Detection of DDOS attack using IDS mechanism: a review

A Agarwal, R Singh, M Khari - 2022 1st International …, 2022 - ieeexplore.ieee.org
There are many problems with the Internet right now, but one of them is called “Distributed
Denial of Service attacks.” Various ways of protecting against this type of attack, which has …

Leveraging SDN for efficient anomaly detection and mitigation on legacy networks

K Giotis, G Androulidakis… - 2014 Third European …, 2014 - ieeexplore.ieee.org
In this paper, we investigate the applicability of Software-Defined Networking (SDN), and
specifically the use of the OpenFlow protocol as a means to enhance the legacy Remote …

FL-GUARD: A detection and defense system for DDoS attack in SDN

J Liu, Y Lai, S Zhang - Proceedings of the 2017 international conference …, 2017 - dl.acm.org
This paper proposed a new detection and prevention system against DDoS (Distributed
Denial of Service) attack in SDN (software defined network) architecture, FL-GUARD …

A scalable anomaly detection and mitigation architecture for legacy networks via an OpenFlow middlebox

K Giotis, G Androulidakis… - Security and …, 2016 - Wiley Online Library
In this paper, we investigate the applicability of inserting an OpenFlow middlebox to
enhance the remotely triggered black hole routing mechanism, to mitigate distributed denial …

Software to support massively parallel computing on the MasPar MP-1

P Christy - 1990 Thirty-Fifth IEEE Computer Society International …, 1990 - computer.org
In this paper, we investigate the applicability of Software-Defined Networking (SDN), and
specifically the use of the OpenFlow protocol as a means to enhance the legacy Remote …

Enhancing flow security in ryu controller through set operations

P Raghav, A Dua - 2017 3rd IEEE International Conference on …, 2017 - ieeexplore.ieee.org
Software-Define Networking (SDN) is a new generation architecture for managing and
controlling the network in cost-effective and efficient way. This architecture segregates the …

High-performance, platform-independent DDoS detection for IoT ecosystems

A Santoyo-González, C Cervelló-Pastor… - 2019 IEEE 44th …, 2019 - ieeexplore.ieee.org
Most Distributed Denial of Service (DDoS) detection and mitigation strategies for Internet of
Things (IoT) are based on a remote cloud server or purpose-built middlebox executing …

[PDF][PDF] Distributed Denial of Service Attack Detection in Application Layer Based on User Behavior.

S Bravo, D Mauricio - Webology, 2018 - webology.org
Abstract Distributed Denial of Service (DDoS) attacks are a threat to the security of red. In
recent years, these attacks have been directed especially towards the application layer. This …

Distributed, multi-level network anomaly detection for datacentre networks

M Iordache, S Jouet, AK Marnerides… - 2017 IEEE …, 2017 - ieeexplore.ieee.org
Over the past decade, numerous systems have been proposed to detect and subsequently
prevent or mitigate security vulnerabilities. However, many existing intrusion or anomaly …

VicSifter: a collaborative DDoS detection system with lightweight victim identification

F Wang, X Wang, J Su, B Xiao - 2012 IEEE 11th International …, 2012 - ieeexplore.ieee.org
Flooding based Distributed Denial of Service (DDoS) attacks can cause very serious
security problem by exhausting computing and bandwidth resources of victims. To mitigate …