{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:50:09Z","timestamp":1777704609124,"version":"3.51.4"},"reference-count":79,"publisher":"SAGE Publications","issue":"6","license":[{"start":{"date-parts":[[2018,7,18]],"date-time":"2018-07-18T00:00:00Z","timestamp":1531872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2018,12,24]]},"abstract":"<jats:p>Software Defined Networking (SDN) is an emerging paradigm, which brings the network innovation and attracts both the industries and researchers. SDN is a programmable network model that separates the control logic from the forwarding plane. The centralize control plane takes care of all networking resources. The attackers target the SDN controller, to paralyze the logic plane that is considered as the brain of the network which provides a lot of benefits. However, due to the characteristics the control plane becomes the attractive target of security attacks for the adversaries. One of the most known threats is Distributed Denial-of-Service (DDoS) attacks with the goal to exhausting network resources by sending heavy traffic to them, causing network congestion. Since SDN was proposed, DDoS attack has become a popular research field in SDN security and many researchers have been presented DDoS attacks detection, prevention and mitigation solutions in SDN environment using different methods. This paper surveys the previous researches in DDoS attacks detection and mitigation based methods available in SDN environment.<\/jats:p>","DOI":"10.3233\/jifs-169833","type":"journal-article","created":{"date-parts":[[2018,7,20]],"date-time":"2018-07-20T12:28:24Z","timestamp":1532089704000},"page":"5913-5925","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":15,"title":["Strategies for detecting and mitigating DDoS attacks in SDN: A survey"],"prefix":"10.1177","volume":"35","author":[{"given":"Misenga Mumpela","family":"Jo\u00eblle","sequence":"first","affiliation":[{"name":"Division of Computer Science, Sookmyung Women\u2019s University, South Korea, Seoul"}]},{"given":"Young-Hoon","family":"Park","sequence":"additional","affiliation":[{"name":"Division of Computer Science, Sookmyung Women\u2019s University, South Korea, Seoul"}]}],"member":"179","published-online":{"date-parts":[[2018,7,18]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"MumpelaM.J. and ParkY.-H. Sdn-based ddos attacks security: Popular detection and mitigation techniques in International Conference on Green and Human Information Technology (ICGHIT) 2018 2018 pp. 108\u2013113."},{"key":"e_1_3_2_3_2","doi-asserted-by":"crossref","unstructured":"ZubaydiH.D. AnbarM. and WeyC.Y. Review on detection techniques against ddos attacks on a software-defined networking controller in 2017 Palestinian International Conference on Information and Communication Technology (PICICT) 2017 pp. 10\u201316.","DOI":"10.1109\/PICICT.2017.26"},{"key":"e_1_3_2_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2487361"},{"key":"e_1_3_2_5_2","unstructured":"ShuZ. WanJ. LiD. LinJ. VasilakosA. and ImranM. Security in software-defined networking: Threats and coun-termeasures 21 (2016)."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"DimovS. Global Satellite Meteorological Observation (GSMO) Theory: Volume 1 2018.","DOI":"10.1007\/978-3-319-67047-8_1"},{"key":"e_1_3_2_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2474118"},{"key":"e_1_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2618874"},{"key":"e_1_3_2_9_2","unstructured":"SaxenaM. and KumarR. A recent trends in software defined networking (sdn) security in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) 2016 pp. 851\u2013855."},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","unstructured":"GerolaM. SantuariM. SalvadoriE. SalsanoS. VentreP.L. CampanellaM. LombardoF. and SiracusanoG. Icona: Inter cluster onos network application in Proceedings of the 2015 1st IEEE Conference on Network Softwarization (Net- Soft) 2015 pp. 1\u20132.","DOI":"10.1109\/NETSOFT.2015.7116173"},{"key":"e_1_3_2_11_2","doi-asserted-by":"crossref","unstructured":"SoodK. YuS. XiangY. and PengS. Control layer resource management in sdn-iot networks using multi-objective constraint in 2016 IEEE 11th Conference on Industrial Electronics and Applications (ICIEA) 2016 pp. 71\u201376.","DOI":"10.1109\/ICIEA.2016.7603554"},{"key":"e_1_3_2_12_2","unstructured":"ErtaulL. and VenkatachalamK. Security of software defined networks (sdn) 2017."},{"key":"e_1_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6829966"},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","unstructured":"McKeownN. AndersonT. BalakrishnanH. ParulkarG. PetersonL.L. RexfordJ. ShenkerS. and TurnerJ. Openflow: Enabling innovation in campus networks 38 (2008) 69\u201374.","DOI":"10.1145\/1355734.1355746"},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","unstructured":"FarhadH. LeeH. and NakaoA. Data plane programmability in sdn in 2014 IEEE 22nd International Conference on Network Protocols 2014 pp. 583\u2013588.","DOI":"10.1109\/ICNP.2014.93"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","unstructured":"KuzniarM. PeresiniP. CaniniM. VenzanoD. and KosticD. A soft way for openflow switch interoperability testing in Proceedings ofthe 8th International Conference on Emerging Networking Experiments and Technologies ser. CoNEXT '12. New York NY USA: ACM 2012 pp. 265\u2013276. [Online]. Available: http:\/\/doi.acm.org\/ 10.1145\/2413176.2413207","DOI":"10.1145\/2413176.2413207"},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","unstructured":"ZhongH. ShengJ. CuiJ. and XuY. Scplbs: A smart cooperative platform for load balancing and security on sdn distributed controllers in 2017 3rd IEEE International Conference on Cybernetics (CYBCONF) 2017 pp. 1\u20136.","DOI":"10.1109\/CYBConf.2017.7985806"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","unstructured":"XingT. HuangD. XuL. ChungC.J. and KhatkarP. Snortflow: A openflow-based intrusion prevention system in cloud environment in 2013 Second GENI Research and Educational Experiment Workshop 2013 pp. 89\u201392.","DOI":"10.1109\/GREE.2013.25"},{"key":"e_1_3_2_19_2","doi-asserted-by":"crossref","unstructured":"MartinezC. FerroR. and RuizW. Next generation networks under the sdn and openflow protocol architecture in 2015 Workshop on Engineering Applications - International Congress on Engineering (WEA) 2015 pp. 1\u20137.","DOI":"10.1109\/WEA.2015.7370147"},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","unstructured":"SieberC. BlenkA. BastaA. HockD. and KellererW. Towards a programmable management plane for sdn and legacy networks in 2016 IEEE NetSoft Conference and Workshops (NetSoft) 2016 pp. 319\u2013327.","DOI":"10.1109\/NETSOFT.2016.7502428"},{"key":"e_1_3_2_21_2","doi-asserted-by":"crossref","unstructured":"Nishtha and SoodM. Software defined network; architectures in 2014 International Conference on Parallel Distributed and Grid Computing 2014 pp. 451\u2013456.","DOI":"10.1109\/PDGC.2014.7030788"},{"key":"e_1_3_2_22_2","unstructured":"ThangasamyP. and BelissaT. Distributed denial of service (ddos) attack detection in software defined networking with cloud computing 07 (2017) 12685\u201312690."},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Scott-HaywardS. O\u2019CallaghanG. and SezerS. Sdn security: A survey in 2013 IEEE SDN for Future Networks and Services (SDN4FNS) 2013 pp. 1\u20137.","DOI":"10.1109\/SDN4FNS.2013.6702553"},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-017-2414-5"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"e_1_3_2_26_2","unstructured":"AlomariE. ManickamS. GuptaB.B. KaruppayahS. and AlfarisR. Botnet-based distributed denial of service (ddos) attacks on web servers classification and arts 012013."},{"key":"e_1_3_2_27_2","unstructured":"GuptaB.B. and JamaliN. Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression 012013."},{"key":"e_1_3_2_28_2","unstructured":"ThyagarajanK. and ThangaveluA. An integrated defense approach for distributed denial of service attacks in mobile adhoc network 2016."},{"key":"e_1_3_2_29_2","doi-asserted-by":"crossref","unstructured":"MousaviS.M. and St-HilaireM. Early detection of ddos attacks against sdn controllers in 2015 International Conference on Computing Networking and Communications (ICNC) 2015 pp. 77\u201381.","DOI":"10.1109\/ICCNC.2015.7069319"},{"key":"e_1_3_2_30_2","doi-asserted-by":"crossref","unstructured":"MallikarjunanK.N. MuthupriyaK. and ShalinieS.M. A survey of distributed denial of service attack in 2016 10th International Conference on Intelligent Systems and Control (ISCO) 2016 pp. 1\u20136.","DOI":"10.1109\/ISCO.2016.7727096"},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","unstructured":"DayalN. and SrivastavaS. Analyzing beavihor of ddos attacks to identify ddos detection features in sdn in 2017 9th International Conference on Communication Systems and Networks (COMSNETS) 2017 pp. 274\u2013281.","DOI":"10.1109\/COMSNETS.2017.7945387"},{"key":"e_1_3_2_32_2","unstructured":"NogueiraM. Non-parametric early warning signals from volumetric ddos attacks CoRR vol. abs\/0 2016. [Online]. Available: http:\/\/arxiv.org\/abs\/1609.09560."},{"key":"e_1_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_34_2","unstructured":"DekaR. BhattacharyyaD.K. and Kumar KalitaJ. Ddos attacks: Tools mitigation approaches and probable impact on private cloud environment 2017."},{"key":"e_1_3_2_35_2","doi-asserted-by":"crossref","unstructured":"SinghB. KumarK. and BhandariA. Simulation study of application layer ddos attack in International Conference on Green Computing and Internet of Things (ICGCIoT) 2015 pp. 893\u2013898.","DOI":"10.1109\/ICGCIoT.2015.7380589"},{"key":"e_1_3_2_36_2","doi-asserted-by":"crossref","unstructured":"DantasY.G. NigamV. and FonsecaI.E. A selective defense for application layer ddos attacks in 2014 IEEE Joint Intelligence and Security Informatics Conference 2014 pp. 75\u201382.","DOI":"10.1109\/JISIC.2014.21"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","unstructured":"PetrovicM. and AboelazeM. Performance of tcp\/udp under ad hoc ieee802.11 in 10th International Conference on Telecommunications 2003. ICT 2003 vol. 1 2003 pp. 700\u2013708.","DOI":"10.1109\/ICTEL.2003.1191496"},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","unstructured":"KolahiS.S. TreseangratK. and SarrafpourB. Analysis of udp ddos flood cyber attack and defense mechanisms on web server with linux ubuntu 13 in Communications Signal Processing and their Applications (ICCSPA) 2015 International Conference on 2015 pp. 1\u20135.","DOI":"10.1109\/ICCSPA.2015.7081286"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2003.10.003"},{"key":"e_1_3_2_40_2","doi-asserted-by":"crossref","unstructured":"YadavV. TrivediD.M. and MehtreB.M. Dda: An approach to handle ddos (ping flood) attack 2016 pp. 11\u201323.","DOI":"10.1007\/978-981-10-0129-1_2"},{"key":"e_1_3_2_41_2","unstructured":"BogdanoskiM. and RisteskiA. Wireless network beavihor under icmp ping flood dos attack and mitigation techniques. vol. 3 2011."},{"key":"e_1_3_2_42_2","unstructured":"GuptaN. JainA. SainiP. and GuptaV. Ddos attack algorithm using icmp flood in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom) 2016 pp. 4082\u20134084."},{"key":"e_1_3_2_43_2","doi-asserted-by":"crossref","unstructured":"GeethaK. and SreenathN. Syn flooding attack; identification and analysis in International Conference on Information Communication and Embedded Systems (ICICES2014) 2014 pp. 1\u20137.","DOI":"10.1109\/ICICES.2014.7033828"},{"key":"e_1_3_2_44_2","doi-asserted-by":"crossref","unstructured":"RudmanL. and IrwinB. Characterization and analysis of ntp amplification based ddos attacks in 2015 Information Security for South Africa (ISSA) 2015 pp. 1\u20135.","DOI":"10.1109\/ISSA.2015.7335069"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","unstructured":"ChwalinskiP. BelavkinR. and ChengX. Detection of application layer ddos attacks with clustering and bayes factors in 2013 IEEE International Conference on Systems Man and Cybernetics 2013 pp. 156\u2013161.","DOI":"10.1109\/SMC.2013.34"},{"key":"e_1_3_2_46_2","doi-asserted-by":"crossref","unstructured":"JiangM. WangC. LuoX. MiuM. and ChenT. Characterizing the impacts of application layer ddos attacks in 2017 IEEE International Conference on Web Services (ICWS) 2017 pp. 500\u2013507.","DOI":"10.1109\/ICWS.2017.58"},{"key":"e_1_3_2_47_2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7081075"},{"key":"e_1_3_2_48_2","doi-asserted-by":"crossref","unstructured":"MetiN. NarayanD.G. and BaligarV.P. Detection of distributed denial of service attacks using machine learning algorithms in software defined networks in 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) 2017 pp. 1366\u20131371.","DOI":"10.1109\/ICACCI.2017.8126031"},{"key":"e_1_3_2_49_2","doi-asserted-by":"crossref","unstructured":"YangJ.S. ParkM.W. and ChungT.M. A study on low-rate ddos attacks in real networks in 2013 International Conference on Information Science and Applications (ICISA) 2013 pp. 1\u20134.","DOI":"10.1109\/ICISA.2013.6579418"},{"key":"e_1_3_2_50_2","doi-asserted-by":"crossref","unstructured":"SowkarthigaP. and SugunaN. Finding the ddos attacks in the network using distance based routing in 2013 International Conference on Current Trends in Engineering and Technology (ICCTET) 2013 pp. 410\u2013412.","DOI":"10.1109\/ICCTET.2013.6675999"},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","unstructured":"SchiffL. and SchmidS. Study the past if you would define the future: Implementing secure multi-party sdn updates in 2016 IEEE International Conference on Software Science Technology and Engineering (SWSTE) 2016 pp. 111\u2013116.","DOI":"10.1109\/SWSTE.2016.24"},{"key":"e_1_3_2_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2626287"},{"key":"e_1_3_2_53_2","doi-asserted-by":"crossref","unstructured":"McHaleL. CaseyJ. GratzP.V. and SprintsonA. Stochastic pre-classification for sdn data plane matching in 2014 IEEE 22nd International Conference on Network Protocols 2014 pp. 596\u2013602.","DOI":"10.1109\/ICNP.2014.95"},{"issue":"99","key":"e_1_3_2_54_2","first-page":"1","article-title":"Security threats in the data plane of software-defined networks","author":"Gao S.","year":"2018","unstructured":"GaoS., LiZ., XiaoB. and WeiG., Security threats in the data plane of software-defined networks, IEEE NetworkPP(99) (2018), 1\u20136.","journal-title":"IEEE Network"},{"key":"e_1_3_2_55_2","doi-asserted-by":"crossref","unstructured":"KreutzF.M.R.D. and VerissimoP. Towards secure and dependable software defined networks 2013 pp. 55\u201360.","DOI":"10.1145\/2491185.2491199"},{"key":"e_1_3_2_56_2","doi-asserted-by":"crossref","unstructured":"LeeC.P. LimK.M. and WoonW.L. Statistical and entropy based abnormal motion detection in 2010 IEEE Student Conference on Research and Development (SCOReD)2010 pp. 192\u2013197.","DOI":"10.1109\/SCORED.2010.5704000"},{"key":"e_1_3_2_57_2","doi-asserted-by":"crossref","unstructured":"SharmaS. SahuS. and JenaS. On selection of attributes for entropy based detection of ddos 2015 pp. 1096\u20131100.","DOI":"10.1109\/ICACCI.2015.7275756"},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_9"},{"key":"e_1_3_2_60_2","doi-asserted-by":"crossref","unstructured":"OshimaS. NakashimaT. and SueyoshiT. Early dos\/ddos detection method using short-term statistics in 2010 International Conference on Complex Intelligent and Software Intensive Systems 2010 pp. 168\u2013173.","DOI":"10.1109\/CISIS.2010.53"},{"key":"e_1_3_2_61_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.bjp.2013.10.014"},{"key":"e_1_3_2_62_2","first-page":"V2\u201367","article-title":"An advanced entropy-based ddos detection scheme","volume":"2","author":"Zhang J.","year":"2010","unstructured":"ZhangJ., QinZ., OuL., JiangP., LiuJ. and LiuA.X., An advanced entropy-based ddos detection scheme, in 2010 International Conference on Information, Networking and Automation (ICINA)2 (2010), V2\u201367\u2013V2\u201371.","journal-title":"2010 International Conference on Information, Networking and Automation (ICINA)"},{"key":"e_1_3_2_63_2","doi-asserted-by":"crossref","unstructured":"PopovskyyV. and SkibinV. Entropy methods for ddos attacks detection in telecommunication systems in 2014 First International Scientific-Practical Conference Problems of Infocommunications Science and Technology 2014 pp. 182\u2013185.","DOI":"10.1109\/INFOCOMMST.2014.6992345"},{"key":"e_1_3_2_64_2","doi-asserted-by":"crossref","unstructured":"RebecchiF. BoiteJ. NardinP.A. BouetM. and ConanV. Traffic monitoring and ddos detection using stateful sdn in 2017 IEEE Conference on Network Softwarization (NetSoft) 2017 pp. 1\u20132.","DOI":"10.1109\/NETSOFT.2017.8004256"},{"key":"e_1_3_2_65_2","doi-asserted-by":"crossref","unstructured":"ChippalkattiO. and NimbhorkarS.U. An approach for detection of attacks in software defined networks in 2017 International Conference on Innovations in Information Embedded and Communication Systems (ICIIECS) March 2017 pp. 1\u20133.","DOI":"10.1109\/ICIIECS.2017.8276106"},{"key":"e_1_3_2_66_2","doi-asserted-by":"crossref","unstructured":"HuD. HongP. and ChenY. Fadm: Ddos flooding attack detection and mitigation system in software-defined networking in GLOBECOM 2017 - 2017 IEEE Global Communications Conference 2017 pp. 1\u20137.","DOI":"10.1109\/GLOCOM.2017.8254023"},{"key":"e_1_3_2_67_2","doi-asserted-by":"crossref","unstructured":"GuesmiH. and SaidaneL.A. Using sdn approach to secure cloud servers against flooding based ddos attacks in 2017 25th International Conference on Systems Engineering (ICSEng) 2017 pp. 309\u2013315.","DOI":"10.1109\/ICSEng.2017.31"},{"key":"e_1_3_2_68_2","doi-asserted-by":"crossref","unstructured":"AshrafJ. and LatifS. Handling intrusion and ddos attacks in software defined networks using machine learning techniques in 2014 National Software Engineering Conference 2014 pp. 55\u201360.","DOI":"10.1109\/NSEC.2014.6998241"},{"key":"e_1_3_2_69_2","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"e_1_3_2_70_2","unstructured":"DillonM. and BerkelaarC. Openflow (d) dos mitigation. technical report (2014). [Online]. Available: http:\/\/www.delaat.net\/rp\/2013-2014\/p42\/report.pdf"},{"key":"e_1_3_2_71_2","doi-asserted-by":"crossref","unstructured":"BarkiL. ShidlingA. MetiN. NarayanD.G. and MullaM.M. Detection of distributed denial of service attacks in software defined networks in 2016 International Conference on Advances in Computing Communications and Informatics (ICACCI) 2016 pp. 2576\u20132581.","DOI":"10.1109\/ICACCI.2016.7732445"},{"key":"e_1_3_2_72_2","doi-asserted-by":"crossref","unstructured":"NandaS. ZafariF. DeCusatisC. WedaaE. and YangB. Predicting network attack patterns in sdn using machine learning approach in 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN) 2016 pp. 167\u2013172.","DOI":"10.1109\/NFV-SDN.2016.7919493"},{"key":"e_1_3_2_73_2","doi-asserted-by":"crossref","unstructured":"AhmedM.E. KimH. and ParkM. Mitigating dns querybased ddos attacks with machine learning on software-defined networking in MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM) 2017 pp. 11\u201316.","DOI":"10.1109\/MILCOM.2017.8170802"},{"key":"e_1_3_2_74_2","doi-asserted-by":"crossref","unstructured":"BhuniaS.S. and GurusamyM. Dynamic attack detection and mitigation in iot using sdn in 2017 27th International Telecommunication Networks and Applications Conference (ITNAC) 2017 pp. 1\u20136.","DOI":"10.1109\/ATNAC.2017.8215418"},{"key":"e_1_3_2_75_2","doi-asserted-by":"crossref","unstructured":"MoralesL.V. MurilloA.F. and RuedaS.J. Extending the floodlight controller in 2015 IEEE 14th International Symposium on Network Computing and Applications2015 pp. 126\u2013133.","DOI":"10.1109\/NCA.2015.11"},{"key":"e_1_3_2_76_2","doi-asserted-by":"crossref","unstructured":"KalkanK. G\u00fcrG. and Alag\u00f6zF. Sdnscore: A statistical defense mechanism against ddos attacks in sdn environment in 2017 IEEE Symposium on Computers and Communications (ISCC)2017 pp. 669\u2013675.","DOI":"10.1109\/ISCC.2017.8024605"},{"key":"e_1_3_2_77_2","unstructured":"AliS.T. SivaramanV. RadfordA. and JhaS. Denial-ofservice (dos) secured virtual tenant networks (vtn). as whitepaper by radware and nec corporation 2012 IEEE Transactions on Reliability."},{"key":"e_1_3_2_78_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2421391"},{"key":"e_1_3_2_79_2","doi-asserted-by":"crossref","unstructured":"LimS. HaJ. KimH. KimY. and YangS. A sdn-oriented ddos blocking scheme for botnet-based attacks in 2014 Sixth International Conference on Ubiquitous and Future Networks (ICUFN) 2014 pp. 63\u201368.","DOI":"10.1109\/ICUFN.2014.6876752"},{"key":"e_1_3_2_80_2","doi-asserted-by":"crossref","unstructured":"Beigi-MohammadiN. BarnaC. ShternM. KhazaeiH. and LitoiuM. Caamp: Completely automated ddos attack mitigation platform in hybrid clouds in 2016 12th International Conference on Network and Service Management (CNSM) 2016 pp. 136\u2013143.","DOI":"10.1109\/CNSM.2016.7818409"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169833","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-169833","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-169833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:36Z","timestamp":1777455696000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-169833"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,18]]},"references-count":79,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,12,24]]}},"alternative-id":["10.3233\/JIFS-169833"],"URL":"https:\/\/doi.org\/10.3233\/jifs-169833","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,18]]}}}