Prolexic Quarterly Global DDoS Attack Report Q1 2014, Prolexic, Tech. Rep, 2014. ,
SENSS: Observe and Control Your Own Traffic in the Internet, Proceedings of the 2014 ACM Conference on SIGCOMM, pp.349-350, 2014. ,
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014. ,
DOI : 10.14722/sent.2014.23002
On deterministic packet marking, Computer Networks, vol.51, issue.10, pp.2677-2700, 2007. ,
DOI : 10.1016/j.comnet.2006.11.020
Towards a richer set of services in softwaredefined networks, Proceedings of the NDSS Workshop on Security of Emerging Technologies (SENT), 2014. ,
Lightweight DDoS flooding attack detection using NOX/OpenFlow, IEEE Local Computer Network Conference, pp.408-415, 2010. ,
DOI : 10.1109/LCN.2010.5735752
Ethane, ACM SIGCOMM Computer Communication Review, vol.37, issue.4, pp.1-12, 2007. ,
DOI : 10.1145/1282427.1282382
A new approach to dynamic all pairs shortest paths, 35th Annual ACM Symposium on Theory of Computing (STOC), pp.159-166, 2003. ,
Interface to Network Security Functions Problem Statement Working Draft, IETF, Internet-Draft dunbar-i2nsf-problem-statement-01, 2014. ,
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments, Computer Networks, vol.62, issue.0, pp.122-136, 2014. ,
DOI : 10.1016/j.bjp.2013.10.014
HADEGA: A novel MPLS-based mitigation solution to handle network attacks, 2012 IEEE 31st International Performance Computing and Communications Conference (IPCCC), pp.171-180, 2012. ,
DOI : 10.1109/PCCC.2012.6407750
URL : https://hal.archives-ouvertes.fr/hal-00813393
Implementing Pushback: Router- Based Defense Against DDoS Attacks, Proceedings of Network and Distributed System Security Symposium (NDSS), 2002. ,
A flowbased method for abnormal network traffic detection, IEEE/IFIP Network Operations and Management Symposium (NOMS), pp.599-612, 2004. ,
Distributed Management Architecture for Cooperative Detection and Reaction to DDoS Attacks, Journal of Network and Systems Management, vol.12, issue.1, pp.73-94, 2004. ,
DOI : 10.1023/B:JONS.0000015699.50210.e3
Towards secure and dependable software-defined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, HotSDN '13, pp.55-60, 2013. ,
DOI : 10.1145/2491185.2491199
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.370.3880
Real-time SDN Analytics for DDoS mitigation, 2014. ,
Drawbridge: Softwaredefined DDoS-resistant Traffic Engineering, Proceedings of the 2014 ACM Conference on SIGCOMM, pp.591-592, 2014. ,
NetFence: preventing internet denial of service from inside out, SIGCOMM Comput. Commun. Rev, vol.41, issue.4, 2010. ,
dFence: Transparent Network-based Denial of Service Mitigation, Proceedings of the 4th USENIX Conference on Networked Systems Design Implementation (NSDI), pp.24-24, 2007. ,
Revisiting Traffic Anomaly Detection Using Software Defined Networking, Lecture Notes in Computer Science, vol.38, pp.161-180, 2011. ,
DOI : 10.1145/1851307.1851309
A Survey of Software-Defined Networking: Past, Present, and Future of Programmable Networks, IEEE Communications Surveys & Tutorials, vol.16, issue.3, pp.1617-1634, 2014. ,
DOI : 10.1109/SURV.2014.012214.00180
Survey of Networkbased Defense Mechanisms Countering the DoS and DDoS Problems, ACM Comput. Surv, vol.39, issue.1, 2007. ,
A security enforcement kernel for OpenFlow networks, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.121-126, 2012. ,
DOI : 10.1145/2342441.2342466
SIMPLE-fying middlebox policy enforcement using SDN, ACM SIGCOMM Computer Communication Review, vol.43, issue.4, pp.27-38, 2013. ,
DOI : 10.1145/2534169.2486022
Practical network support for IP traceback, ACM SIGCOMM Computer Communication Review, vol.30, issue.4, pp.295-306, 2000. ,
DOI : 10.1145/347057.347560
FRESCO: Modular Composable Security Services for Software-Defined Networks, Proceedings of the ISOC Network and Distributed System Security Symposium (NDSS), 2013. ,
Rosemary, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, pp.78-89, 2014. ,
DOI : 10.1145/2660267.2660353
AVANT-GUARD, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.413-424, 2013. ,
DOI : 10.1145/2508859.2516684
Autonomic Response to Distributed Denial of Service Attacks, Recent Advances in Intrusion Detection, ser, 2001. ,
DOI : 10.1007/3-540-45474-8_9
Centertrack: An ip overlay network for tracking dos floods, Proceedings of the 9th Conference on USENIX Security Symposium, pp.15-15, 2000. ,
NetFuse: Short-circuiting traffic surges in the cloud, 2013 IEEE International Conference on Communications (ICC), pp.3514-3518, 2013. ,
DOI : 10.1109/ICC.2013.6655095
Pi: a path identification mechanism to defend against DDoS attacks, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), pp.93-107, 2003. ,
DOI : 10.1109/SECPRI.2003.1199330
A DoS-limiting network architecture, ACM SIGCOMM Computer Communication Review, vol.35, issue.4, pp.241-252, 2005. ,
DOI : 10.1145/1090191.1080120
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013. ,
DOI : 10.1109/SURV.2013.031413.00127
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks, Computers & Security, vol.30, issue.6-7, pp.6-7, 2011. ,
DOI : 10.1016/j.cose.2011.06.002