{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:57:13Z","timestamp":1775145433120,"version":"3.50.1"},"reference-count":124,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1504602"],"award-info":[{"award-number":["U1504602"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2015M572141"],"award-info":[{"award-number":["2015M572141"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Scientific and Technological Research Projects in Henan Province","award":["192102210125"],"award-info":[{"award-number":["192102210125"]}]},{"name":"Science and Technology Department Research Project of Henan Province","award":["162102310147"],"award-info":[{"award-number":["162102310147"]}]},{"DOI":"10.13039\/501100009101","name":"Education Department of Henan Province","doi-asserted-by":"publisher","award":["14A520065"],"award-info":[{"award-number":["14A520065"]}],"id":[{"id":"10.13039\/501100009101","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2922196","type":"journal-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T20:00:14Z","timestamp":1560369614000},"page":"80813-80828","source":"Crossref","is-referenced-by-count":218,"title":["A Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4616-6519","authenticated-orcid":false,"given":"Shi","family":"Dong","sequence":"first","affiliation":[]},{"given":"Khushnood","family":"Abbas","sequence":"additional","affiliation":[]},{"given":"Raj","family":"Jain","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"2013","journal-title":"How SDN Applications Will Change Layer 4&#x2013;7 Network Services"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23283"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413206"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342453"},{"key":"ref31","article-title":"A protection method on SDN using sFlow and snort for SYN flooding attack","author":"bang","year":"2014","journal-title":"Proc 3rd Int Conf Smart Media Appl"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1007\/978-3-642-40576-1_25","article-title":"VM profile based optimized network attack pattern detection scheme for DDOS attacks in cloud","author":"gupta","year":"2013","journal-title":"Proc Int Symp Secur Comput Commun"},{"key":"ref37","first-page":"68","article-title":"Uncover security design flaws using the stride approach","author":"hernan","year":"2006","journal-title":"MSDN Magazine-Louisville"},{"key":"ref36","author":"hendler","year":"2001","journal-title":"DARPA 2000 Hendler James DARPA Agent Mark Up Language (DAML)"},{"key":"ref35","first-page":"29","article-title":"Assessing the security risks of cloud computing","volume":"27","author":"heiser","year":"2008","journal-title":"Gartner Report"},{"key":"ref34","first-page":"71","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"Proc USENIX\/ACM Symp Netw Syst Design Implement"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2014.77"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2358236"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2012.12.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194894"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.144"},{"key":"ref24","author":"finnie","year":"2012","journal-title":"The Role of DPI in An SDN World"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2014.2325045"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.02.026"},{"key":"ref25","first-page":"550","article-title":"Time-based DDoS detection and mitigation for SDN controller","author":"dharma","year":"2015","journal-title":"Proc 15th Asia&#x2013;Pacific Netw Oper Manage Symp (APNOMS)"},{"key":"ref50","author":"owski","year":"2014","journal-title":"Computer Security&#x2014;ESORICS 2014"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1868447.1868466"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"ref58","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/978-3-642-23644-0_9","article-title":"Revisiting traffic anomaly detection using software defined networking","author":"mehdi","year":"2011","journal-title":"Recent Advances in Intrusion Detection RAID 98"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/PDGC.2010.5679897"},{"key":"ref56","first-page":"975","article-title":"A reactive defense mechanism based on an analytical approach to mitigate DDoS attacks and improve network performance","volume":"12","author":"mann","year":"2011","journal-title":"Int J Comput Appl"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2011.5958005"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2013.1.170"},{"key":"ref53","article-title":"As cloud use grows, so will rate of DDoS attacks","author":"linthicum","year":"2013"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.329"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2328587"},{"key":"ref3","article-title":"Gartner: Application layer ddos attacks to increase in 2013","author":"sher","year":"2013"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"ref5","article-title":"Arbor special report: Worldwide infrastructure security report","author":"anstee","year":"2012"},{"key":"ref8","article-title":"Nist special publication on intrusion detection systems","author":"bace","year":"2001"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491199"},{"key":"ref7","first-page":"234","article-title":"Security threats and countermeasures in cloud computing","volume":"1","author":"ashktorab","year":"2012","journal-title":"Int J Appl Innov Eng Manage (IJAIEM)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2010.56"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2013.6733671"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2013.055724"},{"key":"ref48","first-page":"1","article-title":"Intrusion detection: Host-based and network-based intrusion detection systems","volume":"11","author":"kozushko","year":"2003","journal-title":"Independent Study"},{"key":"ref47","first-page":"205","article-title":"DDos detection and analysis in SDN-based environment using support vector machine classifier","author":"rt","year":"2014","journal-title":"Proc 6th Int Conf Adv Comput (ICoAC)"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/GREE.2013.24"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320094"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICICES.2014.7033841"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2015.7140489"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5279"},{"key":"ref73","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/978-3-540-45248-5_3","article-title":"Detecting anomalous network traffic with self-organizing maps","author":"ramadas","year":"2003","journal-title":"Recent Advances in Intrusion Detection"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342466"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1216370.1216373"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/AINA.2014.114"},{"key":"ref76","first-page":"729","article-title":"Intrusion detection in the cloud","author":"roschke","year":"2009","journal-title":"Proc 8th IEEE Int Conf Dependable Autonomic Secure Comput"},{"key":"ref77","year":"2014","journal-title":"SDN and Security Network Versus Applications"},{"key":"ref74","first-page":"173","article-title":"uLeepp: An ultra-lightweight energy-efficient and privacy-protected scheme for pervasive and mobile WBSN-cloud communications","volume":"27","author":"ren","year":"2015","journal-title":"Ad Hoc Sensor Wireless Netw"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/NCM.2009.218"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6553676"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221998"},{"key":"ref60","author":"gonsalves","year":"2013","journal-title":"Mobile Devices Set to Become Next DDoS Attack Tool"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"ref61","doi-asserted-by":"crossref","DOI":"10.22215\/etd\/2014-10230","article-title":"Early detection of DDoS attacks in software defined networks controller","author":"mousavi","year":"2014"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.64"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477944"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN.2015.7073820"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.jnca.2016.01.001","article-title":"Distributed denial of service (DDoS) resilience in cloud: Review and conceptual cloud DDoS mitigation framework","volume":"67","author":"osanaiye","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2010.113"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/IMIS.2014.33"},{"key":"ref2","author":"lohman","year":"2011","journal-title":"DDoS is Cloud&#x2019;s Security Achilles Heel"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-014-1242-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2015.2414822"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2416177"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.117"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2011.6089085"},{"key":"ref94","author":"alva","year":"2013","journal-title":"The Notorious Nine Cloud Computing Top Threats in 2013"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/CSAE.2012.6272848"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2012.051512.120467"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/GREE.2013.25"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41030-7_24"},{"key":"ref105","author":"xie","year":"2012","journal-title":"Use Cases for ALTO with Software Defined Networks"},{"key":"ref91","first-page":"1","article-title":"Implementation of content-oriented networking architecture (CONA): A focus on DDoS countermeasure","author":"suh","year":"2010","journal-title":"Proc of the European NetFPGA Developers Workshop"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.060912.00182"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.101613.00077"},{"key":"ref103","first-page":"327","article-title":"OFRewind: Enabling record and replay troubleshooting for networks","author":"wundsam","year":"2011","journal-title":"Proc USENIX Annu Tech Conf"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.27"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/2620728.2620739"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1109\/ICCT.2010.5689156"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.181"},{"key":"ref98","first-page":"123","article-title":"Future of DDoS attacks mitigation in software defined networks","author":"vizv\u00e1ry","year":"2014","journal-title":"Proc IFIP Int Conf Auton Infrastruct Manage Secur"},{"key":"ref99","first-page":"1","article-title":"OF-GUARD: A DoS attack prevention extension in software-defined networks","author":"wang","year":"2014","journal-title":"Proc Poster Session Open Netw Summit"},{"key":"ref96","first-page":"2430","article-title":"Securing cloud computing environment by means of intrusion detection and prevention system (IDPS)","volume":"2","author":"ubhale","year":"2013","journal-title":"Int J Comput Sci Manage Res"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.5120\/5807-8063"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2012.49"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"ref12","year":"2011","journal-title":"Arbor Application Brief The Growing Threat of Application-Layer DDoS Attacks"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2411739"},{"key":"ref14","first-page":"65","article-title":"A service-oriented cloud computing network management architecture for wireless sensor networks","volume":"22","author":"chang","year":"2014","journal-title":"The Journal of Ad Hoc and Sensor Wireless Networks"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2013.114"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600970"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.86"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/WiMOB.2018.8589104"},{"key":"ref17","first-page":"28","article-title":"Detecting Web based DDoS attack using mapreduce operations in cloud computing environment","volume":"3","author":"choi","year":"2013","journal-title":"J Internet Services Inf Secur"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491220"},{"key":"ref18","first-page":"309","article-title":"A feasible method to combat against DDoS attack in SDN network","author":"dao","year":"2015","journal-title":"Proc Int Conf Inf Netw (ICOIN)"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.07.021"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2017.8024605"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.04.245"},{"key":"ref83","first-page":"1","article-title":"FRESCO: Modular composable security services for software-defined networks","author":"shin","year":"2013","journal-title":"Proc 20th Annu Netw Distrib Syst Secur Symp (NDSS)"},{"key":"ref114","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1016\/j.jnca.2016.09.001","article-title":"A survey on service function chaining","volume":"75","author":"bhamare","year":"2016","journal-title":"J Netw Comput Appl"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"ref116","first-page":"37","article-title":"The coremelt attack","author":"studer","year":"2009","journal-title":"Proc 14th Eur Conf Res Comput Secur"},{"key":"ref80","first-page":"67","article-title":"Intrusion detection system for cloud computing","volume":"1","author":"shelke","year":"2012","journal-title":"Int J Sci Technol Res"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E.2015.49"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2869997"},{"key":"ref89","first-page":"37","article-title":"The coremelt attack","author":"studer","year":"2009","journal-title":"Proc Euro Symp Res Computer Security"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0800-9"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0754-y"},{"key":"ref123","article-title":"Optimal load distribution for the detection of VM-based DDoS attacks in the cloud","author":"wahab","year":"0","journal-title":"IEEE Trans Serv Comput"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935055"},{"key":"ref86","first-page":"543","article-title":"Distributed denial of service: Taxonomies of attacks, tools, and countermeasures","author":"specht","year":"2004","journal-title":"Proc 17th Int Conf Parallel Distrib Comput Syst (ISCA)"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2011.17"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2014.80"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08735686.pdf?arnumber=8735686","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T08:43:50Z","timestamp":1643273030000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8735686\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":124,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2922196","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}