{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T18:32:37Z","timestamp":1777401157107,"version":"3.51.4"},"reference-count":12,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. &amp; Syst."],"published-print":{"date-parts":[[2021,9,1]]},"DOI":"10.1587\/transinf.2021edl8022","type":"journal-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T22:18:58Z","timestamp":1630448338000},"page":"1496-1499","source":"Crossref","is-referenced-by-count":10,"title":["HTTP DDoS Flooding Attack Mitigation in Software-Defined Networking"],"prefix":"10.1587","volume":"E104.D","author":[{"given":"Sungho","family":"PARK","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Korea University"}]},{"given":"Youngjun","family":"KIM","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Korea University"}]},{"given":"Hyungoo","family":"CHOI","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Korea University"}]},{"given":"Yeunwoong","family":"KYUNG","sequence":"additional","affiliation":[{"name":"Division of Computer Engineering, Hanshin University"}]},{"given":"Jinwoo","family":"PARK","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Korea University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] S.T. Zargar, J. Joshi, and D. Tipper, \u201cA Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks,\u201d IEEE Communications Surveys &amp; Tutorials, vol.15, no.4, pp.2046-2069, 2013. 10.1109\/surv.2013.031413.00127","DOI":"10.1109\/SURV.2013.031413.00127"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] S. Dong, K. Abbas, and R. Jain, \u201cA Survey on Distributed Denial of Service (DDoS) Attacks in SDN and Cloud Computing Environments,\u201d IEEE Access, vol.7, pp.80813-80828, 2019. 10.1109\/access.2019.2922196","DOI":"10.1109\/ACCESS.2019.2922196"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] M. Mehra, M. Agarwal, R. Pawar, and D. Shah, \u201cMitigating denial of service attack using CAPTCHA mechanism,\u201d ICWET Workshop on Emerging Trends in Technology, ACM New York, NY, USA, pp.284-287, 2011. 10.1145\/1980022.1980086","DOI":"10.1145\/1980022.1980086"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] Q. Yan, F.R. Yu, Q. Gong, and J. Li, \u201cSoftware-Defined Networking (SDN) and Distributed Denial of Service (DDoS) Attacks in Cloud Computing Environments: A Survey, Some Research Issues, and Challenges,\u201d IEEE Communications Surveys &amp; Tutorials, vol.18, no.1, pp.602-622, 2016. 10.1109\/comst.2015.2487361","DOI":"10.1109\/COMST.2015.2487361"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] A.F.M. Piedrahita, S. Rueda, D.M.F. Mattos, and O.C.M.B. Duarte, \u201cFlowFence: A denial of service defense system for software defined networking,\u201d Proc. Global Inf. Infrastruct. Netw. Symp. (GIIS), pp.1-6, Oct. 2015. 10.1109\/giis.2015.7347185","DOI":"10.1109\/GIIS.2015.7347185"},{"key":"6","doi-asserted-by":"crossref","unstructured":"[6] S. Shin, V. Yegneswaran, P. Porras, and G. Gu, \u201cAvant-guard: Scalable and vigilant switch flow management in software-defined networks,\u201d Proc. ACM SIGSAC Conf. Comput. Commun. Secur., pp.413-424, 2013. 10.1145\/2508859.2516684","DOI":"10.1145\/2508859.2516684"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] J. Yang, X. Yang, Z. Zhou, X. Wu, T. Benson, and C. Hu, \u201cFocus: Function offloading from a controller to utilize switch power,\u201d Proc. IEEE NFV-SDN, 2016. 10.1109\/nfv-sdn.2016.7919498","DOI":"10.1109\/NFV-SDN.2016.7919498"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] D. Gao, Z. Liu, Y. Liu, C.H. Foh, T. Zhi, and H.-C. Chao, \u201cDefending against Packet-In messages flooding attack under SDN context,\u201d Soft Computing, vol.22, pp.6797-6809, 2018. 10.1007\/s00500-018-3407-3","DOI":"10.1007\/s00500-018-3407-3"},{"key":"9","doi-asserted-by":"publisher","unstructured":"[9] K. Hong, Y. Kim, H. Choi, and J. Park, \u201cSDN-Assisted Slow HTTP DDoS Attack Defense Method,\u201d IEEE Communications Letters, vol.22, no.4, pp.688-691, 2018. 10.1109\/lcomm.2017.2766636","DOI":"10.1109\/LCOMM.2017.2766636"},{"key":"10","unstructured":"[10] OpenFlow Switch Specification Version 1.5.1, Open Networking Foundation, https:\/\/www.opennetworking.org"},{"key":"11","unstructured":"[11] Mininet, http:\/\/mininet.org"},{"key":"12","unstructured":"[12] Apache HTTP server, https:\/\/httpd.apache.org"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/9\/E104.D_2021EDL8022\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,4]],"date-time":"2021-09-04T03:55:51Z","timestamp":1630727751000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transinf\/E104.D\/9\/E104.D_2021EDL8022\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,1]]},"references-count":12,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021]]}},"URL":"https:\/\/doi.org\/10.1587\/transinf.2021edl8022","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,9,1]]},"article-number":"2021EDL8022"}}