Electronics Optics & Control, Volume. 23, Issue 3, 49(2016)
Source Address Validation Methods Based on SDN
[1] [1] MICKEOWN N, ANDERSON T, BALAKRISHNAN H, et al. OpenFlow:enabling innovation in campus networks[J].ACM Sigcomm Computer Communication Review, 2008, 38(2):69-74.
[3] [3] BREMLER B A, LEVY H.Spoofing prevention method [C]//The 24th Annual Joint Conference of the Computer and Communications Societies, Proceedings, IEEE, 2005:536-547.
[4] [4] FERGUSON P, SENIE D.ITEF RFC 2827 network ingress filtering:defeating denial of service attacks which employ IP source address spoofing[S].Washington:ISOC, 2000.
[5] [5] BOLTON C, LOWE G.Analyses of the reverse path forwarding routing algorithm[C]//The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Florence, 2004:485-491.
[6] [6] PARK K H, LEE H J.On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets[C]//Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New York:ACM, 2001:15-26.
[7] [7] CHENG J, WANG H N, KANG G S.Hop-count filtering:an effective denfense against spoofed DDoS traffic[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security, New York:ACM, 2003:30-41.
[8] [8] WU J P, BI J, LI X.IRTF RFC5210 a Source Address Validation Architecture (SAVA) test bed and deployment experience[S].Washington:ISOC, 2008.
[9] [9] SAVAGE S, WETHERALL D, KARLIN A, et al.Network support for IP traceback[J].IEEE/ACM Transactions on Networking, 2001, 9(3):226-237.
[10] [10] ABRAHAM Y, PERRIG A, SONG D.Pi:a path identification mechanism to defend against DDoS attacks[C]//Symposium on Security and Privacy, Proceedings, IEEE, 2003:93-107.
[11] [11] WU J P, REN G.Building a next generation Internet with source address validation architecture[J].Science in China, 2008, 38(10):1583-1593.
[12] [12] CHUNG S, LIAO L, WAN J.Software defined networks [J].Communications Magazine, IEEE, 2013, 51(2):113-117.
[13] [13] WEN F X, YONG G W, CHUAN H F, et al.A survey on software defined networking[J].IEEE Communications Surveys & Tutorials, 2014, 17(1):27-51.
Get Citation
Copy Citation Text
SUN Peng. Source Address Validation Methods Based on SDN[J]. Electronics Optics & Control, 2016, 23(3): 49
Category:
Received: Mar. 24, 2015
Accepted: --
Published Online: Apr. 5, 2016
The Author Email: