SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking

Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, th...

Full description

Saved in:
Bibliographic Details
Published inCluster computing Vol. 24; no. 1; pp. 501 - 513
Main Authors Badotra, Sumit, Panda, Surya Narayan
Format Journal Article
LanguageEnglish
Published New York Springer US 01.03.2021
Springer Nature B.V
Subjects
Online AccessGet full text
ISSN1386-7857
1573-7543
DOI10.1007/s10586-020-03133-y

Cover

Loading…
Abstract Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, the need to protect the network from various attacks is becoming mandatory. Distributed Denial of Service (DDoS) in SDN is one such attack that is becoming a hurdle to its growth. Before the mitigation of DDoS attacks, the primary step is to detect them. In this paper, an early DDoS detection tool is created by using SNORT IDS (Intrusion Detection System). This tool is integrated with popularly used SDN controllers (Opendaylight and Open Networking Operating System). For the experimental setup, five different network scenarios are considered. In each scenario number of hosts, switches and data packets vary. For the creation of different hosts, switches the Mininet emulation tool is used whereas for generating the data packets four different penetration tools such as Hping3, Nping, Xerxes, Tor Hammer, LOIC are used. The generated data packets are ranging from (50,000 per second–2,50,000 per second) and the number of hosts/switches are ranging from (50–250) in every scenario respectively. The data traffic is bombarded towards the controllers and the evaluation of these packets is achieved by making use of Wireshark. The analysis of our DDoS detection system is performed on the basis of various parameters such as time to detect the DDoS attack, Round Trip Time (RTT), percentage of packet loss and type of DDoS attack. It is found that ODL takes minimum time to detect the successful DDoS attack and more time to go down than ONOS. Our tool ensures the timely detection of fast DDoS attacks which delivers the better performance of the SDN controller and not compromising the overall functionality of the entire network.
AbstractList Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, the need to protect the network from various attacks is becoming mandatory. Distributed Denial of Service (DDoS) in SDN is one such attack that is becoming a hurdle to its growth. Before the mitigation of DDoS attacks, the primary step is to detect them. In this paper, an early DDoS detection tool is created by using SNORT IDS (Intrusion Detection System). This tool is integrated with popularly used SDN controllers (Opendaylight and Open Networking Operating System). For the experimental setup, five different network scenarios are considered. In each scenario number of hosts, switches and data packets vary. For the creation of different hosts, switches the Mininet emulation tool is used whereas for generating the data packets four different penetration tools such as Hping3, Nping, Xerxes, Tor Hammer, LOIC are used. The generated data packets are ranging from (50,000 per second–2,50,000 per second) and the number of hosts/switches are ranging from (50–250) in every scenario respectively. The data traffic is bombarded towards the controllers and the evaluation of these packets is achieved by making use of Wireshark. The analysis of our DDoS detection system is performed on the basis of various parameters such as time to detect the DDoS attack, Round Trip Time (RTT), percentage of packet loss and type of DDoS attack. It is found that ODL takes minimum time to detect the successful DDoS attack and more time to go down than ONOS. Our tool ensures the timely detection of fast DDoS attacks which delivers the better performance of the SDN controller and not compromising the overall functionality of the entire network.
Author Badotra, Sumit
Panda, Surya Narayan
Author_xml – sequence: 1
  givenname: Sumit
  surname: Badotra
  fullname: Badotra, Sumit
  email: summi.badotra@gmail.com
  organization: Chitkara University Institute of Engineering and Technology, Chitkara University
– sequence: 2
  givenname: Surya Narayan
  surname: Panda
  fullname: Panda, Surya Narayan
  organization: Chitkara University Institute of Engineering and Technology, Chitkara University
BookMark eNp9kEtPAjEUhRuDiYD-AVdNXI_2MUOnSwO-EiKJ4Lop0xYHocW2hMzG327HMSFxwaq3t-c79_YMQM86qwG4xugWI8TuAkZFOcoQQRmimNKsOQN9XDCasSKnvVTT9MzKgl2AQQhrhBBnhPfB9_x19raASxm0glr6TQMnEzeHSkddxdpZGJoQ9RbuQ21XcLbTVslmU68-IpRWQZca0Op4cP6zFaS7l7Gt_rg6OTgTD9LrZGpqm-Yc9Zfg3MhN0Fd_5xC8Pz4sxs_ZdPb0Mr6fZhXFPGaSU6JVZXhJikoZWWKFOOJEYoqJ4WqkSK4wlrlWpMoxy9P_CqOoyVm1xLmmQ3DT-e68-9rrEMXa7b1NIwXhuCT5qGA4qcpOVXkXgtdGVHWUbQrRy3ojMBJt2qJLW6S0xW_aokko-YfufL2VvjkN0Q4KSWxX2h-3OkH9ABCOl08
CitedBy_id crossref_primary_10_1016_j_cosrev_2024_100661
crossref_primary_10_1109_ACCESS_2022_3200477
crossref_primary_10_1007_s11042_024_18558_5
crossref_primary_10_3390_electronics11193120
crossref_primary_10_1109_ACCESS_2023_3296798
crossref_primary_10_3390_s23198333
crossref_primary_10_3390_s22114123
crossref_primary_10_1007_s10586_024_04596_z
crossref_primary_10_1007_s41870_023_01469_3
crossref_primary_10_1007_s10586_024_04535_y
crossref_primary_10_1155_2023_5382375
crossref_primary_10_3390_app142311465
crossref_primary_10_1002_cpe_6978
crossref_primary_10_1007_s10586_023_04027_5
crossref_primary_10_3390_su14148708
crossref_primary_10_1007_s11277_023_10773_x
crossref_primary_10_1007_s10586_024_04407_5
crossref_primary_10_1371_journal_pone_0308206
crossref_primary_10_32604_iasc_2022_023771
crossref_primary_10_3390_electronics12071642
crossref_primary_10_3390_en14196016
crossref_primary_10_1007_s10586_023_04152_1
crossref_primary_10_3390_technologies12080122
crossref_primary_10_1007_s11042_023_15725_y
crossref_primary_10_3233_IDT_220132
crossref_primary_10_1109_ACCESS_2021_3067106
crossref_primary_10_1007_s10586_020_03203_1
crossref_primary_10_24003_emitter_v9i2_616
crossref_primary_10_1007_s00607_020_00866_x
crossref_primary_10_1007_s11082_023_05752_2
crossref_primary_10_3390_electronics11172715
crossref_primary_10_1007_s10586_022_03537_y
crossref_primary_10_1002_cpe_7439
crossref_primary_10_1109_ACCESS_2021_3109564
crossref_primary_10_1016_j_iot_2024_101413
crossref_primary_10_32604_cmc_2022_025658
Cites_doi 10.1109/COMST.2014.2330903
10.1109/SURV.2014.012214.00180
10.3390/info10030106
10.1007/s12083-018-0710-9
10.1016/j.jnca.2013.08.001
10.1007/s00521-016-2317-5
10.1145/1355734.1355746
10.1007/s11235-018-0475-8
10.1145/2602204.2602219
10.1007/s12652-018-0800-9
10.1109/JPROC.2014.2371999
10.1016/j.comnet.2014.07.004
10.1109/SDN4FNS.2013.6702553
10.1109/GREE.2013.25
10.1109/ICICI.2017.8365396
10.14722/sent.2015.23004
10.1109/Trustcom.2015.389
10.1145/3164541.3164562
10.1109/ViTECoN.2019.8899721
10.1109/ICACCI.2018.8554590
10.1145/3040992.3040998
10.1109/CANDAR.2017.93
10.1145/1868447.1868466
10.1109/ICCNC.2015.7069319
10.1109/AINA.2013.113
10.1007/978-981-13-1217-5_97
10.1145/2508859.2516684
10.1109/GIIS.2015.7347185
10.1007/978-3-030-29407-6_58
ContentType Journal Article
Copyright Springer Science+Business Media, LLC, part of Springer Nature 2020
Springer Science+Business Media, LLC, part of Springer Nature 2020.
Copyright_xml – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020
– notice: Springer Science+Business Media, LLC, part of Springer Nature 2020.
DBID AAYXX
CITATION
8FE
8FG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
GNUQQ
HCIFZ
JQ2
K7-
P5Z
P62
PHGZM
PHGZT
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOI 10.1007/s10586-020-03133-y
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
Computer Science Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
DatabaseTitle CrossRef
Advanced Technologies & Aerospace Collection
Computer Science Database
ProQuest Central Student
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
ProQuest One Academic Eastern Edition
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Advanced Technologies & Aerospace Collection

Database_xml – sequence: 1
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1573-7543
EndPage 513
ExternalDocumentID 10_1007_s10586_020_03133_y
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
.86
.DC
.VR
06D
0R~
0VY
1N0
1SB
203
29B
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6NX
78A
8TC
8UJ
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDZT
ABECU
ABFTD
ABFTV
ABHLI
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGAL
AEGNC
AEJHL
AEJRE
AEKMD
AEMSY
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGGDS
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
ALMA_UNASSIGNED_HOLDINGS
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARAPS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
B-.
BA0
BDATZ
BENPR
BGLVJ
BGNMA
BSONS
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
EBLON
EBS
EIOEI
EJD
ESBYG
FEDTE
FERAY
FFXSO
FIGPU
FINBP
FNLPD
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNWQR
GQ6
GQ7
GQ8
GXS
H13
HCIFZ
HF~
HG5
HG6
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I09
IHE
IJ-
IKXTQ
IWAJR
IXC
IXD
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K7-
KDC
KOV
LAK
LLZTM
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
OAM
OVD
P9O
PF0
PT4
PT5
QOS
R89
R9I
RNI
RNS
ROL
RPX
RSV
RZC
RZE
RZK
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TEORI
TSG
TSK
TSV
TUC
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z7R
Z7X
Z7Z
Z81
Z83
Z88
ZMTXR
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ADHKG
ADKFA
AFDZB
AFOHR
AGQPQ
AHPBZ
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
8FE
8FG
ABRTQ
AZQEC
DWQXO
GNUQQ
JQ2
P62
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
ID FETCH-LOGICAL-c319t-a932edcf9825cdfa81d09092a1312f9d6d24d11a4ed2c41740005fd3f47cb14e3
IEDL.DBID U2A
ISSN 1386-7857
IngestDate Fri Jul 25 09:16:04 EDT 2025
Tue Jul 01 03:34:32 EDT 2025
Thu Apr 24 23:06:09 EDT 2025
Fri Feb 21 02:49:16 EST 2025
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Open network operating system
DDoS attacks
Security
Opendaylight
SDN controllers
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c319t-a932edcf9825cdfa81d09092a1312f9d6d24d11a4ed2c41740005fd3f47cb14e3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
PQID 2918246571
PQPubID 2043865
PageCount 13
ParticipantIDs proquest_journals_2918246571
crossref_citationtrail_10_1007_s10586_020_03133_y
crossref_primary_10_1007_s10586_020_03133_y
springer_journals_10_1007_s10586_020_03133_y
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20210300
2021-03-00
20210301
PublicationDateYYYYMMDD 2021-03-01
PublicationDate_xml – month: 3
  year: 2021
  text: 20210300
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
– name: Dordrecht
PublicationSubtitle The Journal of Networks, Software Tools and Applications
PublicationTitle Cluster computing
PublicationTitleAbbrev Cluster Comput
PublicationYear 2021
Publisher Springer US
Springer Nature B.V
Publisher_xml – name: Springer US
– name: Springer Nature B.V
References Feamster, Rexford, Zegura (CR3) 2014; 44
Badotra, Singh (CR14) 2017; 8
Hoque, Bhuyan, Baishya, Bhattacharyya, Kalita (CR43) 2014; 40
Badotra, Singh (CR37) 2017; 8
CR19
CR18
CR16
CR38
CR36
CR35
Nunes, Mendonca, Nguyen, Obraczka, Turletti (CR4) 2014; 16
CR11
Jammal, Singh, Shami, Asal, Li (CR13) 2014; 72
CR33
Kreutz, Ramos, Verissimo, Rothenberg, Azodolmolky, Uhlig (CR8) 2015; 103
CR10
CR32
Roesch (CR39) 1999; 99
CR31
CR30
Xia, Wen, Foh, Niyato, Xie (CR1) 2015; 17
Fernandes, Rodrigues, Carvalho, Al-Muhtadi, Proença (CR20) 2019; 70
Shenker, Casado, Koponen, McKeown (CR5) 2011; 20
McKeown, Anderson, Balakrishnan, Parulkar, Peterson, Rexford, Turner (CR6) 2008; 38
CR2
Bhushan, Gupta (CR17) 2019; 10
CR7
Gupta, Agrawal (CR12) 2019
CR29
Kamal, Han, Lu, Jabbar (CR15) 2019; 12
CR28
CR9
CR27
CR26
CR25
CR24
CR23
CR22
CR44
CR41
CR40
Behal, Kumar (CR42) 2017; 19
Gupta, Badve (CR21) 2017; 28
Manso, Moura, Serrão (CR34) 2019; 10
3133_CR19
D Kreutz (3133_CR8) 2015; 103
3133_CR9
3133_CR7
3133_CR36
3133_CR35
AE Kamal (3133_CR15) 2019; 12
3133_CR11
3133_CR33
3133_CR18
3133_CR2
S Shenker (3133_CR5) 2011; 20
3133_CR16
3133_CR38
(3133_CR12) 2019
P Manso (3133_CR34) 2019; 10
N Feamster (3133_CR3) 2014; 44
3133_CR10
M Jammal (3133_CR13) 2014; 72
3133_CR32
M Roesch (3133_CR39) 1999; 99
3133_CR31
3133_CR30
N Hoque (3133_CR43) 2014; 40
S Badotra (3133_CR14) 2017; 8
S Behal (3133_CR42) 2017; 19
S Badotra (3133_CR37) 2017; 8
3133_CR25
BB Gupta (3133_CR21) 2017; 28
3133_CR24
3133_CR23
3133_CR22
3133_CR44
3133_CR29
3133_CR28
G Fernandes (3133_CR20) 2019; 70
3133_CR27
3133_CR26
BAA Nunes (3133_CR4) 2014; 16
K Bhushan (3133_CR17) 2019; 10
3133_CR41
N McKeown (3133_CR6) 2008; 38
3133_CR40
W Xia (3133_CR1) 2015; 17
References_xml – ident: CR22
– volume: 19
  start-page: 383
  issue: 3
  year: 2017
  end-page: 393
  ident: CR42
  article-title: Characterization and comparison of DDoS attack tools and traffic generators: a review
  publication-title: IJ Netw. Security
– ident: CR18
– volume: 17
  start-page: 27
  issue: 1
  year: 2015
  end-page: 51
  ident: CR1
  article-title: A survey on software-defined networking
  publication-title: IEEE Commun. Surveys Tutor.
  doi: 10.1109/COMST.2014.2330903
– volume: 16
  start-page: 1617
  issue: 3
  year: 2014
  end-page: 1634
  ident: CR4
  article-title: A survey of software-defined networking: past, present, and future of programmable networks
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2014.012214.00180
– ident: CR2
– ident: CR16
– volume: 10
  start-page: 106
  issue: 3
  year: 2019
  ident: CR34
  article-title: SDN-based intrusion detection system for early detection and mitigation of DDoS attacks
  publication-title: Information
  doi: 10.3390/info10030106
– ident: CR30
– ident: CR10
– ident: CR33
– volume: 12
  start-page: 291
  issue: 2
  year: 2019
  end-page: 294
  ident: CR15
  article-title: Guest editorial: Special issue on software defined networking: trends, challenges, and prospective smart solutions
  publication-title: Peer-to-Peer Netw. Appl.
  doi: 10.1007/s12083-018-0710-9
– ident: CR35
– volume: 99
  start-page: 229
  issue: 1
  year: 1999
  end-page: 238
  ident: CR39
  article-title: Snort: lightweight intrusion detection for networks
  publication-title: Lisa
– ident: CR29
– volume: 40
  start-page: 307
  year: 2014
  end-page: 324
  ident: CR43
  article-title: Network attacks: taxonomy, tools and systems
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2013.08.001
– ident: CR40
– ident: CR25
– volume: 28
  start-page: 3655
  issue: 12
  year: 2017
  end-page: 3682
  ident: CR21
  article-title: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-016-2317-5
– ident: CR27
– volume: 8
  start-page: 1105
  issue: 5
  year: 2017
  end-page: 1111
  ident: CR37
  article-title: Open daylight as a controller for software defined networking
  publication-title: Int. J. Adv. Res. Comput. Sci.
– ident: CR23
– volume: 8
  start-page: 2
  issue: 3
  year: 2017
  ident: CR14
  article-title: A review paper on software defined networking
  publication-title: Int. J. Adv. Res. Comput. Sci.
– ident: CR19
– ident: CR44
– year: 2019
  ident: CR12
  publication-title: Handbook of Research on Cloud Computing and Big Data Applications in IoT
– volume: 38
  start-page: 69
  issue: 2
  year: 2008
  end-page: 74
  ident: CR6
  article-title: OpenFlow: enabling innovation in campus networks
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/1355734.1355746
– volume: 70
  start-page: 447
  issue: 3
  year: 2019
  end-page: 489
  ident: CR20
  article-title: A comprehensive survey on network anomaly detection
  publication-title: Telecommun. Syst.
  doi: 10.1007/s11235-018-0475-8
– ident: CR38
– volume: 44
  start-page: 87
  issue: 2
  year: 2014
  end-page: 98
  ident: CR3
  article-title: The road to SDN: an intellectual history of programmable networks
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/2602204.2602219
– ident: CR31
– ident: CR11
– ident: CR9
– volume: 20
  start-page: 1
  year: 2011
  end-page: 30
  ident: CR5
  article-title: The future of networking, and the past of protocols
  publication-title: Open Netw. Summit
– ident: CR32
– volume: 10
  start-page: 1985
  issue: 5
  year: 2019
  end-page: 1997
  ident: CR17
  article-title: Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment
  publication-title: J. Amb. Intell. Hum. Comput.
  doi: 10.1007/s12652-018-0800-9
– ident: CR36
– volume: 103
  start-page: 14
  issue: 1
  year: 2015
  end-page: 76
  ident: CR8
  article-title: Software-defined networking: a comprehensive survey
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2014.2371999
– ident: CR7
– volume: 72
  start-page: 74
  year: 2014
  end-page: 98
  ident: CR13
  article-title: Software defined networking: state of the art and research challenges
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2014.07.004
– ident: CR28
– ident: CR41
– ident: CR26
– ident: CR24
– ident: 3133_CR18
  doi: 10.1109/SDN4FNS.2013.6702553
– ident: 3133_CR28
  doi: 10.1109/GREE.2013.25
– ident: 3133_CR24
  doi: 10.1109/ICICI.2017.8365396
– ident: 3133_CR19
– volume: 40
  start-page: 307
  year: 2014
  ident: 3133_CR43
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2013.08.001
– ident: 3133_CR44
– volume: 103
  start-page: 14
  issue: 1
  year: 2015
  ident: 3133_CR8
  publication-title: Proc. IEEE
  doi: 10.1109/JPROC.2014.2371999
– volume: 16
  start-page: 1617
  issue: 3
  year: 2014
  ident: 3133_CR4
  publication-title: IEEE Commun. Surv. Tutor.
  doi: 10.1109/SURV.2014.012214.00180
– volume: 38
  start-page: 69
  issue: 2
  year: 2008
  ident: 3133_CR6
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/1355734.1355746
– volume: 8
  start-page: 1105
  issue: 5
  year: 2017
  ident: 3133_CR37
  publication-title: Int. J. Adv. Res. Comput. Sci.
– ident: 3133_CR29
  doi: 10.14722/sent.2015.23004
– ident: 3133_CR33
  doi: 10.1109/Trustcom.2015.389
– ident: 3133_CR31
  doi: 10.1145/3164541.3164562
– volume: 17
  start-page: 27
  issue: 1
  year: 2015
  ident: 3133_CR1
  publication-title: IEEE Commun. Surveys Tutor.
  doi: 10.1109/COMST.2014.2330903
– ident: 3133_CR35
  doi: 10.1109/ViTECoN.2019.8899721
– volume: 28
  start-page: 3655
  issue: 12
  year: 2017
  ident: 3133_CR21
  publication-title: Neural Comput. Appl.
  doi: 10.1007/s00521-016-2317-5
– volume: 10
  start-page: 1985
  issue: 5
  year: 2019
  ident: 3133_CR17
  publication-title: J. Amb. Intell. Hum. Comput.
  doi: 10.1007/s12652-018-0800-9
– ident: 3133_CR41
  doi: 10.1109/ICACCI.2018.8554590
– ident: 3133_CR30
  doi: 10.1145/3040992.3040998
– ident: 3133_CR10
– volume: 8
  start-page: 2
  issue: 3
  year: 2017
  ident: 3133_CR14
  publication-title: Int. J. Adv. Res. Comput. Sci.
– volume: 44
  start-page: 87
  issue: 2
  year: 2014
  ident: 3133_CR3
  publication-title: ACM SIGCOMM Comput. Commun. Rev.
  doi: 10.1145/2602204.2602219
– ident: 3133_CR25
  doi: 10.1109/CANDAR.2017.93
– volume-title: Handbook of Research on Cloud Computing and Big Data Applications in IoT
  year: 2019
  ident: 3133_CR12
– ident: 3133_CR2
  doi: 10.1145/1868447.1868466
– ident: 3133_CR26
– ident: 3133_CR9
– ident: 3133_CR27
  doi: 10.1109/ICCNC.2015.7069319
– ident: 3133_CR7
  doi: 10.1109/AINA.2013.113
– ident: 3133_CR32
– volume: 12
  start-page: 291
  issue: 2
  year: 2019
  ident: 3133_CR15
  publication-title: Peer-to-Peer Netw. Appl.
  doi: 10.1007/s12083-018-0710-9
– volume: 10
  start-page: 106
  issue: 3
  year: 2019
  ident: 3133_CR34
  publication-title: Information
  doi: 10.3390/info10030106
– volume: 70
  start-page: 447
  issue: 3
  year: 2019
  ident: 3133_CR20
  publication-title: Telecommun. Syst.
  doi: 10.1007/s11235-018-0475-8
– volume: 72
  start-page: 74
  year: 2014
  ident: 3133_CR13
  publication-title: Comput. Netw.
  doi: 10.1016/j.comnet.2014.07.004
– ident: 3133_CR16
  doi: 10.1007/978-981-13-1217-5_97
– ident: 3133_CR22
  doi: 10.1145/2508859.2516684
– ident: 3133_CR38
– volume: 20
  start-page: 1
  year: 2011
  ident: 3133_CR5
  publication-title: Open Netw. Summit
– ident: 3133_CR23
  doi: 10.1109/GIIS.2015.7347185
– ident: 3133_CR36
– volume: 99
  start-page: 229
  issue: 1
  year: 1999
  ident: 3133_CR39
  publication-title: Lisa
– ident: 3133_CR40
  doi: 10.1007/978-3-030-29407-6_58
– volume: 19
  start-page: 383
  issue: 3
  year: 2017
  ident: 3133_CR42
  publication-title: IJ Netw. Security
– ident: 3133_CR11
SSID ssj0009729
Score 2.554406
Snippet Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 501
SubjectTerms Bandwidths
Computer Communication Networks
Computer Science
Controllers
Cybersecurity
Denial of service attacks
Floods
Hammers
Infrastructure
Intrusion detection systems
Network security
Operating Systems
Packet switching
Processor Architectures
Software-defined networking
Switches
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JS8UwEA4uFy_u4nMjB28abJq0TU_iigg-xQW8lTSTiiB9Lk_Ei7_dmb7UqqC3liZz6CSTb5Iv8zG26Z21rgQvDEAitFWpKFWcCZ_kJvJ5BFrT5eSzfnpyo09vk9uw4fYSaJVtTGwCNQwc7ZHvxDkiYZ0mmdx9fBKkGkWnq0FCY5xNYgg2mHxN7h_1Ly67srtZo1MmlUlFZpIsXJsJl-cSQwTcSFD9QiXefy5NHd78dUTarDzHs2w6QEa-N_LxHBvz9TybaeUYeJidC-zjqn9-ec1pXQLuqXAxPzwcXHHww4ZvVfNR2WZOXPc7TlQSwHydsnNua-AkpMXrES2cGuA7DQ98Cv3u0QJG7Tf77NFohfgUvrVfZDfHR9cHJyLIKwiH824oLEI3D67KMUl0UFlErlEe5bGVSsZVDinEGqS02kPsNGYuhO8qUJXOXCm1V0tsoh7UfpnxyJvMlCqRVjnM97Jc-ljaSFWptcaA7zHZ_tnChdrjJIHxUHRVk8kbBXqjaLxRvPfY1lefx1HljX9br7UOK8IsfCm6MdNj260Tu89_W1v539oqm4qJ2tJQ0dbYxPD51a8jNhmWG2EAfgIClOKs
  priority: 102
  providerName: ProQuest
Title SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking
URI https://link.springer.com/article/10.1007/s10586-020-03133-y
https://www.proquest.com/docview/2918246571
Volume 24
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS-RAEC58XLys6wvHx9AHb9qQfiTpHMd1RlEcRR3QU-h0dZYFiaKzLF787VZnEkdFhT0lIZU6pPpRH_3VVwA73lnrCvTcIMZcW5XwQsmU-zgzkc8i1DoUJ58Ok6ORPr6Or5uisMeW7d4eSdYr9Ztit9gEwmzEg96g4k-zMB8H7E6jeCR7U6ndtO5NJhRZpyZOm1KZz328346mOeaHY9F6txn8hB9Nmsh6k7guwYyvlmGxbcHAmhm5As-Xw7OLKxb2ImQ-iBWzg4O7S4Z-XHOsKjaRamaB3_6bBfoIEkYPiJzZCllonsWqCRU8GNBzGBJ013z3hzzQSv3PPnhyWlJOim_sV2E06F_9OuJNSwXuaK6NuaV0zaMrMwKGDktL2WqURZm0QglZZpig1CiE1R6l04RWQk5Xoip16gqhvVqDuequ8uvAIm9SU6hYWOUI46WZ8FLYSJWJtcag74Bo_2zuGr3x0PbiNp8qJYdo5BSNvI5G_tSB3ddv7idqG99ab7UBy5uZ95jLjBCTTuJUdGCvDeL09dfeNv7PfBMWZKC31HS0LZgbP_z125SfjIsuzJrBYRfme4c3J3267veH5xfdepC-APQZ4rc
linkProvider Springer Nature
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcoALb9SFAj7ACSziRxL7gKqKZdnSdpHoVuotOB4HIVXZ0i6q9sJP6m-sJw8CSPTWW6zYc_CMPZ_tb2YAXgbvnC8xcIOYcu1Uxkslcx5Sa5JgE9SagpP3Z9n0UH86So_W4KKPhSFaZb8nNhs1Ljzdkb-VNiJhnaW52Dr5walqFL2u9iU0WrPYDavzeGQ7e7czjvp9JeXkw_z9lHdVBbiP5rbkLiKWgL6y8WzksXIRsCU2sdIJJWRlMUOpUQinA0qvI2AnWFOhqnTuS6GDinJvwE2tlKUVZSYfhyS_eVMVTSiT8dykeRek04XqpYbovgmnbImKr_52hAO6_edBtvFzk3twpwOobLu1qPuwFuoHcLcv_sC6veAh_DqYff4yZ-QFkQVKk8zG48UBw7Bs2F01a5NEM2LWf2NEXEG3Oqa7AOZqZFS2i9UtCZ06xDYZY_zqxn2PEqKPOHenIQqtIhrGP_o_gsNrmfbHsF4v6rABLAkmN6VKhVM-ni5zK4IULlFV5pwxGEYg-pktfJfpnApuHBdDjmbSRhG1UTTaKFYjeP17zEmb5-PK3pu9wopuzZ8Vg4WO4E2vxOH3_6U9uVraC7g1ne_vFXs7s92ncFsSqaYhwW3C-vL0Z3gWUdGyfN6YIoOv1237lxWcHjU
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9tAEF61VEK9FEpBTQl0D73RFd6HX8eIEIU-AmoSKTdrvbNGlSoTpa4qLvx2ZvxoQgWVerPl2Tns7OMb-ZtvGPvgnbUuBy8SgFAYqyORaxULH6ZJ4NMAjKHi5K-TaDw3nxbhYqOKv2a7d78km5oGUmkqq9MlFKcbhW9hQuTZQJD2oBa3z9kLPI4lreu5Gqxld-O6T5nUaB0nYdyWzTzu4-HVtMabf_0irW-e0S571UJGPmhi_Jo98-Ue2-naMfB2d75hd9PJ5bcZp3sJuCfhYj4c3kw5-KrmW5W8kW3mxHW_5kQlAczXKTvntgROjbR42dDCyQDfaXngUzvuO3rAU_u3XXl0WiA-hQ37fTYfnc_OxqJtryAcTlQlLEI3D65IMUl0UFhErkEapMriPKoihQiUASmt8aCcwcyF8F0BujCxy6Xx-oBtlTelf8t44JM4yXUorXaY78Wp9EraQBeRtUkCvsdkN7OZa7XHqQXGj2ytmkzRyDAaWR2N7LbHTv6MWTbKG_-07ncBy9pd-DNTKWZPJgpj2WMfuyCuPz_t7d3_mb9n21fDUfblYvL5kL1UxHqpWWp9tlWtfvkjhC1VflyvzHtK6uXS
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SNORT+based+early+DDoS+detection+system+using+Opendaylight+and+open+networking+operating+system+in+software+defined+networking&rft.jtitle=Cluster+computing&rft.au=Badotra%2C+Sumit&rft.au=Panda%2C+Surya+Narayan&rft.date=2021-03-01&rft.pub=Springer+US&rft.issn=1386-7857&rft.eissn=1573-7543&rft.volume=24&rft.issue=1&rft.spage=501&rft.epage=513&rft_id=info:doi/10.1007%2Fs10586-020-03133-y&rft.externalDocID=10_1007_s10586_020_03133_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1386-7857&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1386-7857&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1386-7857&client=summon