U. Alert, TA14-017A) UDP-Based Amplification Attacks, https://www. us-cert.gov/ncas, pp.2016-2018

. Ryu, F. Sdn, and . Community, Ryu sdn controller, pp.2016-2018

R. Braga, E. Mota, and A. Passito, Lightweight DDoS flooding attack detection using NOX/OpenFlow, IEEE Local Computer Network Conference, pp.408-415, 2010.
DOI : 10.1109/LCN.2010.5735752

D. Con-communications and . Inc, Defcon pcap traces, https://www.defcon.org/ html/links/dc-torrent.html, last visited on, pp.2016-2018

N. Feamster, Outsourcing home network security, Proceedings of the 2010 ACM SIGCOMM workshop on Home networks, HomeNets '10, pp.37-42, 2010.
DOI : 10.1145/1851307.1851317

URL : http://conferences.sigcomm.org/sigcomm/2010/papers/homenets/p37.pdf

J. François, L. Dolberg, O. Festor, and T. Engel, Network security through software defined networking, Proceedings of the Conference on Principles, Systems and Applications of IP Telecommunications, IPTComm '14, 2014.
DOI : 10.1109/CNSM.2013.6727820

K. Giotis, C. Argyropoulos, G. Androulidakis, D. Kalogeras, and V. Maglaris, Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments, Computer Networks, vol.62, pp.122-136, 2014.
DOI : 10.1016/j.bjp.2013.10.014

S. Hansman and R. Hunt, A taxonomy of network and computer attacks, Computers & Security, vol.24, issue.1, pp.31-43, 2005.
DOI : 10.1016/j.cose.2004.06.011

J. H. Jafarian, E. Al-shaer, and Q. Duan, Openflow random host mutation, Proceedings of the first workshop on Hot topics in software defined networks, HotSDN '12, pp.127-132, 2012.
DOI : 10.1145/2342441.2342467

S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving target defense: creating asymmetric uncertainty for cyber threats, 2011.
DOI : 10.1007/978-1-4614-0977-9

P. Kampanakis, H. Perros, and T. Beyene, SDN-based solutions for Moving Target Defense network protection, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, pp.1-6, 2014.
DOI : 10.1109/WoWMoM.2014.6918979

URL : http://www4.ncsu.edu/~hp//Panos.pdf

P. Kampanakis, H. Perros, and T. Beyene, SDN-based solutions for Moving Target Defense network protection, Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014, pp.1-6, 2014.
DOI : 10.1109/WoWMoM.2014.6918979

URL : http://www4.ncsu.edu/~hp//Panos.pdf

D. Kreutz, F. Ramos, and P. Verissimo, Towards secure and dependable softwaredefined networks, Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, pp.55-60, 2013.
DOI : 10.1145/2491185.2491199

URL : http://www.ietf.org/proceedings/87/slides/slides-87-sdnrg-2/

A. Lara, A. Kolasani, and B. Ramamurthy, Network Innovation using OpenFlow: A Survey, IEEE Communications Surveys & Tutorials, vol.16, issue.1, pp.493-512, 2014.
DOI : 10.1109/SURV.2013.081313.00105

R. Sahay, G. Blanc, Z. Zhang, and H. Debar, Towards Autonomic DDoS Mitigation using Software Defined Networking, Proceedings 2015 Workshop on Security of Emerging Networking Technologies, pp.1-6, 2015.
DOI : 10.14722/sent.2015.23004

URL : https://hal.archives-ouvertes.fr/hal-01257899

L. Schehlmann, S. Abt, and H. Baier, Blessing or curse? Revisiting security aspects of Software-Defined Networking, 10th International Conference on Network and Service Management (CNSM) and Workshop, pp.382-387, 2014.
DOI : 10.1109/CNSM.2014.7014199

S. Scott-hayward, G. O-'callaghan, and S. Sezer, Sdn Security: A Survey, 2013 IEEE SDN for Future Networks and Services (SDN4FNS), pp.1-7, 2013.
DOI : 10.1109/SDN4FNS.2013.6702553

S. Shishira, V. Pai, and K. Manamohan, Current trends in detection and mitigation of denial of service attacks-a survey, International Journal of Computer Applications, 2014.

M. Vizváry and J. Vykopal, Future of DDoS Attacks Mitigation in Software Defined Networks, Monitoring and Securing Virtualized Networks and Services, pp.123-127, 2014.
DOI : 10.1007/978-3-662-43862-6_15

A. Zaalouk, R. Khondoker, R. Marx, and K. Bayarou, OrchSec: An orchestrator-based architecture for enhancing network-security using Network Monitoring and SDN Control functions, 2014 IEEE Network Operations and Management Symposium (NOMS), pp.1-9, 2014.
DOI : 10.1109/NOMS.2014.6838409

S. Zargar, J. Joshi, and D. Tipper, A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks, IEEE Communications Surveys & Tutorials, vol.15, issue.4, pp.2046-2069, 2013.
DOI : 10.1109/SURV.2013.031413.00127