ПІБ наукового керівника з списку
ВАЛУЙСЬКИЙ СТАНІСЛАВ ВІКТОРОВИЧ
ПІБ студента
Єфименко Олексій Сергійович
Дата публікації
2020рік
Бібліографічний опис
[1] Tri, N., Hiep, T., & Kim, K. (2015, January). Assessing the impact of resource attack in Software Defined Network. In Information Networking (ICOIN), 2015 International Conference on (pp. 420-425). IEEE.
[2] “Sdn architecture,” june 2014, accessed: 2014-09-12. [Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdnresources/techni alreports/TR SDN ARCH 1.0 06062014.pdf
[3] “SDN Central”. 2014, [Online]. Available at: http://www.sdncentral.com/announced-sdn-products/
[4] Saman Taghavi Zargar, James Joshi, and David Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Comm. Survey & Tutorials, vol. 15, no. 4, pp. 2046-2069, Fourth Quater 2013.
[5] M. Sachdeva, G. Singh, K. Kumar, and K. Singh, “Measuring impact of ddos attacks on web services,”2010.
[6] S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,” IEEE Commun. Surveys & Tutorials, vol. 15, no. 4, pp. 2046–2069, Fourth Quarter 2013.
[7] S. Farahmandian, M. Zamani, A. Akbarabadi, J. M. Zadeh, S. M. Mirhosseini, and S. Farahmandian, “A survey on methods to defend against DDoS attack in cloud computing,” in Proc. Recent Advances in Knowledge Engineering and System Science, Feb. 2013.
[8] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using nox/openflow,” in Proc. 35th IEEE Conf. Local Computer Networks (LCN), 2010, pp. 408–415. [21] G. Zhang and M. Parashar, “Cooperative defence against ddos attacks,” Journal of Research and Practice in Information Technology, vol. 38, no. 1, pp. 69–84, 2006.
[9] Yan, Q., Yu, R., Gong, Q., & Li, J. (2015). Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.
[10] Q. Yan and F. R. Yu, “Distributed denial of service attacks in software defined networking with cloud computing,” IEEE Commun. Mag., vol. 53, no. 4, pp. 52–59, Apr. 2015.
[11] R. Jin and B. Wang, “Malware detection for mobile devices using software-defined networking,” in IEEE Second GENI on Research and Educational Experiment Workshop (GREE), 2013, pp. 81–88.
[12] S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic anomaly detection using software defined networking,” in Proceedings of Recent Advances in Intrusion Detection, 2011, pp. 161–180.
[13] S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu, and M. Tyson, “Fresco: Modular composable security services for softwaredefined networks.” in Proc. ISOC Network and Distributed System Security Symposium, 2013.
[14] H. Tian and J. Bi, “An incrementally deployable flow-based scheme for IP traceback,” IEEE Commun. Letters, vol. 16, no. 7, pp. 1140–1143, July 2012.
[15] N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, “I know what your packet did last hop: using packet histories to troubleshoot networks,” in Proc. Symp. Networked Systems Design and Implementation (NSDI), 2014.
[16] S. Shin and G. Gu, “Attacking Software-defined networks: a first feasibility study,” in Proc. the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013.
[17] P. Porras et al., “A Security Enforcement Kernel for OpenFlow Networks,” Proc. 1st Wksp. Hot Topics in Software Defined Networks, 2012, pp. 121–126.
[18] B. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti, “A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks,” IEEE Commun. Surveys & Tutorials, vol. 16, no. 3, Third Quarter 2014, pp. 1617–34.
[19] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “Avant- Guard: Scalable and Vigilant Switch Flow Management in Software-Defined Networks,” Proc. ACM SIGSAC Conf. Computer & Commun. Security, 2013, pp. 413–24.
[20] Wang, H., Xu, L., & Gu, G. (2015, June). FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on(pp. 239-250). IEEE.
[21]Dao, N. N., Park, J., Park, M., & Cho, S. (2015, January). A feasible method to combat against DDoS attack in SDN network. In Information Networking (ICOIN), 2015 International Conference on (pp. 309-311). IEEE.
[22] H. Lai, S. Cai, H. Huang, J. Xie, H. Li, A parallel intrusion detection system for high-speed networks
[23] K. Xinidis, I. Charitakis, S. Antonatos, K. G. Anagnostakis,
E. P. Markatos, An active splitter architecture for intrusion detection
and prevention, IEEE Transactions on Dependable and
Secure Computing 3 (2006)
[24] J. Coppens, S. V. den Berghe, H. Bos, E. P. Markatos, F. D.
Turck, A. Oslebo, S. Ubik, Scampi: A scalable and programmable
architecture for monitoring gigabit networks, management of multimedia networks and services
[25] R. Kanagavelu, B. S. Lee, R. F. Miguel, L. N. T. Dat, L. N.
Mingjie, Software defined network based adaptive routing for
data replication in data centers
[26] S. Fang, Y. Yu, C. H. Foh, K. M. M. Aung, A loss-free
multipathing solution for data center network using software defined
networking approach
[27] A. Tavakoli, M. Casado, T. Koponen, S. Shenker, Applying nox
to the datacenter, in: Proceedings of workshop on Hot Topics
in Networks (HotNets-VIII), 2010.
[28] T. D. Nadeau, K. Gray, SDN: Software Defined Networks, OReilly
Media, Inc., 2013.
[29] M. F. Bari, S. R. Chowdhury, R. Ahmed, R. Boutaba, D. R.
Cheriton, Policycop: An autonomic qos policy enforcement framework for software defined networks
[30] S. Namal, I. Ahmad, A. Gurtov, M. Ylianttila, Sdn based inter
technology load balancing leveraged by flow admission control
[31] B. Nunes, M. Mendonca, N. Xuan-Nam, K. Obraczka,
T. Turletti, A survey of software-defined networking: Past,
present, and future of programmable networks
[32] A. Lara, A. Kolasani, B. Ramamurthy, Network innovation using openflow
[33] R. S. F. Community, Ryu sdn controller,
http://osrg.github.io/ryu/ (2014).
[34] Intel, Dpdk performance report,
http://www.intel.com/content/www/us/en/intelligentsystems/
intel-technology/intel-dpdk-programmers-guide.html (2013).
[35] I. S. Association, Ethertype,
http://standards.ieee.org/develop/regauth/ethertype/eth.txt (2014).
[36] S. Sengupta, A. Greenberg, P. Patel, R. Chaiken,
The nature of data center traffic: Measurements & analysis
[37] R. Krishnan, L. Yong, A. Ghanwani, N. So, B. Khasnabish,
Mechanisms for optimizing link aggregation group (lag) and
equal-cost multipath (ecmp) component link utilization in network
[2] “Sdn architecture,” june 2014, accessed: 2014-09-12. [Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdnresources/techni alreports/TR SDN ARCH 1.0 06062014.pdf
[3] “SDN Central”. 2014, [Online]. Available at: http://www.sdncentral.com/announced-sdn-products/
[4] Saman Taghavi Zargar, James Joshi, and David Tipper, “A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,” IEEE Comm. Survey & Tutorials, vol. 15, no. 4, pp. 2046-2069, Fourth Quater 2013.
[5] M. Sachdeva, G. Singh, K. Kumar, and K. Singh, “Measuring impact of ddos attacks on web services,”2010.
[6] S. T. Zargar, J. Joshi, and D. Tipper, “A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks,” IEEE Commun. Surveys & Tutorials, vol. 15, no. 4, pp. 2046–2069, Fourth Quarter 2013.
[7] S. Farahmandian, M. Zamani, A. Akbarabadi, J. M. Zadeh, S. M. Mirhosseini, and S. Farahmandian, “A survey on methods to defend against DDoS attack in cloud computing,” in Proc. Recent Advances in Knowledge Engineering and System Science, Feb. 2013.
[8] R. Braga, E. Mota, and A. Passito, “Lightweight DDoS flooding attack detection using nox/openflow,” in Proc. 35th IEEE Conf. Local Computer Networks (LCN), 2010, pp. 408–415. [21] G. Zhang and M. Parashar, “Cooperative defence against ddos attacks,” Journal of Research and Practice in Information Technology, vol. 38, no. 1, pp. 69–84, 2006.
[9] Yan, Q., Yu, R., Gong, Q., & Li, J. (2015). Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges.
[10] Q. Yan and F. R. Yu, “Distributed denial of service attacks in software defined networking with cloud computing,” IEEE Commun. Mag., vol. 53, no. 4, pp. 52–59, Apr. 2015.
[11] R. Jin and B. Wang, “Malware detection for mobile devices using software-defined networking,” in IEEE Second GENI on Research and Educational Experiment Workshop (GREE), 2013, pp. 81–88.
[12] S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic anomaly detection using software defined networking,” in Proceedings of Recent Advances in Intrusion Detection, 2011, pp. 161–180.
[13] S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu, and M. Tyson, “Fresco: Modular composable security services for softwaredefined networks.” in Proc. ISOC Network and Distributed System Security Symposium, 2013.
[14] H. Tian and J. Bi, “An incrementally deployable flow-based scheme for IP traceback,” IEEE Commun. Letters, vol. 16, no. 7, pp. 1140–1143, July 2012.
[15] N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, “I know what your packet did last hop: using packet histories to troubleshoot networks,” in Proc. Symp. Networked Systems Design and Implementation (NSDI), 2014.
[16] S. Shin and G. Gu, “Attacking Software-defined networks: a first feasibility study,” in Proc. the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013.
[17] P. Porras et al., “A Security Enforcement Kernel for OpenFlow Networks,” Proc. 1st Wksp. Hot Topics in Software Defined Networks, 2012, pp. 121–126.
[18] B. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti, “A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks,” IEEE Commun. Surveys & Tutorials, vol. 16, no. 3, Third Quarter 2014, pp. 1617–34.
[19] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “Avant- Guard: Scalable and Vigilant Switch Flow Management in Software-Defined Networks,” Proc. ACM SIGSAC Conf. Computer & Commun. Security, 2013, pp. 413–24.
[20] Wang, H., Xu, L., & Gu, G. (2015, June). FloodGuard: A DoS Attack Prevention Extension in Software-Defined Networks. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on(pp. 239-250). IEEE.
[21]Dao, N. N., Park, J., Park, M., & Cho, S. (2015, January). A feasible method to combat against DDoS attack in SDN network. In Information Networking (ICOIN), 2015 International Conference on (pp. 309-311). IEEE.
[22] H. Lai, S. Cai, H. Huang, J. Xie, H. Li, A parallel intrusion detection system for high-speed networks
[23] K. Xinidis, I. Charitakis, S. Antonatos, K. G. Anagnostakis,
E. P. Markatos, An active splitter architecture for intrusion detection
and prevention, IEEE Transactions on Dependable and
Secure Computing 3 (2006)
[24] J. Coppens, S. V. den Berghe, H. Bos, E. P. Markatos, F. D.
Turck, A. Oslebo, S. Ubik, Scampi: A scalable and programmable
architecture for monitoring gigabit networks, management of multimedia networks and services
[25] R. Kanagavelu, B. S. Lee, R. F. Miguel, L. N. T. Dat, L. N.
Mingjie, Software defined network based adaptive routing for
data replication in data centers
[26] S. Fang, Y. Yu, C. H. Foh, K. M. M. Aung, A loss-free
multipathing solution for data center network using software defined
networking approach
[27] A. Tavakoli, M. Casado, T. Koponen, S. Shenker, Applying nox
to the datacenter, in: Proceedings of workshop on Hot Topics
in Networks (HotNets-VIII), 2010.
[28] T. D. Nadeau, K. Gray, SDN: Software Defined Networks, OReilly
Media, Inc., 2013.
[29] M. F. Bari, S. R. Chowdhury, R. Ahmed, R. Boutaba, D. R.
Cheriton, Policycop: An autonomic qos policy enforcement framework for software defined networks
[30] S. Namal, I. Ahmad, A. Gurtov, M. Ylianttila, Sdn based inter
technology load balancing leveraged by flow admission control
[31] B. Nunes, M. Mendonca, N. Xuan-Nam, K. Obraczka,
T. Turletti, A survey of software-defined networking: Past,
present, and future of programmable networks
[32] A. Lara, A. Kolasani, B. Ramamurthy, Network innovation using openflow
[33] R. S. F. Community, Ryu sdn controller,
http://osrg.github.io/ryu/ (2014).
[34] Intel, Dpdk performance report,
http://www.intel.com/content/www/us/en/intelligentsystems/
intel-technology/intel-dpdk-programmers-guide.html (2013).
[35] I. S. Association, Ethertype,
http://standards.ieee.org/develop/regauth/ethertype/eth.txt (2014).
[36] S. Sengupta, A. Greenberg, P. Patel, R. Chaiken,
The nature of data center traffic: Measurements & analysis
[37] R. Krishnan, L. Yong, A. Ghanwani, N. So, B. Khasnabish,
Mechanisms for optimizing link aggregation group (lag) and
equal-cost multipath (ecmp) component link utilization in network
вид документа
бакалаврська робота
Ключові слова
SDN, DDoS, захист від атак.
Анотація_UK
Анотація_EN