{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T01:28:56Z","timestamp":1743038936827,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":38,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811565830"},{"type":"electronic","value":"9789811565847"}],"license":[{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,30]],"date-time":"2020-10-30T00:00:00Z","timestamp":1604016000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-981-15-6584-7_21","type":"book-chapter","created":{"date-parts":[[2020,10,29]],"date-time":"2020-10-29T10:02:48Z","timestamp":1603965768000},"page":"207-217","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Detection and Prevention from DDoS Attack Using Software-Defined Security"],"prefix":"10.1007","author":[{"given":"Sumit","family":"Badotra","sequence":"first","affiliation":[]},{"given":"Surya Narayan","family":"Panda","sequence":"additional","affiliation":[]},{"given":"Priyanka","family":"Datta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,30]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Turner J et al (2008) OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput Commun Rev 38(2):69\u201374","DOI":"10.1145\/1355734.1355746"},{"key":"21_CR2","unstructured":"Sharma K, Khandelwal N, Prabhakar M (2011) An overview of security problems in MANET. In: ISEM international conference"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"O\u2019Brien WJ, Formoso CT, Ruben V, London K (2008) Construction supply chain management handbook. CRC Press","DOI":"10.1201\/9781420047462"},{"key":"21_CR4","unstructured":"Xia W, Wen Y, Foh CH, Niyato D, Xie H (2014) A survey on software-defined networking. IEEE Commun Surv Tutor 17(1):27\u201351"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Nunes BAA, Mendonca M, Nguyen XN, Obraczka K, Turletti T (2014) A survey of software-defined networking: past, present, and future of programmable networks. IEEE Commun Surv Tutor 16(3):1617\u20131634","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Braga R, de Souza Mota E, Passito A (2010) Lightweight DDoS flooding attack detection using NOX\/OpenFlow. In: LCN, vol 10, pp 408\u2013415","DOI":"10.1109\/LCN.2010.5735752"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Jun JH, Lee D, Ahn CW, Kim SH (2014) DDoS attack detection using flow entropy and packet sampling on huge networks of ICN, pp 185\u2013190","DOI":"10.1145\/2554850.2555109"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Jyothi V, Wang X, Addepalli SK, Karri R (2016) Brain: behavior based adaptive intrusion detection in networks: using hardware performance counters to detect ddos attacks. In: 2016 29th international conference on VLSI design and 2016 15th international conference on embedded systems (VLSID). IEEE, pp. 587\u2013588","DOI":"10.1109\/VLSID.2016.115"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Li J, Berg S, Zhang M, Reiher P, Wei T (2014) Drawbridge: software-defined ddos-resistant traffic engineering. ACM SIGCOMM Comput Commun Rev 44(4):591\u2013592 (ACM)","DOI":"10.1145\/2740070.2631469"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Wang X, Chen M, Xing C (2015) SDSNM: a software-defined security networking mechanism to defend against DDoS attacks. In: 2015 ninth international conference on frontier of computer science and technology. IEEE, pp 115\u2013121","DOI":"10.1109\/FCST.2015.27"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Yu J, Fang C, Lu L, Li Z (2010) Mitigating application layer distributed denial of service attacks via effective trust management. IET Commun 4(16):1952\u20131962","DOI":"10.1049\/iet-com.2009.0809"},{"key":"21_CR12","unstructured":"Singh KJ, De T (2015) DDOS attack detection and mitigation technique based on Http count and verification using CAPTCHA. In: 2015 international conference on computational intelligence and networks. IEEE, pp 196\u2013197"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Al-Ali Z, Al-Duwairi B, Al-Hammouri AT (2015) Handling system overload resulting from DDoS attacks and flash crowd events. In: 2015 IEEE 2nd international conference on cyber security and cloud computing. IEEE, pp. 512\u2013512","DOI":"10.1109\/CSCloud.2015.66"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Bhuyan MH, Bhattacharyya DK, Kalita JK (2015) An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection. Pattern Recogn Lett 51:1\u20137","DOI":"10.1016\/j.patrec.2014.07.019"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Qin X, Xu T, Wang C (2015) DDoS attack detection using flow entropy and clustering technique. In: 2015 11th international conference on computational intelligence and security (CIS). IEEE, pp 412\u2013415","DOI":"10.1109\/CIS.2015.105"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"David J, Thomas C (2015) DDoS attack detection using fast entropy approach on flow-based network traffic. Proc Comput Sci 50:30\u201336","DOI":"10.1016\/j.procs.2015.04.007"},{"key":"21_CR17","doi-asserted-by":"crossref","unstructured":"Yu S, Tian Y, Guo S, Wu DO (2013) Can we beat DDoS attacks in clouds? IEEE Trans Parallel Distrib Syst 25(9):2245\u20132254","DOI":"10.1109\/TPDS.2013.181"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Alqahtani S, Gamble RF (2015) DDoS attacks in service clouds. In: 2015 48th Hawaii international conference on system sciences. IEEE, pp 5331\u20135340","DOI":"10.1109\/HICSS.2015.627"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Shin S, Yegneswaran V, Porras P, Gu G (2013) Avant-guard: scalable and vigilant switch flow management in software-defined networks. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security. ACM, pp 413\u2013424","DOI":"10.1145\/2508859.2516684"},{"key":"21_CR20","doi-asserted-by":"crossref","unstructured":"Shoeb A, Chithralekha T (2016) Resource management of switches and controller during saturation time to avoid DDoS in SDN. In: 2016 IEEE international conference on engineering and technology (ICETECH). IEEE, pp. 152\u2013157","DOI":"10.1109\/ICETECH.2016.7569231"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Wang B, Zheng Y, Lou W, Hou YT (2015) DDoS attack protection in the era of cloud computing and software-defined networking. Comput Netw 81:308\u2013319","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Zheng J, Li Q, Gu G, Cao J, Yau DK, Wu J (2018) Realtime DDoS defense using COTS SDN switches via adaptive correlation analysis. IEEE Trans Inf Forensics Security 13(7):1838\u20131853","DOI":"10.1109\/TIFS.2018.2805600"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Tseng Y, Zhang Z, Na\u00eft-Abdesselam F (2016) Controllersepa: a security-enhancing SDN controller plug-in for openflow applications. In: 2016 17th international conference on parallel and distributed computing, applications and technologies (PDCAT). IEEE, pp 268\u2013273","DOI":"10.1109\/PDCAT.2016.064"},{"key":"21_CR24","doi-asserted-by":"crossref","unstructured":"Badotra S, Singh J (2019) Creating firewall in transport layer and application layer using software defined networking. In: Innovations in computer science and engineering. Springer, pp 95\u2013103","DOI":"10.1007\/978-981-10-8201-6_11"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Hameed S, Ahmed Khan H (2018) SDN based collaborative scheme for mitigation of DDoS attacks. Future Internet 10(3):23","DOI":"10.3390\/fi10030023"},{"key":"21_CR26","doi-asserted-by":"crossref","unstructured":"Pal C, Veena S, Rustagi RP, Murthy KNB (2014) Implementation of simplified custom topology framework in Mininet. In: 2014 Asia-Pacific conference on computer aided system engineering (APCASE). IEEE, pp 48\u201353","DOI":"10.1109\/APCASE.2014.6924470"},{"key":"21_CR27","doi-asserted-by":"crossref","unstructured":"Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN\/OpenFlow controllers. In: Proceedings of the 9th central & eastern European software engineering conference in Russia. ACM, p 1","DOI":"10.1145\/2556610.2556621"},{"key":"21_CR28","doi-asserted-by":"crossref","unstructured":"Chen M, Qian Y, Mao S, Tang W, Yang X (2016) Software-defined mobile networks security. Mob Netw Appl 21(5):729\u2013743","DOI":"10.1007\/s11036-015-0665-5"},{"key":"21_CR29","doi-asserted-by":"crossref","unstructured":"Badotra S, Panda SN (2020) SNORT based early DDoS detection system using Open daylight and open networking operating system in software-defined networking. In: Cluster Computing","DOI":"10.1007\/s10586-020-03133-y"},{"key":"21_CR30","doi-asserted-by":"crossref","unstructured":"Oktian YE, Lee S, Lee H, Lam J (2017) Distributed SDN controller system: a survey on design choice. Comput Netw 121:100\u2013111","DOI":"10.1016\/j.comnet.2017.04.038"},{"key":"21_CR31","unstructured":"Kaur S, Singh J, Ghumman NS (2014) Network programmability using POX controller. In: ICCCS international conference on communication, computing & systems, vol 138, IEEE"},{"key":"21_CR32","unstructured":"Ryu SDN Controller https:\/\/osrg.github.io\/ryu\/ . Accessed on 29 Apr 2019"},{"key":"21_CR33","doi-asserted-by":"crossref","unstructured":"Shalimov A, Zuikov D, Zimarina D, Pashkov V, Smeliansky R (2013) Advanced study of SDN\/OpenFlow controllers. In: Proceedings of the 9th central & eastern European software engineering conference in Russia. ACM, p 1","DOI":"10.1145\/2556610.2556621"},{"key":"21_CR34","unstructured":"Open Networking Foundation: ONF (2019). https:\/\/www.opennetworking.org . Accessed on 01 May 19"},{"key":"21_CR35","unstructured":"Badotra S, Panda SN Evaluation and comparison of OpenDayLight and open networking operating system in software-defined networking. Cluster Comput 1\u201311"},{"key":"21_CR36","unstructured":"Badotra S, Singh J (2017) Open daylight as a controller for software defined networking. Int J Adv Res Comput Sci 8(5)"},{"key":"21_CR37","doi-asserted-by":"crossref","unstructured":"Badotra S, Panda SN (2019) A review on software-defined networking enabled iot cloud computing. IIUM Eng J 20(2):105\u2013126","DOI":"10.31436\/iiumej.v20i2.1130"},{"key":"21_CR38","doi-asserted-by":"crossref","unstructured":"Morales LV, Murillo AF, Rueda SJ (2015) Extending the floodlight controller. In: 2015 IEEE 14th international symposium on network computing and applications. IEEE, pp 126\u2013133","DOI":"10.1109\/NCA.2015.11"}],"container-title":["Advances in Intelligent Systems and Computing","Progress in Advanced Computing and Intelligent Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-6584-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T11:27:20Z","timestamp":1669375640000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-6584-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"ISBN":["9789811565830","9789811565847"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-6584-7_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"30 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}