Open Access
| Issue |
Int. J. Simul. Multidisci. Des. Optim.
Volume 16, 2025
|
|
|---|---|---|
| Article Number | 29 | |
| Number of page(s) | 19 | |
| DOI | https://doi.org/10.1051/smdo/2025031 | |
| Published online | 24 December 2025 | |
- D. Gao, Z. Liu, Y. Liu, C.H. Foh, T. Zhi, H.C. Chao, Defending against Packet-In messages flooding attack under SDN context, Soft. Comput. 22, 6797–6809 (2018) [Google Scholar]
- Z.A. Bhuiyan, S. Islam, M.M. Islam, A.B.M.A. Ullah, F. Naz, M.S. Rahman, On the (in)Security of the control plane of SDN architecture: a survey, IEEE Access 11, 91550–91582 (2023) [Google Scholar]
- R. Masoudi, A. Ghaffari, Software defined networks: a survey, J. Netw. Comput. Appl. 67, 1–25 (2016) [Google Scholar]
- L.F. Eliyan, R. Di Pietro, DoS and DDoS attacks in software defined networks: a survey of existing solutions and research challenges, Future Gener. Comput. Syst. 122, 149–171 (2021) [Google Scholar]
- B. Isyaku, M.S.M. Zahid, M.B. Kamat, K.A. Bakar, F.A. Ghaleb, Software defined networking flow table management of OpenFlow switches performance and security challenges: a survey 147 (2020), https://doi.org/10.3390/FI12090147 [Google Scholar]
- J. Xie et al., A survey of machine learning techniques applied to software defined networking (SDN): research issues and challenges (Institute of Electrical and Electronics Engineers Inc., pp. 393–430 (2019), https://doi.org/10.1109/COMST.2018.2866942 [Google Scholar]
- S. Soltani, A. Amanlou, M. Shojafar, R. Tafazolli, Security of topology discovery service in SDN: vulnerabilities and countermeasures, IEEE Open J. Commun. Soc. (2024). https://doi.org/10.1109/OJCOMS.2024.3406489 [Google Scholar]
- M. Rahouti, K. Xiong, Y. Xin, S.K. Jagatheesaperumal, M. Ayyash, M. Shaheed, SDN security review: threat taxonomy, implications, and open challenges (Institute of Electrical and Electronics Engineers Inc., 45820–45854 (2022) https://doi.org/10.1109/ACCESS.2022.3168972 [Google Scholar]
- S. Gao, Z. Li, B. Xiao, G. Wei, Security threats in the data plane of software-defined networks, IEEE Netw. 32, 108–113 (2018) [Google Scholar]
- S. Wang, K. Gomez, K. Sithamparanathan, M.R. Asghar, G. Russello, P. Zanna, Mitigating ddos attacks in sdn-based iot networks leveraging secure control and data plane algorithm, Appl. Sci. (Switzerland) 11, 1–27 (2021) [Google Scholar]
- M. Yue, H. Wang, L. Liu, Z. Wu, Detecting DoS attacks based on multi-features in SDN, IEEE Access 8, 104688–104700 (2020) [Google Scholar]
- S. Siddiqui et al., Toward software-defined networking-based IoT frameworks: a systematic literature review, taxonomy, open challenges and prospects (Institute of Electrical and Electronics Engineers Inc., 70850–70901 (2022), https://doi.org/10.1109/ACCESS.2022.3188311 [Google Scholar]
- M. Imran, M.H. Durad, F.A. Khan, H. Abbas, DAISY: a detection and mitigation system against denial-of-service attacks in software-defined networks, IEEE Syst. J. 14, 1933–1944 (2020) [Google Scholar]
- L.F. Eliyan, R. Di Pietro, DeMi: a solution to detect and mitigate DoS attacks in SDN, IEEE Access 11, 82477–82495 (2023) [Google Scholar]
- E. Kaljic, A. Maric, P. Njemcevic, DoS attack mitigation in SDN networks using a deeply programmable packet-switching node based on a hybrid FPGA/CPU data plane architecture, in: ICAT 2019-27th International Conference on Information, Communication and Automation Technologies, Proceedings, 1–6 (2019), https://doi.org/10.1109/icat47117.2019.8938862 [Google Scholar]
- M.B. Jimenez, D. Fernandez, J.E. Rivadeneira, L. Bellido, A. Cardenas, A survey of the main security issues and solutions for the SDN architecture, IEEE Access 9, 122016–122038 (2021) [Google Scholar]
- H. Elubeyd, D. Yiltas-Kaplan, Hybrid deep learning approach for automatic DoS/DDoS attacks detection in software-defined networks, Appl. Sci. (Switzerland), 13, (2023). https://doi.org/10.3390/app13063828 [Google Scholar]
- N. Nisa, A.S. Khan, Z. Ahmad, S. Aqeel, J. Asim, S. Afzal, Conceptual review of DoS attacks in software defined networks, in: Proceedings − AiIC 2022: 2022 Applied Informatics International Conference: Digital Innovation in Applied Informatics during the Pandemic, Institute of Electrical and Electronics Engineers Inc., 2022, pp. 154–158 [Google Scholar]
- S. Gao et al., Detection and mitigation of DoS attacks in software defined networks, IEEE/ACM Trans. Netw. 28, 1419 (2020) [Google Scholar]
- J. Liu, Q. Xu, Machine learning in software defined network, in: Proceedings of 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference, ITNEC 2019, no. Itnec, 2019, pp. 1114–1120 [Google Scholar]
- A. Ahmad, E. Harjula, M. Ylianttila, I. Ahmad, Evaluation of machine learning techniques for security in SDN, in: 2020 IEEE Globecom Workshops, GC Wkshps 2020 − Proceedings, Institute of Electrical and Electronics Engineers Inc., Dec. 2020 [Google Scholar]
- J. Ye, X. Cheng, J. Zhu, L. Feng, L. Song, A DDoS attack detection method based on SVM in software defined network, Secur. Commun. Netw. 2018, (2018). https://doi.org/10.1155/2018/9804061 [Google Scholar]
- S.M. Mousavi, M. St-Hilaire, Early detection of DDoS attacks against software defined network controllers, J. Netw. Syst. Manag. 26, 573–591 (2018) [Google Scholar]
- Z.R. Alashhab, M. Anbar, M.M. Singh, I.H. Hasbullah, P. Jain, T.A. Al-Amiedy, Distributed denial of service attacks against cloud computing environment: survey, issues, challenges and coherent taxonomy, (MDPI, 2022) [Google Scholar]
- G. Fioravanti, M.G. Spina, F. De Rango, Entropy based DDoS detection in software defined networks, in: Proceedings − IEEE Consumer Communications and Networking Conference, CCNC, Institute of Electrical and Electronics Engineers Inc., 2023, pp. 636–639 [Google Scholar]
- M.J. Santos-Neto, J.L. Bordim, E.A.P. Alchieri, E. Ishikawa, DDoS attack detection in SDN: enhancing entropy-based detection with machine learning, in: Concurrency and Computation: Practice and Experience, John Wiley and Sons Ltd, May 2024 [Google Scholar]
- C.H. Yang, J.P. Wu, F.Y. Lee, T.Y. Lin, M.H. Tsai, Detection and mitigation of SYN flooding attacks through SYN/ACK packets and Black/White lists, Sensors 23, (2023). https://doi.org/10.3390/s23083817 [Google Scholar]
- S. Shin, V. Yegneswaran, P. Porras, G. Gu, AVANT-GUARD: scalable and vigilant switch flow management in software-defined networks, in: Proceedings of the ACM Conference on Computer and Communications Security, 2013, pp. 413–424 [Google Scholar]
- H. Wang, L. Xu, G. Gu, FloodGuard: A DoS attack prevention extension in software-defined networks, Proc. Int. Conf. Depend. Syst. Netw. 2015, 239–250 (2015) [Google Scholar]
- L. Tan, Y. Pan, J. Wu, J. Zhou, H. Jiang, Y. Deng, A new framework for DDoS attack detection and defense in SDN environment, IEEE Access 8, 161908–161919 (2020) [Google Scholar]
- K.S. Sahoo et al., An evolutionary SVM model for DDOS attack detection in software defined networks, IEEE Access 8, 132502–132513 (2020) [Google Scholar]
- H. Peng, Z. Sun, X. Zhao, S. Tan, Z. Sun, A detection method for anomaly flow in software defined network, IEEE Access 6, 27809–27817 (2018) [Google Scholar]
- A. Banitalebi Dehkordi, M.R. Soltanaghaei, F.Z. Boroujeni, The DDoS attacks detection through machine learning and statistical methods in SDN, J. Supercomput. 77, 2383–2415 (2021) [Google Scholar]
- N.N. Tuan, P.H. Hung, N.D. Nghia, N. Van Tho, T. Van Phan, N.H. Thanh, A DDoS attack mitigation scheme in ISP networks using machine learning based on SDN, Electronics (Switzerland), 9, 1–19 (2020) [Google Scholar]
- P. Kumar, M. Tripathi, A. Nehra, M. Conti, C. Lal, SAFETY: early detection and mitigation of TCP SYN flood utilizing entropy in SDN, IEEE Trans. Netw. Serv. Manag. 15, 1545–1559 (2018) [Google Scholar]
- K.S. Sahoo, D. Puthal, M. Tiwary, J.J.P.C. Rodrigues, B. Sahoo, R. Dash, An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics, Future Gener. Comput. Syst. 89, 685–697 (2018) [Google Scholar]
- M. Revathi, V.V. Ramalingam, B. Amutha, A machine learning based detection and mitigation of the DDOS attack by using SDN controller framework, Wirel. Pers. Commun. 127, 2417–2441 (2022) [Google Scholar]
- Q. Yasin, Z. Iqbal, M.A. Khan, S. Kadry, Y. Nam, Reliable multipath flow for link failure recovery in 5G networks using SDN paradigm, Inf. Technol. Control 51, 5–17 (2022) [Google Scholar]
- A. Ashraf, Z. Iqbal, M.A. Khan, U. Tariq, S. Kadry, S. Park, Scalable offloading using machine learning methods for distributed multi-controller architecture of SDN networks, J. Supercomput. 78, 10191–10210 (2022) [Google Scholar]
- M. Imran, M.H. Durad, F.A. Khan, A. Derhab, Reducing the effects of DoS attacks in software defined networks using parallel flow installation, Hum. −Centric Comput. Inf. Sci. 9, 1–19 (2019) [Google Scholar]
- P. Zhang, H. Wang, C. Hu, C. Lin, On denial of service attacks in software defined networks; on denial of service attacks in software defined networks, IEEE Netw. 30, (2016). https://doi.org/10.1109/MNET.2016.1600109NM [Google Scholar]
- R. Santos, D. Souza, W. Santo, A. Ribeiro, E. Moreno, Machine learning algorithms to detect DDoS attacks in SDN, in: Concurrency and Computation: Practice and Experience, John Wiley and Sons Ltd, Aug. 2020 [Google Scholar]
- S. Asadollahi, B. Goswami, M. Sameer, Ryu controller's scalability experiment on software defined networks. 1–5 (2018), https://doi.org/10.1109/ICCTAC.2018.8370397 [Google Scholar]
- S. Rowshanrad, V. Abdi, M. Keshtgari, Performance evaluation of SDN controllers: floodlight and opendaylight, 47–57 (2016), https://doi.org/10.31436/iiumej.v17i2.615 [Google Scholar]
- N. Gude et al., NOX: Towards an Operating System for Networks. [Online]. Available: http://www.noxrepo.org [Google Scholar]
- Scapy A Python tool for security testing, J. Comput. Sci. Syst. Biol. 8, (2015). https://doi.org/10.4172/jcsb.1000182 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.
