SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking
Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, th...
Saved in:
Published in | Cluster computing Vol. 24; no. 1; pp. 501 - 513 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
Springer US
01.03.2021
Springer Nature B.V |
Subjects | |
Online Access | Get full text |
ISSN | 1386-7857 1573-7543 |
DOI | 10.1007/s10586-020-03133-y |
Cover
Loading…
Abstract | Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, the need to protect the network from various attacks is becoming mandatory. Distributed Denial of Service (DDoS) in SDN is one such attack that is becoming a hurdle to its growth. Before the mitigation of DDoS attacks, the primary step is to detect them. In this paper, an early DDoS detection tool is created by using SNORT IDS (Intrusion Detection System). This tool is integrated with popularly used SDN controllers (Opendaylight and Open Networking Operating System). For the experimental setup, five different network scenarios are considered. In each scenario number of hosts, switches and data packets vary. For the creation of different hosts, switches the Mininet emulation tool is used whereas for generating the data packets four different penetration tools such as Hping3, Nping, Xerxes, Tor Hammer, LOIC are used. The generated data packets are ranging from (50,000 per second–2,50,000 per second) and the number of hosts/switches are ranging from (50–250) in every scenario respectively. The data traffic is bombarded towards the controllers and the evaluation of these packets is achieved by making use of Wireshark. The analysis of our DDoS detection system is performed on the basis of various parameters such as time to detect the DDoS attack, Round Trip Time (RTT), percentage of packet loss and type of DDoS attack. It is found that ODL takes minimum time to detect the successful DDoS attack and more time to go down than ONOS. Our tool ensures the timely detection of fast DDoS attacks which delivers the better performance of the SDN controller and not compromising the overall functionality of the entire network. |
---|---|
AbstractList | Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network (controller) with the underlying network infrastructure (data plane). But this isolation also gives birth to many security concerns; therefore, the need to protect the network from various attacks is becoming mandatory. Distributed Denial of Service (DDoS) in SDN is one such attack that is becoming a hurdle to its growth. Before the mitigation of DDoS attacks, the primary step is to detect them. In this paper, an early DDoS detection tool is created by using SNORT IDS (Intrusion Detection System). This tool is integrated with popularly used SDN controllers (Opendaylight and Open Networking Operating System). For the experimental setup, five different network scenarios are considered. In each scenario number of hosts, switches and data packets vary. For the creation of different hosts, switches the Mininet emulation tool is used whereas for generating the data packets four different penetration tools such as Hping3, Nping, Xerxes, Tor Hammer, LOIC are used. The generated data packets are ranging from (50,000 per second–2,50,000 per second) and the number of hosts/switches are ranging from (50–250) in every scenario respectively. The data traffic is bombarded towards the controllers and the evaluation of these packets is achieved by making use of Wireshark. The analysis of our DDoS detection system is performed on the basis of various parameters such as time to detect the DDoS attack, Round Trip Time (RTT), percentage of packet loss and type of DDoS attack. It is found that ODL takes minimum time to detect the successful DDoS attack and more time to go down than ONOS. Our tool ensures the timely detection of fast DDoS attacks which delivers the better performance of the SDN controller and not compromising the overall functionality of the entire network. |
Author | Badotra, Sumit Panda, Surya Narayan |
Author_xml | – sequence: 1 givenname: Sumit surname: Badotra fullname: Badotra, Sumit email: summi.badotra@gmail.com organization: Chitkara University Institute of Engineering and Technology, Chitkara University – sequence: 2 givenname: Surya Narayan surname: Panda fullname: Panda, Surya Narayan organization: Chitkara University Institute of Engineering and Technology, Chitkara University |
BookMark | eNp9kEtPAjEUhRuDiYD-AVdNXI_2MUOnSwO-EiKJ4Lop0xYHocW2hMzG327HMSFxwaq3t-c79_YMQM86qwG4xugWI8TuAkZFOcoQQRmimNKsOQN9XDCasSKnvVTT9MzKgl2AQQhrhBBnhPfB9_x19raASxm0glr6TQMnEzeHSkddxdpZGJoQ9RbuQ21XcLbTVslmU68-IpRWQZca0Op4cP6zFaS7l7Gt_rg6OTgTD9LrZGpqm-Yc9Zfg3MhN0Fd_5xC8Pz4sxs_ZdPb0Mr6fZhXFPGaSU6JVZXhJikoZWWKFOOJEYoqJ4WqkSK4wlrlWpMoxy9P_CqOoyVm1xLmmQ3DT-e68-9rrEMXa7b1NIwXhuCT5qGA4qcpOVXkXgtdGVHWUbQrRy3ojMBJt2qJLW6S0xW_aokko-YfufL2VvjkN0Q4KSWxX2h-3OkH9ABCOl08 |
CitedBy_id | crossref_primary_10_1016_j_cosrev_2024_100661 crossref_primary_10_1109_ACCESS_2022_3200477 crossref_primary_10_1007_s11042_024_18558_5 crossref_primary_10_3390_electronics11193120 crossref_primary_10_1109_ACCESS_2023_3296798 crossref_primary_10_3390_s23198333 crossref_primary_10_3390_s22114123 crossref_primary_10_1007_s10586_024_04596_z crossref_primary_10_1007_s41870_023_01469_3 crossref_primary_10_1007_s10586_024_04535_y crossref_primary_10_1155_2023_5382375 crossref_primary_10_3390_app142311465 crossref_primary_10_1002_cpe_6978 crossref_primary_10_1007_s10586_023_04027_5 crossref_primary_10_3390_su14148708 crossref_primary_10_1007_s11277_023_10773_x crossref_primary_10_1007_s10586_024_04407_5 crossref_primary_10_1371_journal_pone_0308206 crossref_primary_10_32604_iasc_2022_023771 crossref_primary_10_3390_electronics12071642 crossref_primary_10_3390_en14196016 crossref_primary_10_1007_s10586_023_04152_1 crossref_primary_10_3390_technologies12080122 crossref_primary_10_1007_s11042_023_15725_y crossref_primary_10_3233_IDT_220132 crossref_primary_10_1109_ACCESS_2021_3067106 crossref_primary_10_1007_s10586_020_03203_1 crossref_primary_10_24003_emitter_v9i2_616 crossref_primary_10_1007_s00607_020_00866_x crossref_primary_10_1007_s11082_023_05752_2 crossref_primary_10_3390_electronics11172715 crossref_primary_10_1007_s10586_022_03537_y crossref_primary_10_1002_cpe_7439 crossref_primary_10_1109_ACCESS_2021_3109564 crossref_primary_10_1016_j_iot_2024_101413 crossref_primary_10_32604_cmc_2022_025658 |
Cites_doi | 10.1109/COMST.2014.2330903 10.1109/SURV.2014.012214.00180 10.3390/info10030106 10.1007/s12083-018-0710-9 10.1016/j.jnca.2013.08.001 10.1007/s00521-016-2317-5 10.1145/1355734.1355746 10.1007/s11235-018-0475-8 10.1145/2602204.2602219 10.1007/s12652-018-0800-9 10.1109/JPROC.2014.2371999 10.1016/j.comnet.2014.07.004 10.1109/SDN4FNS.2013.6702553 10.1109/GREE.2013.25 10.1109/ICICI.2017.8365396 10.14722/sent.2015.23004 10.1109/Trustcom.2015.389 10.1145/3164541.3164562 10.1109/ViTECoN.2019.8899721 10.1109/ICACCI.2018.8554590 10.1145/3040992.3040998 10.1109/CANDAR.2017.93 10.1145/1868447.1868466 10.1109/ICCNC.2015.7069319 10.1109/AINA.2013.113 10.1007/978-981-13-1217-5_97 10.1145/2508859.2516684 10.1109/GIIS.2015.7347185 10.1007/978-3-030-29407-6_58 |
ContentType | Journal Article |
Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2020 Springer Science+Business Media, LLC, part of Springer Nature 2020. |
Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020 – notice: Springer Science+Business Media, LLC, part of Springer Nature 2020. |
DBID | AAYXX CITATION 8FE 8FG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ HCIFZ JQ2 K7- P5Z P62 PHGZM PHGZT PKEHL PQEST PQGLB PQQKQ PQUKI |
DOI | 10.1007/s10586-020-03133-y |
DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition |
DatabaseTitle | CrossRef Advanced Technologies & Aerospace Collection Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest One Academic Eastern Edition SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Advanced Technologies & Aerospace Collection |
Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1573-7543 |
EndPage | 513 |
ExternalDocumentID | 10_1007_s10586_020_03133_y |
GroupedDBID | -59 -5G -BR -EM -Y2 -~C .86 .DC .VR 06D 0R~ 0VY 1N0 1SB 203 29B 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 4.4 406 408 409 40D 40E 5GY 5VS 67Z 6NX 78A 8TC 8UJ 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABWNU ABXPI ACAOD ACBXY ACDTI ACGFS ACHSB ACHXU ACKNC ACMDZ ACMLO ACOKC ACOMO ACPIV ACSNA ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFGCZ AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMXSW AMYLF AMYQR AOCGG ARAPS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN B-. BA0 BDATZ BENPR BGLVJ BGNMA BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNWQR GQ6 GQ7 GQ8 GXS H13 HCIFZ HF~ HG5 HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I09 IHE IJ- IKXTQ IWAJR IXC IXD IXE IZIGR IZQ I~X I~Z J-C J0Z JBSCW JCJTX JZLTJ K7- KDC KOV LAK LLZTM M4Y MA- N2Q NB0 NPVJJ NQJWS NU0 O9- O93 O9J OAM OVD P9O PF0 PT4 PT5 QOS R89 R9I RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S27 S3B SAP SCO SDH SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 TEORI TSG TSK TSV TUC U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 ZMTXR ~A9 AAPKM AAYXX ABBRH ABDBE ADHKG ADKFA AFDZB AFOHR AGQPQ AHPBZ ATHPR AYFIA CITATION PHGZM PHGZT 8FE 8FG ABRTQ AZQEC DWQXO GNUQQ JQ2 P62 PKEHL PQEST PQGLB PQQKQ PQUKI |
ID | FETCH-LOGICAL-c319t-a932edcf9825cdfa81d09092a1312f9d6d24d11a4ed2c41740005fd3f47cb14e3 |
IEDL.DBID | U2A |
ISSN | 1386-7857 |
IngestDate | Fri Jul 25 09:16:04 EDT 2025 Tue Jul 01 03:34:32 EDT 2025 Thu Apr 24 23:06:09 EDT 2025 Fri Feb 21 02:49:16 EST 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Keywords | Open network operating system DDoS attacks Security Opendaylight SDN controllers |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c319t-a932edcf9825cdfa81d09092a1312f9d6d24d11a4ed2c41740005fd3f47cb14e3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
PQID | 2918246571 |
PQPubID | 2043865 |
PageCount | 13 |
ParticipantIDs | proquest_journals_2918246571 crossref_citationtrail_10_1007_s10586_020_03133_y crossref_primary_10_1007_s10586_020_03133_y springer_journals_10_1007_s10586_020_03133_y |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20210300 2021-03-00 20210301 |
PublicationDateYYYYMMDD | 2021-03-01 |
PublicationDate_xml | – month: 3 year: 2021 text: 20210300 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York – name: Dordrecht |
PublicationSubtitle | The Journal of Networks, Software Tools and Applications |
PublicationTitle | Cluster computing |
PublicationTitleAbbrev | Cluster Comput |
PublicationYear | 2021 |
Publisher | Springer US Springer Nature B.V |
Publisher_xml | – name: Springer US – name: Springer Nature B.V |
References | Feamster, Rexford, Zegura (CR3) 2014; 44 Badotra, Singh (CR14) 2017; 8 Hoque, Bhuyan, Baishya, Bhattacharyya, Kalita (CR43) 2014; 40 Badotra, Singh (CR37) 2017; 8 CR19 CR18 CR16 CR38 CR36 CR35 Nunes, Mendonca, Nguyen, Obraczka, Turletti (CR4) 2014; 16 CR11 Jammal, Singh, Shami, Asal, Li (CR13) 2014; 72 CR33 Kreutz, Ramos, Verissimo, Rothenberg, Azodolmolky, Uhlig (CR8) 2015; 103 CR10 CR32 Roesch (CR39) 1999; 99 CR31 CR30 Xia, Wen, Foh, Niyato, Xie (CR1) 2015; 17 Fernandes, Rodrigues, Carvalho, Al-Muhtadi, Proença (CR20) 2019; 70 Shenker, Casado, Koponen, McKeown (CR5) 2011; 20 McKeown, Anderson, Balakrishnan, Parulkar, Peterson, Rexford, Turner (CR6) 2008; 38 CR2 Bhushan, Gupta (CR17) 2019; 10 CR7 Gupta, Agrawal (CR12) 2019 CR29 Kamal, Han, Lu, Jabbar (CR15) 2019; 12 CR28 CR9 CR27 CR26 CR25 CR24 CR23 CR22 CR44 CR41 CR40 Behal, Kumar (CR42) 2017; 19 Gupta, Badve (CR21) 2017; 28 Manso, Moura, Serrão (CR34) 2019; 10 3133_CR19 D Kreutz (3133_CR8) 2015; 103 3133_CR9 3133_CR7 3133_CR36 3133_CR35 AE Kamal (3133_CR15) 2019; 12 3133_CR11 3133_CR33 3133_CR18 3133_CR2 S Shenker (3133_CR5) 2011; 20 3133_CR16 3133_CR38 (3133_CR12) 2019 P Manso (3133_CR34) 2019; 10 N Feamster (3133_CR3) 2014; 44 3133_CR10 M Jammal (3133_CR13) 2014; 72 3133_CR32 M Roesch (3133_CR39) 1999; 99 3133_CR31 3133_CR30 N Hoque (3133_CR43) 2014; 40 S Badotra (3133_CR14) 2017; 8 S Behal (3133_CR42) 2017; 19 S Badotra (3133_CR37) 2017; 8 3133_CR25 BB Gupta (3133_CR21) 2017; 28 3133_CR24 3133_CR23 3133_CR22 3133_CR44 3133_CR29 3133_CR28 G Fernandes (3133_CR20) 2019; 70 3133_CR27 3133_CR26 BAA Nunes (3133_CR4) 2014; 16 K Bhushan (3133_CR17) 2019; 10 3133_CR41 N McKeown (3133_CR6) 2008; 38 3133_CR40 W Xia (3133_CR1) 2015; 17 |
References_xml | – ident: CR22 – volume: 19 start-page: 383 issue: 3 year: 2017 end-page: 393 ident: CR42 article-title: Characterization and comparison of DDoS attack tools and traffic generators: a review publication-title: IJ Netw. Security – ident: CR18 – volume: 17 start-page: 27 issue: 1 year: 2015 end-page: 51 ident: CR1 article-title: A survey on software-defined networking publication-title: IEEE Commun. Surveys Tutor. doi: 10.1109/COMST.2014.2330903 – volume: 16 start-page: 1617 issue: 3 year: 2014 end-page: 1634 ident: CR4 article-title: A survey of software-defined networking: past, present, and future of programmable networks publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2014.012214.00180 – ident: CR2 – ident: CR16 – volume: 10 start-page: 106 issue: 3 year: 2019 ident: CR34 article-title: SDN-based intrusion detection system for early detection and mitigation of DDoS attacks publication-title: Information doi: 10.3390/info10030106 – ident: CR30 – ident: CR10 – ident: CR33 – volume: 12 start-page: 291 issue: 2 year: 2019 end-page: 294 ident: CR15 article-title: Guest editorial: Special issue on software defined networking: trends, challenges, and prospective smart solutions publication-title: Peer-to-Peer Netw. Appl. doi: 10.1007/s12083-018-0710-9 – ident: CR35 – volume: 99 start-page: 229 issue: 1 year: 1999 end-page: 238 ident: CR39 article-title: Snort: lightweight intrusion detection for networks publication-title: Lisa – ident: CR29 – volume: 40 start-page: 307 year: 2014 end-page: 324 ident: CR43 article-title: Network attacks: taxonomy, tools and systems publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2013.08.001 – ident: CR40 – ident: CR25 – volume: 28 start-page: 3655 issue: 12 year: 2017 end-page: 3682 ident: CR21 article-title: Taxonomy of DoS and DDoS attacks and desirable defense mechanism in a cloud computing environment publication-title: Neural Comput. Appl. doi: 10.1007/s00521-016-2317-5 – ident: CR27 – volume: 8 start-page: 1105 issue: 5 year: 2017 end-page: 1111 ident: CR37 article-title: Open daylight as a controller for software defined networking publication-title: Int. J. Adv. Res. Comput. Sci. – ident: CR23 – volume: 8 start-page: 2 issue: 3 year: 2017 ident: CR14 article-title: A review paper on software defined networking publication-title: Int. J. Adv. Res. Comput. Sci. – ident: CR19 – ident: CR44 – year: 2019 ident: CR12 publication-title: Handbook of Research on Cloud Computing and Big Data Applications in IoT – volume: 38 start-page: 69 issue: 2 year: 2008 end-page: 74 ident: CR6 article-title: OpenFlow: enabling innovation in campus networks publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/1355734.1355746 – volume: 70 start-page: 447 issue: 3 year: 2019 end-page: 489 ident: CR20 article-title: A comprehensive survey on network anomaly detection publication-title: Telecommun. Syst. doi: 10.1007/s11235-018-0475-8 – ident: CR38 – volume: 44 start-page: 87 issue: 2 year: 2014 end-page: 98 ident: CR3 article-title: The road to SDN: an intellectual history of programmable networks publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/2602204.2602219 – ident: CR31 – ident: CR11 – ident: CR9 – volume: 20 start-page: 1 year: 2011 end-page: 30 ident: CR5 article-title: The future of networking, and the past of protocols publication-title: Open Netw. Summit – ident: CR32 – volume: 10 start-page: 1985 issue: 5 year: 2019 end-page: 1997 ident: CR17 article-title: Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment publication-title: J. Amb. Intell. Hum. Comput. doi: 10.1007/s12652-018-0800-9 – ident: CR36 – volume: 103 start-page: 14 issue: 1 year: 2015 end-page: 76 ident: CR8 article-title: Software-defined networking: a comprehensive survey publication-title: Proc. IEEE doi: 10.1109/JPROC.2014.2371999 – ident: CR7 – volume: 72 start-page: 74 year: 2014 end-page: 98 ident: CR13 article-title: Software defined networking: state of the art and research challenges publication-title: Comput. Netw. doi: 10.1016/j.comnet.2014.07.004 – ident: CR28 – ident: CR41 – ident: CR26 – ident: CR24 – ident: 3133_CR18 doi: 10.1109/SDN4FNS.2013.6702553 – ident: 3133_CR28 doi: 10.1109/GREE.2013.25 – ident: 3133_CR24 doi: 10.1109/ICICI.2017.8365396 – ident: 3133_CR19 – volume: 40 start-page: 307 year: 2014 ident: 3133_CR43 publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2013.08.001 – ident: 3133_CR44 – volume: 103 start-page: 14 issue: 1 year: 2015 ident: 3133_CR8 publication-title: Proc. IEEE doi: 10.1109/JPROC.2014.2371999 – volume: 16 start-page: 1617 issue: 3 year: 2014 ident: 3133_CR4 publication-title: IEEE Commun. Surv. Tutor. doi: 10.1109/SURV.2014.012214.00180 – volume: 38 start-page: 69 issue: 2 year: 2008 ident: 3133_CR6 publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/1355734.1355746 – volume: 8 start-page: 1105 issue: 5 year: 2017 ident: 3133_CR37 publication-title: Int. J. Adv. Res. Comput. Sci. – ident: 3133_CR29 doi: 10.14722/sent.2015.23004 – ident: 3133_CR33 doi: 10.1109/Trustcom.2015.389 – ident: 3133_CR31 doi: 10.1145/3164541.3164562 – volume: 17 start-page: 27 issue: 1 year: 2015 ident: 3133_CR1 publication-title: IEEE Commun. Surveys Tutor. doi: 10.1109/COMST.2014.2330903 – ident: 3133_CR35 doi: 10.1109/ViTECoN.2019.8899721 – volume: 28 start-page: 3655 issue: 12 year: 2017 ident: 3133_CR21 publication-title: Neural Comput. Appl. doi: 10.1007/s00521-016-2317-5 – volume: 10 start-page: 1985 issue: 5 year: 2019 ident: 3133_CR17 publication-title: J. Amb. Intell. Hum. Comput. doi: 10.1007/s12652-018-0800-9 – ident: 3133_CR41 doi: 10.1109/ICACCI.2018.8554590 – ident: 3133_CR30 doi: 10.1145/3040992.3040998 – ident: 3133_CR10 – volume: 8 start-page: 2 issue: 3 year: 2017 ident: 3133_CR14 publication-title: Int. J. Adv. Res. Comput. Sci. – volume: 44 start-page: 87 issue: 2 year: 2014 ident: 3133_CR3 publication-title: ACM SIGCOMM Comput. Commun. Rev. doi: 10.1145/2602204.2602219 – ident: 3133_CR25 doi: 10.1109/CANDAR.2017.93 – volume-title: Handbook of Research on Cloud Computing and Big Data Applications in IoT year: 2019 ident: 3133_CR12 – ident: 3133_CR2 doi: 10.1145/1868447.1868466 – ident: 3133_CR26 – ident: 3133_CR9 – ident: 3133_CR27 doi: 10.1109/ICCNC.2015.7069319 – ident: 3133_CR7 doi: 10.1109/AINA.2013.113 – ident: 3133_CR32 – volume: 12 start-page: 291 issue: 2 year: 2019 ident: 3133_CR15 publication-title: Peer-to-Peer Netw. Appl. doi: 10.1007/s12083-018-0710-9 – volume: 10 start-page: 106 issue: 3 year: 2019 ident: 3133_CR34 publication-title: Information doi: 10.3390/info10030106 – volume: 70 start-page: 447 issue: 3 year: 2019 ident: 3133_CR20 publication-title: Telecommun. Syst. doi: 10.1007/s11235-018-0475-8 – volume: 72 start-page: 74 year: 2014 ident: 3133_CR13 publication-title: Comput. Netw. doi: 10.1016/j.comnet.2014.07.004 – ident: 3133_CR16 doi: 10.1007/978-981-13-1217-5_97 – ident: 3133_CR22 doi: 10.1145/2508859.2516684 – ident: 3133_CR38 – volume: 20 start-page: 1 year: 2011 ident: 3133_CR5 publication-title: Open Netw. Summit – ident: 3133_CR23 doi: 10.1109/GIIS.2015.7347185 – ident: 3133_CR36 – volume: 99 start-page: 229 issue: 1 year: 1999 ident: 3133_CR39 publication-title: Lisa – ident: 3133_CR40 doi: 10.1007/978-3-030-29407-6_58 – volume: 19 start-page: 383 issue: 3 year: 2017 ident: 3133_CR42 publication-title: IJ Netw. Security – ident: 3133_CR11 |
SSID | ssj0009729 |
Score | 2.554406 |
Snippet | Software-defined networking (SDN) is an approach in the network that provides many advantages with the help of separating the intelligence of the network... |
SourceID | proquest crossref springer |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 501 |
SubjectTerms | Bandwidths Computer Communication Networks Computer Science Controllers Cybersecurity Denial of service attacks Floods Hammers Infrastructure Intrusion detection systems Network security Operating Systems Packet switching Processor Architectures Software-defined networking Switches |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1JS8UwEA4uFy_u4nMjB28abJq0TU_iigg-xQW8lTSTiiB9Lk_Ei7_dmb7UqqC3liZz6CSTb5Iv8zG26Z21rgQvDEAitFWpKFWcCZ_kJvJ5BFrT5eSzfnpyo09vk9uw4fYSaJVtTGwCNQwc7ZHvxDkiYZ0mmdx9fBKkGkWnq0FCY5xNYgg2mHxN7h_1Ly67srtZo1MmlUlFZpIsXJsJl-cSQwTcSFD9QiXefy5NHd78dUTarDzHs2w6QEa-N_LxHBvz9TybaeUYeJidC-zjqn9-ec1pXQLuqXAxPzwcXHHww4ZvVfNR2WZOXPc7TlQSwHydsnNua-AkpMXrES2cGuA7DQ98Cv3u0QJG7Tf77NFohfgUvrVfZDfHR9cHJyLIKwiH824oLEI3D67KMUl0UFlErlEe5bGVSsZVDinEGqS02kPsNGYuhO8qUJXOXCm1V0tsoh7UfpnxyJvMlCqRVjnM97Jc-ljaSFWptcaA7zHZ_tnChdrjJIHxUHRVk8kbBXqjaLxRvPfY1lefx1HljX9br7UOK8IsfCm6MdNj260Tu89_W1v539oqm4qJ2tJQ0dbYxPD51a8jNhmWG2EAfgIClOKs priority: 102 providerName: ProQuest |
Title | SNORT based early DDoS detection system using Opendaylight and open networking operating system in software defined networking |
URI | https://link.springer.com/article/10.1007/s10586-020-03133-y https://www.proquest.com/docview/2918246571 |
Volume | 24 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS-RAEC58XLys6wvHx9AHb9qQfiTpHMd1RlEcRR3QU-h0dZYFiaKzLF787VZnEkdFhT0lIZU6pPpRH_3VVwA73lnrCvTcIMZcW5XwQsmU-zgzkc8i1DoUJ58Ok6ORPr6Or5uisMeW7d4eSdYr9Ztit9gEwmzEg96g4k-zMB8H7E6jeCR7U6ndtO5NJhRZpyZOm1KZz328346mOeaHY9F6txn8hB9Nmsh6k7guwYyvlmGxbcHAmhm5As-Xw7OLKxb2ImQ-iBWzg4O7S4Z-XHOsKjaRamaB3_6bBfoIEkYPiJzZCllonsWqCRU8GNBzGBJ013z3hzzQSv3PPnhyWlJOim_sV2E06F_9OuJNSwXuaK6NuaV0zaMrMwKGDktL2WqURZm0QglZZpig1CiE1R6l04RWQk5Xoip16gqhvVqDuequ8uvAIm9SU6hYWOUI46WZ8FLYSJWJtcag74Bo_2zuGr3x0PbiNp8qJYdo5BSNvI5G_tSB3ddv7idqG99ab7UBy5uZ95jLjBCTTuJUdGCvDeL09dfeNv7PfBMWZKC31HS0LZgbP_z125SfjIsuzJrBYRfme4c3J3267veH5xfdepC-APQZ4rc |
linkProvider | Springer Nature |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwEB6VcoALb9SFAj7ACSziRxL7gKqKZdnSdpHoVuotOB4HIVXZ0i6q9sJP6m-sJw8CSPTWW6zYc_CMPZ_tb2YAXgbvnC8xcIOYcu1Uxkslcx5Sa5JgE9SagpP3Z9n0UH86So_W4KKPhSFaZb8nNhs1Ljzdkb-VNiJhnaW52Dr5walqFL2u9iU0WrPYDavzeGQ7e7czjvp9JeXkw_z9lHdVBbiP5rbkLiKWgL6y8WzksXIRsCU2sdIJJWRlMUOpUQinA0qvI2AnWFOhqnTuS6GDinJvwE2tlKUVZSYfhyS_eVMVTSiT8dykeRek04XqpYbovgmnbImKr_52hAO6_edBtvFzk3twpwOobLu1qPuwFuoHcLcv_sC6veAh_DqYff4yZ-QFkQVKk8zG48UBw7Bs2F01a5NEM2LWf2NEXEG3Oqa7AOZqZFS2i9UtCZ06xDYZY_zqxn2PEqKPOHenIQqtIhrGP_o_gsNrmfbHsF4v6rABLAkmN6VKhVM-ni5zK4IULlFV5pwxGEYg-pktfJfpnApuHBdDjmbSRhG1UTTaKFYjeP17zEmb5-PK3pu9wopuzZ8Vg4WO4E2vxOH3_6U9uVraC7g1ne_vFXs7s92ncFsSqaYhwW3C-vL0Z3gWUdGyfN6YIoOv1237lxWcHjU |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9tAEF61VEK9FEpBTQl0D73RFd6HX8eIEIU-AmoSKTdrvbNGlSoTpa4qLvx2ZvxoQgWVerPl2Tns7OMb-ZtvGPvgnbUuBy8SgFAYqyORaxULH6ZJ4NMAjKHi5K-TaDw3nxbhYqOKv2a7d78km5oGUmkqq9MlFKcbhW9hQuTZQJD2oBa3z9kLPI4lreu5Gqxld-O6T5nUaB0nYdyWzTzu4-HVtMabf_0irW-e0S571UJGPmhi_Jo98-Ue2-naMfB2d75hd9PJ5bcZp3sJuCfhYj4c3kw5-KrmW5W8kW3mxHW_5kQlAczXKTvntgROjbR42dDCyQDfaXngUzvuO3rAU_u3XXl0WiA-hQ37fTYfnc_OxqJtryAcTlQlLEI3D65IMUl0UFhErkEapMriPKoihQiUASmt8aCcwcyF8F0BujCxy6Xx-oBtlTelf8t44JM4yXUorXaY78Wp9EraQBeRtUkCvsdkN7OZa7XHqQXGj2ytmkzRyDAaWR2N7LbHTv6MWTbKG_-07ncBy9pd-DNTKWZPJgpj2WMfuyCuPz_t7d3_mb9n21fDUfblYvL5kL1UxHqpWWp9tlWtfvkjhC1VflyvzHtK6uXS |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=SNORT+based+early+DDoS+detection+system+using+Opendaylight+and+open+networking+operating+system+in+software+defined+networking&rft.jtitle=Cluster+computing&rft.au=Badotra%2C+Sumit&rft.au=Panda%2C+Surya+Narayan&rft.date=2021-03-01&rft.pub=Springer+US&rft.issn=1386-7857&rft.eissn=1573-7543&rft.volume=24&rft.issue=1&rft.spage=501&rft.epage=513&rft_id=info:doi/10.1007%2Fs10586-020-03133-y&rft.externalDocID=10_1007_s10586_020_03133_y |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1386-7857&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1386-7857&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1386-7857&client=summon |