Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges
Citations
436 citations
Cites background from "Software-Defined Networking (SDN) a..."
...[50] have researched on Distributed Denial of Service (DDoS) attacks in SDN-based cloud computing systems, and discussed future research challenges....
[...]
341 citations
311 citations
Cites background from "Software-Defined Networking (SDN) a..."
...For example, several SDN-based strategies have been implemented to timely detect DDoS attacks [119], [120]....
[...]
304 citations
280 citations
Additional excerpts
...4 [13]....
[...]
References
2,013 citations
"Software-Defined Networking (SDN) a..." refers background or methods in this paper
...forwarding in ICN is aligned with the decoupling of the data plane and control plane in SDN [18]....
[...]
...Current Internet is information-driven, yet networking technology is still focused on the idea of location-based addressing and host-to-host communications [18]....
[...]
...OpenFlow provides optional support for encrypted Transport Layer Security (TLS) communication and a certificate exchange between the switches and the controller(s) [18]....
[...]
...ONF presents a high-level architecture for SDN that is vertically split into three main functional layers including infrastructure layer, control layer and application layer [9], [11], [18]–[20], as shown in Fig....
[...]
1,596 citations
"Software-Defined Networking (SDN) a..." refers background in this paper
...Some examples of source-based mechanisms include ingress/egress filtering, which filters packets with spoofed IP addresses at the source’s edge routers based on the valid IP address range internal to the network [55], and Source Address Validity Enforcement (SAVE) Protocol [56]....
[...]
1,463 citations
"Software-Defined Networking (SDN) a..." refers background in this paper
...Onix provides a general API for control plane implementations, while allowing them to make their own trade-offs among consistency, durability, and scalability [96]....
[...]
...A platform called Onix is presented in [96], in which a network control plane can be implemented as a distributed system....
[...]
1,251 citations
"Software-Defined Networking (SDN) a..." refers background in this paper
...Some examples of destination-based mechanisms include input debugging [59], probabilistic packet marking [60], and hash-based IP traceback [61]....
[...]
1,153 citations
"Software-Defined Networking (SDN) a..." refers background or methods in this paper
...every packet passing through the router using Bloom Filter, which is a hash structure to reduce the memory requirement to store packet records [35]....
[...]
...They generally consume less bandwidth and are stealthier in nature compared to volumetric attacks, since they are very similar to benign traffic [35]....
[...]
...1) Network/transport-level DDoS flooding attacks: These attacks have been mostly launched using TCP, UDP, ICMP and DNS protocol packets and focus on disrupting legitimate user’s connectivity by exhausting victim network’s bandwidth [35]....
[...]
...HTTP sessions and employs rate-limiting as the primary defense mechanism [35], [63])....
[...]
...Since attackers cooperate to perform successful attacks, defenders must also form alliances and collaborate with each other to defeat DDoS attacks [35]....
[...]