Y. Yu, A survey of anomaly intrusion detection techniques, J. Comput. Sci. Coll, vol.28, issue.1, 2012.

Y. Gilad and A. Herzberg, LOT, ACM Transactions on Information and System Security, vol.15, issue.2, 2012.
DOI : 10.1145/2240276.2240277

A. Networks, Worldwide infrastructure security report, Tech. Rep, 2013.

V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review, vol.31, issue.3, pp.38-47, 2001.
DOI : 10.1145/505659.505664

N. Mckeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson et al., OpenFlow, ACM SIGCOMM Computer Communication Review, vol.38, issue.2, pp.69-74, 2008.
DOI : 10.1145/1355734.1355746

S. R. Chowdhury, M. F. Bari, R. Ahmed, and R. Boutaba, PayLess: A low cost network monitoring framework for Software Defined Networks, 2014 IEEE Network Operations and Management Symposium (NOMS), 2014.
DOI : 10.1109/NOMS.2014.6838227

S. Zargar, J. Joshi, and D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013.
DOI : 10.1109/SURV.2013.031413.00127

H. Wang, C. Jin, and K. G. Shin, Defense Against Spoofed IP Traffic Using Hop-Count Filtering, IEEE/ACM Transactions on Networking, vol.15, issue.1, pp.40-53, 2007.
DOI : 10.1109/TNET.2006.890133

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.104.7433

S. Savage, D. Wetherall, A. Karlin, and T. Anderson, Practical network support for ip traceback, Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication -SIG- COMM, 2000.
DOI : 10.1145/347057.347560

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.118.3372

D. X. Song and A. Perrig, Advanced and authenticated marking schemes for ip traceback, Annual Joint Conference of the IEEE Computer and Communications Societies -INFOCOM. IEEE, 2001.

M. T. Goodrich, Efficient packet marking for large-scale IP traceback, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002.
DOI : 10.1145/586110.586128

L. Lu, M. C. Chan, and E. Chang, A general model of probabilistic packet marking for IP traceback, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, 2008.
DOI : 10.1145/1368310.1368337

M. Sung, J. Xu, J. Li, and L. Li, Large-scale ip traceback in high-speed internet: Practical techniques and information-theoretic foundation, Transactions on Networking

U. Hoelzle and @. Google, Available: http://www.opennetsummit.org/archives/apr12/ hoelzle-tue-openflow.pdf, OpenNetMon: Network Monitoring in OpenFlow Software-Defined Networks Network Operations and Management Symposium (NOMS, 2012.

A. Bates, K. Butler, A. Haeberlen, M. Sherr, and W. Zhou, Let SDN Be Your Eyes: Secure Forensics in Data Center Networks, Proceedings 2014 Workshop on Security of Emerging Networking Technologies, 2014.
DOI : 10.14722/sent.2014.23002

R. Perlman, An algorithm for distributed computation of a spanningtree in an extended lan, Proceedings of the Ninth Symposium on Data Communications, SIGCOMM. ACM, 1985.

M. Fares, A. Loukissas, and A. Vahdat, A scalable, commodity data center network architecture, SIGCOMM Conference on Data Communication, 2008.

A. Shieh, S. Kandula, A. Greenberg, and C. Kim, Seawall: Performance isolation for cloud datacenter networks, Conference on Hot Topics in Cloud Computing -HotCloud. USENIX, 2010.

D. Abts and J. Kim, High Performance Datacenter Networks: Architectures, Algorithms, and Opportunities, Synthesis Lectures on Computer Architecture, vol.6, issue.1, 2011.
DOI : 10.2200/S00341ED1V01Y201103CAC014

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.401.8263