1 |
R. Wallner and R. Cannistra, "An SDN approach: Quality of service using big switchs floodlight open-source controller," in Proc. Asia-Pacific Advanced Network, vol. 35, pp. 14-19, Jun. 2013.
|
2 |
J. S. Marron, Felix Hernandez-Campos, and F. D. Smith, "Mice and elephants visualization of internet traffic," in Compstat, pp. 47-54, Physica-Verlag HD, 2002.
|
3 |
J. Liu, J. Li, G. Shou, Y. Hu, Z. Guo, and W. Dai, "SDN based load balancing mechanism for elephant flow in data center networks," in IEEE 2014 Int. Symp. Wirel. Pers. Multimedia Commun. (WPMC), pp. 486-490, 2014.
|
4 |
M. Al-Fares, S. Radhakrishnan, B. Raghavan, N. Huang, and A. Vahdat, "Hedera: Dynamic flow scheduling for data center networks," in NSDI, vol. 10, pp. 19-19, San Jose, California, Apr. 2010.
|
5 |
A. R. Curtis, W. Kim, and P. Yalagandula, "Mahout: Low-overhead datacenter traffic management using end-host-based elephant detection," in Proc. IEEE INFOCOM, pp. 1629-1637, 2011.
|
6 |
P. Phaal, S. Panchen, and N. McKee, InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks, 2001, Retrieved Nov. 15, 2016, from https://tools.ietf.org/html/rfc3176
|
7 |
A. Islam, et al., "Robust software-defined scheme for image sensor network," J. KICS, vol. 41, no. 2, pp. 215-221, Feb. 2016.
DOI
|
8 |
inMon sFlow-RT, Retrieved Nov. 13, 2016, from http://www.inmon.com/products/sFlow-RT.php
|
9 |
Ian F. Akyildiz, et al., "A roadmap for traffic engineering in SDN-OpenFlow networks," Computer Networks, vol. 71, pp. 1-30, 2014.
DOI
|
10 |
M. Chiesa, G. Kindler, and M. Schapira, "Traffic engineering with equal-cost-multipath: An algorithmic perspective," in IEEE INFOCOM 2014-IEEE Conf. Computer Commun., pp. 1590-1598, 2014.
|
11 |
Floodlight Is an Open SDN Controller (2013), Retrieved Nov. 22, 2016, from http://www.projectfloodlight.org
|
12 |
S. Liu, H. Xu, and Z. Cai, "Low latency datacenter networking: A short survey," arXiv preprint arXiv:1312.3455, 2013.
|
13 |
S. U. Rehman, et al., "Network-wide traffic visibility in OF@TEIN SDN testbed using sFlow," IEEE APNOMS, pp. 1-6, Sept. 2014.
|
14 |
C. Marist, What is Avior? (2012), Retrieved Nov. 13, 2016, from http://openflow.marist.edu/avior.html
|
15 |
P. Ferguson and D. Senie, Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing, 1997, Retrieved Dec. 02, 2016 from https://www.ietf.org/rfc/rfc2827.txt
|
16 |
S. Tomovic, N. Prasad, and I. Radusinovic, "SDN control framework for QoS provisioning," IEEE TELFOR, pp. 111-114, 2014.
|
17 |
J. W. Seo and S. J. Lee, "A study on the detection of DDoS attack using the IP Spoofing," J. Korea Inst. Inf. Secur. and Cryptol., vol. 25, no. 1, pp. 147-153, Feb. 2015.
DOI
|
18 |
Mininet (2013, Mar), An Instant Virtual Network on your Laptop (or other PC), Retrieved Oct. 25, 2016, from http://www.mininet.org
|
19 |
Iperf: The TCP/UDP Bandwidth Management Tool, Retrieved Nov. 18, 2016, from https://iperf.fr/
|
20 |
G. Bang, et al., "A protection method using destination address packet sampling for SYN flooding attack in SDN," J. Korea Multimedia Soc., vol. 18, no. 1, pp. 35-41, Jan. 2015.
DOI
|