1 |
M. Nugraha, I. Paramita, A. Musa, D. Choi, and B. Cho, "Utilizing OpenFlow and sFlow to Detect and Mitigate SYN Flooding Attack," Journal of Korea Multimedia Society, Vol. 17, No. 8, pp. 988-994, 2014.
DOI
|
2 |
H. Choi and M. Jun, "DDoS TCP Syn Flooding Backscatter Analysis Algorithm," Journal of the Korea Society of Computer and Information, Vol. 14, No. 9, pp. 55-66, 2009.
|
3 |
T. Ha, C. Jeong, J. Narantuya, N. An, H. Lim, and J. Kim, "sFlow Based Network Attack Detection System," Proceeding of The Summer Conference of the Korean Institute of Communications and Information Sciences, pp. 4A-3, 2014.
|
4 |
R. Braga, E. Mota, and A. Passito, "Lightweight DDoS Flooding Attack Detection using NOX/OpenFlow," Proceeding of 35th Annual IEEE Conference on Local Computer Networks, pp. 408-415, 2010.
|
5 |
Performance aware software defined networking. http://blog.sflow.com/2013/01/performanceaware-software-defined.html (accessed Aug., 23, 2014).
|
6 |
J. Kim, S. Im, and H. Kim, "Technology Analysis of SDN/OpenFlow and Availability of Security Aspects," Review of Korea Institute of Information Security and Cryptology, Vol. 24, No. 1, pp. 65-74, 2014.
|
7 |
D. Moore, G. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," ACM Transaction on Computer Systems, Vol. 24, No. 2, pp. 115-139, 2006.
DOI
|