DDoS attack protection in the era of cloud computing and Software-Defined Networking
Citations
340 citations
270 citations
253 citations
206 citations
199 citations
References
9,138 citations
"DDoS attack protection in the era o..." refers background in this paper
...The network controller is in charge of the entire network through a vendor-independent interface such as OpenFlow [12], which defines the low-level packet forwarding behaviors in the data plane....
[...]
8,059 citations
"DDoS attack protection in the era o..." refers background in this paper
...Considering the fact that network traffic is usually low dimension data (the number of cases is far greater than the number of features), the Chow–Liu algorithm [14] is a good choice because it surpasses other algorithms when learning from low dimension data [15]....
[...]
6,597 citations
"DDoS attack protection in the era o..." refers methods in this paper
...We exercise feature selection [13] on a large feature set....
[...]
3,186 citations
2,854 citations
"DDoS attack protection in the era o..." refers background in this paper
...Considering the fact that network traffic is usually low dimension data (the number of cases is far greater than the number of features), the Chow–Liu algorithm [14] is a good choice because it surpasses other algorithms when learning from low dimension data [15]....
[...]