
SDN For (pp. 1-7). IEEE.
Shin, S., & Gu, G. (2013, August). Attacking software-defined networks: A first
feasibility study. In Proceedings of the second ACM SIGCOMM workshop on
Hot topics in software defined networking (pp. 165-166). ACM.
Specification, O. S. (2009). Version 1.0. 0 (Wire Protocol 0x01). Open
Networking Foundation.
Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., & Stiller, B. (2010).
An overview of ip flow-based intrusion detection. IEEE Communications Surveys
and Tutorials, 12(3), 343-356.
Tang, T. A., Mhamdi, L., McLernon, D., Zaidi, S. A. R., & Ghogho, M. (2016,
October).
Deep learning approach for network intrusion detection in software defined
networking. In Wireless Networks and Mobile Communications (WINCOM),
2016 International Conference on (pp. 258-263). IEEE.
Version, O. S. S. 1.5. 1 (Protocol version 0x06), December, 2014.
Vykopal, J. (2013). Flow-based brute-force attack detection in large and high-
speed networks (Doctoral dissertation, Masarykova univerzita, Fakulta
informatiky).
Oracle Corporation. VirtualBox. Vers. 5.2.
https://www.virtualbox.org/wiki/Downloads>. Accessed: 3 February 2016.
Wang, A., Guo, Y., Hao, F., Lakshman, T. V., & Chen, S. (2014, December).
Scotch: Elastically scaling up sdn control-plane using vswitch based overlay.
In Proceedings of the 10th ACM International on Conference on emerging
Networking Experiments and Technologies (pp. 403-414). ACM.
Wang, R., Jia, Z., & Ju, L. (2015, August). An entropy-based distributed DDoS
detection mechanism in software-defined networking.
In Trustcom/BigDataSE/ISPA, 2015 IEEE (Vol. 1, pp. 310-317). IEEE.
Williamson, M. M. (2002). Throttling viruses: Restricting propagation to defeat
malicious mobile code. In Computer Security Applications Conference, 2002.
Proceedings. 18th Annual (pp. 61-68). IEEE.
Xiang, Y., Li, K., & Zhou, W. (2011). Low-rate DDoS attacks detection and
traceback by using new information metrics. IEEE transactions on information
forensics and security, 6(2), 426-437.
Xing, T., Huang, D., Xu, L., Chung, C. J., & Khatkar, P. (2013, March).
Snortflow: A openflow-based intrusion prevention system in cloud environment.
In Research and Educational Experiment Workshop (GREE), 2013 Second
GENI (pp. 89-92). IEEE.
XU, X., YU, H., & YANG, K. (2017). DDoS Attack in Software Defined
Networks: A Survey. ZTE COMMUNICATIONS, 15(3).
Yadav, V. K., Trivedi, M. C., & Mehtre, B. M. (2016). DDA: an approach to
handle DDoS (Ping flood) attack. In Proceedings of International Conference on
ICT for Sustainable Development(pp. 11-23). Springer, Singapore.
Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2016). Software-defined networking
(SDN) and distributed denial of service (DDoS) attacks in cloud computing
environments: A survey, some research issues, and challenges. IEEE
Communications Surveys & Tutorials, 18(1), 602-622.
Yavanoglu, O., & Aydos, M. (2017, December). A review on cyber security
datasets for machine learning algorithms. In 2017 IEEE International Conference
on Big Data (Big Data) (pp. 2186-2193). IEEE.
YuHunag, C., MinChi, T., YaoTing, C., YuChieh, C., & YanRen, C. (2010,
November). A novel design for future on-demand service and security.
In Communication Technology (ICCT), 2010 12th IEEE International Conference
on (pp. 385-388). IEEE.
Yu, S., Zhou, W., Doss, R., & Jia, W. (2012). Traceback of DDoS attacks using
entropy variations. IEEE transactions on parallel and distributed systems , vol. 23,
no. 3, pp. 412–425, 2012.
Zhou, L., Liao, M., Yuan, C., & Zhang, H. (2017). Low-rate DDoS attack
detection using expectation of packet size. Security and Communication
Networks, 2017.