Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions

J Singh, S Behal - Computer Science Review, 2020 - Elsevier
Many security solutions have been proposed in the past to protect Internet architecture from
a diversity of malware. However, the security of the Internet and its applications is still an …

Security and privacy issues in software-defined networking (SDN): A systematic literature review

MS Farooq, S Riaz, A Alvi - Electronics, 2023 - mdpi.com
Software-defined network (SDNs) have fundamentally changed network infrastructure by
decoupling the data plane and the control plane. This architectural shift rejuvenates the …

Learning in situ: a randomized experiment in video streaming

FY Yan, H Ayers, C Zhu, S Fouladi, J Hong… - … USENIX Symposium on …, 2020 - usenix.org
We describe the results of a randomized controlled trial of video-streaming algorithms for
bitrate selection and network prediction. Over the last year, we have streamed 38.6 years of …

Pantheon: the training ground for Internet congestion-control research

FY Yan, J Ma, GD Hill, D Raghavan… - 2018 USENIX Annual …, 2018 - usenix.org
Internet transport algorithms are foundational to the performance of network applications.
But a number of practical challenges make it difficult to evaluate new ideas and algorithms in …

Event labeling combining ensemble detectors and background knowledge

H Fanaee-T, J Gama - Progress in Artificial Intelligence, 2014 - Springer
Event labeling is the process of marking events in unlabeled data. Traditionally, this is done
by involving one or more human experts through an expensive and time-consuming task. In …

Outside the closed world: On using machine learning for network intrusion detection

R Sommer, V Paxson - 2010 IEEE symposium on security and …, 2010 - ieeexplore.ieee.org
In network intrusion detection research, one popular strategy for finding attacks is monitoring
a network's activity for anomalies: deviations from profiles of normality previously learned …

An integrated experimental environment for distributed systems and networks

B White, J Lepreau, L Stoller, R Ricci… - ACM SIGOPS …, 2002 - dl.acm.org
Three experimental environments traditionally support network and distributed systems
research: network emulators, network simulators, and live networks. The continued use of …

RouteNet-Fermi: Network modeling with graph neural networks

M Ferriol-Galmés, J Paillisse… - … ACM transactions on …, 2023 - ieeexplore.ieee.org
Network models are an essential block of modern networks. For example, they are widely
used in network planning and optimization. However, as networks increase in scale and …

Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking

R Fontugne, P Borgnat, P Abry, K Fukuda - Proceedings of the 6th …, 2010 - dl.acm.org
Evaluating anomaly detectors is a crucial task in traffic monitoring made particularly difficult
due to the lack of ground truth. The goal of the present article is to assist researchers in the …

Sizing router buffers

G Appenzeller, I Keslassy, N McKeown - ACM SIGCOMM Computer …, 2004 - dl.acm.org
All Internet routers contain buffers to hold packets during times of congestion. Today, the
size of the buffers is determined by the dynamics of TCP's congestion control algorithm. In …