. Akamai, Prolexic Quarterly Global DDoS Attack Report Q1 2014, Prolexic, Tech. Rep, 2014.

A. Alwabel, M. Yu, Y. Zhang, and J. Mirkovic, SENSS: Observe and Control Your Own Traffic in the Internet, Proceedings of the 2014 ACM Conference on SIGCOMM, pp.349-350, 2014.

A. Bates, K. Butler, A. Haeberlen, M. Sherr, and W. Zhou, Let SDN Be Your Eyes: Secure Forensics in Data Center Networks, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014.
DOI : 10.14722/sent.2014.23002

A. Belenky and N. Ansari, On deterministic packet marking, Computer Networks, vol.51, issue.10, pp.2677-2700, 2007.
DOI : 10.1016/j.comnet.2006.11.020

R. Bifulco and G. Karame, Towards a richer set of services in softwaredefined networks, Proceedings of the NDSS Workshop on Security of Emerging Technologies (SENT), 2014.

R. Braga, E. Mota, and A. Passito, Lightweight DDoS flooding attack detection using NOX/OpenFlow, IEEE Local Computer Network Conference, pp.408-415, 2010.
DOI : 10.1109/LCN.2010.5735752

M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. Mckeown et al., Ethane, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.1-12, 2007.
DOI : 10.1145/1282427.1282382

C. Demetrescu and G. F. Italiano, A new approach to dynamic all pairs shortest paths, 35th Annual ACM Symposium on Theory of Computing (STOC), pp.159-166, 2003.

L. Dunbar, M. Zarny, C. Jacquenet, and S. Chakrabarty, Interface to Network Security Functions Problem Statement Working Draft, IETF, Internet-Draft dunbar-i2nsf-problem-statement-01, 2014.

K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments, Computer Networks, vol.62, issue.0, pp.122-136, 2014.
DOI : 10.1016/j.bjp.2013.10.014

N. Hachem, H. Debar, and J. Garcia-alfaro, HADEGA: A novel MPLS-based mitigation solution to handle network attacks, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC), pp.171-180, 2012.
DOI : 10.1109/PCCC.2012.6407750

URL : https://hal.archives-ouvertes.fr/hal-00813393

J. Ioannidis and S. M. Bellovin, Implementing Pushback: Router- Based Defense Against DDoS Attacks, Proceedings of Network and Distributed System Security Symposium (NDSS), 2002.

M. Kim, H. Kong, S. Hong, S. Chung, and J. Hong, A flowbased method for abnormal network traffic detection, IEEE/IFIP Network Operations and Management Symposium (NOMS), pp.599-612, 2004.

G. N. Koutepas, F. Stamatelopoulos, and V. Maglaris, Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks, Journal of Network and Systems Management, vol.12, issue.1, pp.73-94, 2004.
DOI : 10.1023/B:JONS.0000015699.50210.e3

D. Kreutz, F. M. Ramos, and P. Verissimo, Towards secure and dependable software-defined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.55-60, 2013.
DOI : 10.1145/2491185.2491199

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.370.3880

R. Krishnan and M. Durrani, Real-time SDN Analytics for DDoS mitigation, 2014.

J. Li, S. Berg, M. Zhang, P. Reiher, and T. Wei, Drawbridge: Softwaredefined DDoS-resistant Traffic Engineering, Proceedings of the 2014 ACM Conference on SIGCOMM, pp.591-592, 2014.

X. Liu, X. Yang, and Y. Xia, NetFence: preventing internet denial of service from inside out, SIGCOMM Comput. Commun. Rev, vol.41, issue.4, 2010.

A. Mahimkar, J. Dange, V. Shmatikov, H. Vin, and Y. Zhang, dFence: Transparent Network-based Denial of Service Mitigation, Proceedings of the 4th USENIX Conference on Networked Systems Design Implementation (NSDI), pp.24-24, 2007.

S. A. Mehdi, J. Khalid, and S. A. Khayam, Revisiting Traffic Anomaly Detection Using Software Defined Networking, Lecture Notes in Computer Science, vol.38, pp.161-180, 2011.
DOI : 10.1145/1851307.1851309

B. Nunes, M. Mendonca, X. Nguyen, K. Obraczka, and T. Turletti, A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1617-1634, 2014.
DOI : 10.1109/SURV.2014.012214.00180

T. Peng, C. Leckie, and K. Ramamohanarao, Survey of Networkbased Defense Mechanisms Countering the DoS and DDoS Problems, ACM Comput. Surv, vol.39, issue.1, 2007.

P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson et al., A security enforcement kernel for OpenFlow networks, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.121-126, 2012.
DOI : 10.1145/2342441.2342466

Z. A. Qazi, C. Tu, L. Chiang, R. Miao, V. Sekar et al., SIMPLE-fying middlebox policy enforcement using SDN, ACM SIGCOMM Computer Communication Review, vol.43, issue.4, pp.27-38, 2013.
DOI : 10.1145/2534169.2486022

S. Savage, D. Wetherall, A. Karlin, and T. Anderson, Practical network support for IP traceback, ACM SIGCOMM Computer Communication Review, vol.30, issue.4, pp.295-306, 2000.
DOI : 10.1145/347057.347560

S. Shin, P. A. Porras, V. Yegneswaran, M. W. Fong, G. Gu et al., FRESCO: Modular Composable Security Services for Software-Defined Networks, Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2013.

S. Shin, Y. Song, T. Lee, S. Lee, J. Chung et al., Rosemary, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.78-89, 2014.
DOI : 10.1145/2660267.2660353

]. S. Shin, V. Yegneswaran, P. Porras, and G. Gu, AVANT-GUARD, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.413-424, 2013.
DOI : 10.1145/2508859.2516684

D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg et al., Autonomic Response to Distributed Denial of Service Attacks, Recent Advances in Intrusion Detection, ser, 2001.
DOI : 10.1007/3-540-45474-8_9

R. Stone, Centertrack: An ip overlay network for tracking dos floods, Proceedings of the 9th Conference on USENIX Security Symposium, pp.15-15, 2000.

Y. Wang, Y. Zhang, V. Singh, C. Lumezanu, and G. Jiang, NetFuse: Short-circuiting traffic surges in the cloud, 2013 IEEE International Conference on Communications (ICC), pp.3514-3518, 2013.
DOI : 10.1109/ICC.2013.6655095

A. Yaar, A. Perrig, and D. Song, Pi: a path identification mechanism to defend against DDoS attacks, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.93-107, 2003.
DOI : 10.1109/SECPRI.2003.1199330

X. Yang, D. Wetherall, and T. Anderson, A DoS-limiting network architecture, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.241-252, 2005.
DOI : 10.1145/1090191.1080120

S. T. Zargar, J. Joshi, and D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013.
DOI : 10.1109/SURV.2013.031413.00127

Z. Zhang, F. Na¨?tna¨?t-abdesselam, P. Ho, and Y. Kadobayashi, Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks, Computers & Security, vol.30, issue.6-7, pp.6-7, 2011.
DOI : 10.1016/j.cose.2011.06.002