http: //www.stateoftheinternet.com/resources-web-security-2014-q4-internet- security-report.html, last accessed on, State of the Internet ? Security Report, pp.2015-2016, 2014. ,
SMB Cloud Adoption Trends in 2014, http://www.pcworld.com/article/2685792/infographic-smb-cloud- adoption-trends-in-2014.html, last accessed on, pp.2015-2016 ,
A survey on deep packet inspection for intrusion detection systems, 2008. ,
Lightweight DDoS flooding attack detection using NOX/OpenFlow, IEEE Local Computer Network Conference, pp.408-415, 2010. ,
DOI : 10.1109/LCN.2010.5735752
Outsourcing home network security, Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, HomeNets '10, pp.37-42, 2010. ,
DOI : 10.1145/1851307.1851317
Network security through software defined networking, Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '14 ,
DOI : 10.1145/2670386.2670390
Security Monitoring, 2009. ,
Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments, Computer Networks, vol.62, pp.122-136, 2014. ,
DOI : 10.1016/j.bjp.2013.10.014
Towards secure and dependable softwaredefined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp.55-60, 2013. ,
DOI : 10.1145/2491185.2491199
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.370.3880
COFFEE: a Concept based on OpenFlow to Filter and Erase Events of botnet activity at high-speed nodes, pp.2225-2239, 2013. ,
Sdn Security: A Survey, 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp.1-7, 2013. ,
DOI : 10.1109/SDN4FNS.2013.6702553
An Overview of IP Flow-Based Intrusion Detection, IEEE Communications Surveys & Tutorials, vol.12, issue.3, pp.343-356, 2010. ,
DOI : 10.1109/SURV.2010.032210.00054