29
Views
3
CrossRef citations to date
0
Altmetric
Research Article

Self-healing topology for DDoS attack identification & discovery protocol in software-defined networks

, , , , &

References

  • G. Chen, G. Hu, Y. Jiang, and C. Zhang, “SAVSH: IP source address validation for SDN hybrid networks,” in 2016 IEEE Symposium on Computers and Communication (ISCC), 2016, pp. 409–414.
  • C. Zhang et al., “Towards a SDN-Based Integrated Architecture for Mitigating IP Spoofing Attack,” IEEE Access, vol. 6, pp. 22764–22777, 2017. doi: https://doi.org/10.1109/ACCESS.2017.2785236
  • S. Deng, X. Gao, Z. Lu, and X. Gao, “Packet injection attack and its defense in software-defined networks,” IEEE Trans. Inf. Forensics Secur., vol. 13, no. 3, pp. 695–705, 2018. doi: https://doi.org/10.1109/TIFS.2017.2765506
  • Arora, Amandeep Singh, Barkha Bahl, and Linesh Raja. “Diverse real-time attack traffic forecasting for cloud platforms.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 541-555. doi: https://doi.org/10.1080/09720529.2019.1638579
  • A. S. Alshra’a and J. Seitz, “Using INSPECTOR Device to Stop Packet Injection Attack in SDN,” IEEE Commun. Lett., vol. 23, no. 7, pp. 1174– 1177, 2019. doi: https://doi.org/10.1109/LCOMM.2019.2896928
  • B. Liu, J. Bi, and Y. Zhou, “Source address validation in software defined networks,” in SIGCOMM 2016 - Proceedings of the 2016 ACM Conference on Special Interest Group on Data Communication, 2016, no. Dc, pp. 595–596.
  • R. C. Meena, M. Nawal, and M. M. Bundele, “SIPAV-SDN: Source internet protocol address validation for software defined network,” Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 12, 2019.
  • Kumar, Ankit, et al. “An improved quantum key distribution protocol for verification.” Journal of Discrete Mathematical Sciences and Cryptography 22.4 (2019): 491-498. doi: https://doi.org/10.1080/09720529.2019.1637153
  • P. Manzanares-Lopez, J. P. Muñoz-Gea, F. M. Delicado-Martinez, J. Malgosa-Sanahuja, and A. F. De La Cruz, “Host discovery solution: An enhancement of topology discovery in OpenFlow based SDN networks,” in ICETE 2016 - Proceedings of the 13th International Joint Conference on e-Business and Telecommunications, 2016, vol. 1, no. Icete, pp. 80–88.
  • R. C. Meena, M. Nawal, and M. Bundele, “Instant detection of host in SDN (IDH-SDN),” Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 5603– 5608, Sep. 2019.
  • F. Pakzad, M. Portmann, W. L. Tan, and J. Indulska, “Efficient topology discovery in OpenFlow-based Software Defined Networks,” Comput. Commun., vol. 77, pp. 52–61, 2016. doi: https://doi.org/10.1016/j.comcom.2015.09.013
  • G. Tarnaras, E. Haleplidis, and S. Denazis, “SDN and ForCES based optimal network topology discovery,” in 1st IEEE Conference on Network Softwarization: Software-Defined Infrastructures for Networks, Clouds, IoT and Services, NETSOFT 2015, 2015.
  • L. Ochoa-Aday, C. Cervello-Pastor, and A. Fernandez-Fernandez, “Self-healing topology discovery protocol for software-defined networks,” IEEE Commun. Lett., vol. 22, no. 5, pp. 1070–1073, 2018. doi: https://doi.org/10.1109/LCOMM.2018.2816921
  • Y. Jiménez, C. Cervelló-Pastor, and A. García, “Dynamic resource discovery protocol for software defined networks,” IEEE Commun. Lett., vol. 19, no. 5, pp. 743–746, 2015. doi: https://doi.org/10.1109/LCOMM.2015.2403322

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.