K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments, Computer Networks, vol.62, pp.122-136, 2014.
DOI : 10.1016/j.bjp.2013.10.014

G. Bianchi, M. Bonola, A. Capone, and C. Cascone, OpenState, ACM SIGCOMM Computer Communication Review, vol.44, issue.2, pp.44-51, 2014.
DOI : 10.1145/2602204.2602211

A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, ACM SIGCOMM Computer Communication Review, pp.217-228, 2005.
DOI : 10.1145/1080091.1080118

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.4156

G. Bianchi, M. Bonola, S. Pontarelli, D. Sanvito, A. Capone et al., Open Packet Processor: a programmable architecture for wire speed platform-independent stateful in-network processing, pp.1-14, 2016.

C. Douligeris and A. Mitrokotsa, DDoS attacks and defense mechanisms: classification and state-of-the-art, Computer Networks, vol.44, issue.5, pp.643-666, 2004.
DOI : 10.1016/j.comnet.2003.10.003

J. Park, K. Iwai, H. Tanaka, and T. Kurokawa, Analysis of slow read dos attack, ISITA, pp.60-64, 2014.
DOI : 10.17781/p001550

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.675.7029

M. Dhawan, R. Poddar, K. Mahajan, and V. Mann, SPHINX: Detecting Security Attacks in Software-Defined Networks, Proceedings 2015 Network and Distributed System Security Symposium, 2015.
DOI : 10.14722/ndss.2015.23064

N. G. Dharma, M. F. Muthohar, J. D. Prayuda, K. Priagung, and D. Choi, Time-based DDoS detection and mitigation for SDN controller, 2015 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.550-553, 2015.
DOI : 10.1109/APNOMS.2015.7275389

Y. E. Oktian, S. Lee, and H. Lee, Mitigating Denial of Service (DoS) attacks in OpenFlow networks, 2014 International Conference on Information and Communication Technology Convergence (ICTC), pp.325-330, 2014.
DOI : 10.1109/ICTC.2014.6983147

C. Chung, P. Khatkar, T. Xing, J. Lee, and D. Huang, NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems, IEEE Transactions on Dependable and Secure Computing, vol.10, issue.4, pp.198-211, 2013.
DOI : 10.1109/TDSC.2013.8

T. Chin, X. Mountrouidou, X. Li, and K. Xiong, An SDN-supported collaborative approach for DDoS flooding detection and containment, MILCOM 2015, 2015 IEEE Military Communications Conference, pp.659-664, 2015.
DOI : 10.1109/MILCOM.2015.7357519

S. Shin, V. Yegneswaran, P. Porras, and G. Gu, AVANT-GUARD, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.413-424, 2013.
DOI : 10.1145/2508859.2516684

N. Mckeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson et al., OpenFlow, ACM SIGCOMM Computer Communication Review, vol.38, issue.2, p.69, 2008.
DOI : 10.1145/1355734.1355746

F. Soldo and A. Metwally, Traffic anomaly detection based on the IP size distribution, 2012 Proceedings IEEE INFOCOM, pp.2005-2013, 2012.
DOI : 10.1109/INFCOM.2012.6195581

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.674.5150

V. Mann, A. Vishnoi, and S. Bidkar, Living on the edge: Monitoring network flows at the edge in cloud data centers, 2013 Fifth International Conference on Communication Systems and Networks (COMSNETS), pp.1-9, 2013.
DOI : 10.1109/COMSNETS.2013.6465540

Z. Liu, A. Manousis, G. Vorsanger, V. Sekar, and V. Braverman, One Sketch to Rule Them All, Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference, SIGCOMM '16, pp.101-114, 2016.
DOI : 10.1145/2934872.2934906

R. Bifulco, J. Boite, M. Bouet, and F. Schneider, Improving SDN with InSPired Switches, Proceedings of the Symposium on SDN Research, SOSR '16, 2016.
DOI : 10.1145/2890955.2890962

M. Team, S. Mininet, and . Sanfilippo, Available: http://mininet.org [25] Tcpreplay sample captures, 2006.