A survey of anomaly intrusion detection techniques, J. Comput. Sci. Coll, vol.28, issue.1, 2012. ,
LOT, ACM Transactions on Information and System Security, vol.15, issue.2, 2012. ,
DOI : 10.1145/2240276.2240277
Worldwide infrastructure security report, Tech. Rep, 2013. ,
An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, vol.31, issue.3, pp.38-47, 2001. ,
DOI : 10.1145/505659.505664
OpenFlow, ACM SIGCOMM Computer Communication Review, vol.38, issue.2, pp.69-74, 2008. ,
DOI : 10.1145/1355734.1355746
PayLess: A low cost network monitoring framework for Software Defined Networks, 2014 IEEE Network Operations and Management Symposium (NOMS), 2014. ,
DOI : 10.1109/NOMS.2014.6838227
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013. ,
DOI : 10.1109/SURV.2013.031413.00127
Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Transactions on Networking, vol.15, issue.1, pp.40-53, 2007. ,
DOI : 10.1109/TNET.2006.890133
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7433
Practical network support for ip traceback, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication -SIG- COMM, 2000. ,
DOI : 10.1145/347057.347560
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.3372
Advanced and authenticated marking schemes for ip traceback, Annual Joint Conference of the IEEE Computer and Communications Societies -INFOCOM. IEEE, 2001. ,
Efficient packet marking for large-scale IP traceback, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586128
A general model of probabilistic packet marking for IP traceback, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, 2008. ,
DOI : 10.1145/1368310.1368337
Large-scale ip traceback in high-speed internet: Practical techniques and information-theoretic foundation, Transactions on Networking ,
Available: http://www.opennetsummit.org/archives/apr12/ hoelzle-tue-openflow.pdf, OpenNetMon: Network Monitoring in OpenFlow Software-Defined Networks Network Operations and Management Symposium (NOMS, 2012. ,
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014. ,
DOI : 10.14722/sent.2014.23002
An algorithm for distributed computation of a spanningtree in an extended lan, Proceedings of the Ninth Symposium on Data Communications, SIGCOMM. ACM, 1985. ,
A scalable, commodity data center network architecture, SIGCOMM Conference on Data Communication, 2008. ,
Seawall: Performance isolation for cloud datacenter networks, Conference on Hot Topics in Cloud Computing -HotCloud. USENIX, 2010. ,
High Performance Datacenter Networks: Architectures, Algorithms, and Opportunities, Synthesis Lectures on Computer Architecture, vol.6, issue.1, 2011. ,
DOI : 10.2200/S00341ED1V01Y201103CAC014
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.8263