GIẢI PHÁP PHÁT HIỆN TẤN CÔNG DDoS TRONG MẠNG ĐỊNH NGHĨA MỀM
Thông tin bài báo
Ngày nhận bài: 03/07/23                Ngày hoàn thiện: 20/09/23                Ngày đăng: 20/09/23Tóm tắt
Từ khóa
Toàn văn:
PDFTài liệu tham khảo
[1] W. Braun and M. Menth, “Software-Defined Networking Using OpenFlow: Protocols, Applications and Architectural Design Choices,” Future Internet, vol. 6, no. 2, pp. 302–336, 2014.
[2] S. Dong, K. Abbas, and R. Jain, “A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments,” IEEE Access, vol. 7, pp. 80813-80828, 2019.
[3] H. Abdulkarem and A. Alethawy, “DDoS attack detection and mitigation at SDN environment,” Iraqi Journal of Information and Communications Technology (IJICT), vol. 4, no. 1, pp. 1-9, 2021.
[4] P. Manso, J. Moura, and C. Serrão, “SDN-based intrusion detection system for early detection and mitigation of DDoS attacks,” Information, vol. 10, no. 3, pp. 1-17, 2019.
[5] A. Ahalawat, S. S. Dash, A. Panda, and K. S. Babu, “Entropy Based DDoS Detection and Mitigation in OpenFlow Enabled SDN,” International Conference on Vision towards Emerging Trends in Communication and Networking (ViTECoN), 2019, pp.1-5.
[6] M. Mousavi and M. St-Hilaire, “Early detection of DDoS attacks against SDN controllers,” International Conference on Computing, Networking and Communications (ICNC), 2015, pp. 77–81.
[7] M.Roesch, “Snort-lightweight intrusion detection for networks,” Proceedings of the 13th USENIX conference on System Administration (LISA '99), 1999, pp. 229–238.
[8] A. Gupta and L. S. Sharma, “Performance evaluation of snort and suricata intrusion detection systems on ubuntu server,” in Proceedings of ICRIC, Springer, 2020, pp. 811–821.
[9] S. Badotra and S. N. Panda, “Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking,” Cluster Computing, vol. 23, no. 2, pp. 1281-1291, 2020.
[10] R. L. S. de Oliveira, C. M. Schweitzer, A. A. Shinoda, and L. R. Prete, “Using Mininet for emulation and prototyping Software-Defined Networks,” IEEE Colombian Conference on Communications and Computing (COLCOM), 2014, pp. 1-6.
[11] N. Hoque, M. H. Bhuyan, R. C. Baishya, D. K. Bhattacharyya, and J. K. Kalita, “Network attacks: taxonomy, tools and systems,” Journal of Network and Computer Applications, vol. 40, pp. 307–324, 2014.
DOI: https://doi.org/10.34238/tnu-jst.8251
Các bài báo tham chiếu
- Hiện tại không có bài báo tham chiếu