{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:33:39Z","timestamp":1762508019454,"version":"3.40.5"},"reference-count":43,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,4]]},"abstract":"<jats:p>Software defined networks (SDN) are a recently developed form for controlling network management by providing centralized control unit called the Controller. This master Controller is a great power point but at the same time it is unfortunately a failure point and a serious loophole if it is targeted and dropped by attacks. One of the most serious types of attacks is the inability to access the Controller, which is known as the distributed denial of service (DDoS) attack. This research shows how DDoS attack can deplete the resources of the Controller and proposes a lightweight mechanism, which works at the Controller and detects a DDoS attack in the early stages. The proposed mechanism can not only detect the attack, but also identify attack paths and initiate a mitigation process to provide some degree of protection to network devices immediately after the attack is detected. The proposed mechanism depends on a hybrid technique that merges between the average flow initiation rate, and the flow specification of the coming traffic to the network.<\/jats:p>","DOI":"10.4018\/ijskd.2020040101","type":"journal-article","created":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T12:11:42Z","timestamp":1581682302000},"page":"1-30","source":"Crossref","is-referenced-by-count":4,"title":["New Detection Mechanism for Distributed Denial of Service Attacks in Software Defined Networks"],"prefix":"10.4018","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8065-8977","authenticated-orcid":true,"given":"Khalid Mohamed","family":"Hosny","sequence":"first","affiliation":[{"name":"Zagazig University, Zagazig, Egypt"}]},{"given":"Ameer El-Sayed","family":"Gouda","sequence":"additional","affiliation":[{"name":"Zagazig University, Zagazig, Egypt"}]},{"given":"Ehab Rushdy","family":"Mohamed","sequence":"additional","affiliation":[{"name":"Zagazig University, Zagazig, Egypt"}]}],"member":"2432","reference":[{"key":"IJSKD.2020040101-0","doi-asserted-by":"publisher","DOI":"10.1145\/3310165.3310175"},{"key":"IJSKD.2020040101-1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-8201-6_46"},{"key":"IJSKD.2020040101-2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01647-0_4"},{"key":"IJSKD.2020040101-3","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2017.07.002"},{"key":"IJSKD.2020040101-4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-10543-3_15"},{"key":"IJSKD.2020040101-5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.001"},{"key":"IJSKD.2020040101-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.04.011"},{"key":"IJSKD.2020040101-7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.03.024"},{"issue":"1","key":"IJSKD.2020040101-8","first-page":"1","article-title":"D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events.","volume":"37","author":"J.Benabbou","year":"2019","journal-title":"Journal of Network and Computer Applications"},{"key":"IJSKD.2020040101-9","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4939-z"},{"key":"IJSKD.2020040101-10","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.10.5.287-293"},{"key":"IJSKD.2020040101-11","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735752"},{"key":"IJSKD.2020040101-12","doi-asserted-by":"publisher","DOI":"10.1007\/s12008-017-0391-2"},{"key":"IJSKD.2020040101-13","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2018.01.004"},{"key":"IJSKD.2020040101-14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7120048"},{"key":"IJSKD.2020040101-15","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23064"},{"key":"IJSKD.2020040101-16","doi-asserted-by":"publisher","DOI":"10.1109\/NICS.2018.8606851"},{"key":"IJSKD.2020040101-17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89914-5_11"},{"key":"IJSKD.2020040101-18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2622-6_20"},{"key":"IJSKD.2020040101-19","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-02732-2"},{"key":"IJSKD.2020040101-20","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2766636"},{"key":"IJSKD.2020040101-21","article-title":"Mininet as software defined networking testing platform.","author":"K.Kaur","year":"2014","journal-title":"International Conference on Communication, Computing & Systems (ICCCS),"},{"key":"IJSKD.2020040101-22","unstructured":"Kia, M. (2015). Early Detection and Mitigation of DDoS Attacks In Software Defined Networks [Master\u2019s Thesis]. Ryerson University, Toronto, Canada."},{"key":"IJSKD.2020040101-23","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-1882-5_19"},{"key":"IJSKD.2020040101-24","doi-asserted-by":"publisher","DOI":"10.1002\/dac.3497"},{"key":"IJSKD.2020040101-25","doi-asserted-by":"publisher","DOI":"10.3390\/info10030106"},{"key":"IJSKD.2020040101-26","doi-asserted-by":"publisher","DOI":"10.1049\/iet-com.2018.5194"},{"key":"IJSKD.2020040101-27","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9432-1"},{"key":"IJSKD.2020040101-28","doi-asserted-by":"publisher","DOI":"10.1145\/3281032"},{"key":"IJSKD.2020040101-29","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2009.5341118"},{"key":"IJSKD.2020040101-30","doi-asserted-by":"publisher","DOI":"10.1145\/3287306"},{"key":"IJSKD.2020040101-31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45248-5_3"},{"key":"IJSKD.2020040101-32","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2015.11.001"},{"key":"IJSKD.2020040101-33","doi-asserted-by":"crossref","unstructured":"Singh, P. K., Sharma, S., Nandi, S. K., & Nandi, S. (2019). Multipath TCP for V2I communication in SDN controlled small cell deployment of smart city. Vehicular communications, 15, 1-15.","DOI":"10.1016\/j.vehcom.2018.11.002"},{"key":"IJSKD.2020040101-34","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"IJSKD.2020040101-35","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2838574"},{"key":"IJSKD.2020040101-36","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-018-3236-9"},{"key":"IJSKD.2020040101-37","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-13-2514-4_4"},{"key":"IJSKD.2020040101-38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-46301-8_45"},{"key":"IJSKD.2020040101-39","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.389"},{"key":"IJSKD.2020040101-40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831284"},{"key":"IJSKD.2020040101-41","doi-asserted-by":"publisher","DOI":"10.1504\/IJDET.2019.097849"},{"key":"IJSKD.2020040101-42","article-title":"Simulation of QoS Routing Algorithm Based on SDN Framework.","author":"Z.Zhang","year":"2019","journal-title":"Proceedings of the International Conference on Cyber Security Intelligence and Analytics"}],"container-title":["International Journal of Sociotechnology and Knowledge Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=249229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,6]],"date-time":"2022-05-06T08:11:27Z","timestamp":1651824687000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJSKD.2020040101"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2020,4]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.4018\/ijskd.2020040101","relation":{},"ISSN":["1941-6253","1941-6261"],"issn-type":[{"type":"print","value":"1941-6253"},{"type":"electronic","value":"1941-6261"}],"subject":[],"published":{"date-parts":[[2020,4]]}}}