[1] N. Anerousis, P. Chemouil, A. A. Lazar, N. Mihai, and S. B. Weinstein, “The Origin and Evolution of Open Programmable Networks and SDN,” IEEE Communications Surveys and Tutorials, vol. 23, no. 3. Institute of Electrical and Electronics Engineers Inc., pp. 1956–1971, Jul. 01, 2021. doi: 10.1109/COMST.2021.3060582.
[2] R. Wazirali, R. Ahmad, and S. Alhiyari, “Sdn-openflow topology discovery: An overview of performance issues,” Applied Sciences (Switzerland), vol. 11, no. 15. MDPI AG, Aug. 01, 2021. doi: 10.3390/app11156999.
[3] K. Benzekki, A. el Fergougui, and A. Elbelrhiti Elalaoui, “Software-defined networking (SDN): a survey,” Security and Communication Networks, vol. 9, no. 18, pp. 5803–5833, Dec. 2016, doi: 10.1002/sec.1737.
[4] A. Montazerolghaem, “Software-defined load-balanced data center: design, implementation and performance analysis,” Cluster Comput, vol. 24, no. 2, pp. 591–610, Jun. 2021, doi: 10.1007/s10586-020-03134-x.
[5] E. Hodo, X. Bellekens, A. Hamilton, C. Tachtatzis, and R. Atkinson, “Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey.”
[6] M. Alsaeedi, M. M. Mohamad, and A. A. Al-Roubaiey, “Toward Adaptive and Scalable OpenFlow-SDN Flow Control: A Survey,” IEEE Access, vol. 7, pp. 107346–107379, 2019, doi: 10.1109/ACCESS.2019.2932422.
[7] “OpenFlow - Open Networking Foundation.” https://opennetworking.org/sdn-resources/customer-case-studies/openflow/ (accessed Mar. 29, 2022).
[8] Y. Hande and A. Muddana, “A survey on intrusion detection system for software defined networks (SDN),” International Journal of Business Data Communications and Networking, vol. 16, no. 1. IGI Global, pp. 28–47, Jan. 01, 2020. doi: 10.4018/IJBDCN.2020010103.
[9] “Open vSwitch.” https://www.openvswitch.org/ (accessed Apr. 02, 2022).
[10] J. Son and R. Buyya, “A taxonomy of software-defined networking (SDN)-enabled cloud computing,” ACM Computing Surveys, vol. 51, no. 3. Association for Computing Machinery, Apr. 01, 2018. doi: 10.1145/3190617.
[11] A. Montazerolghaem, M. H. Y. Moghaddam, and A. Leon-Garcia, “OpenSIP: Toward software-defined SIP networking,” IEEE Transactions on Network and Service Management, vol. 15, no. 1, pp. 184–199, Mar. 2018, doi: 10.1109/TNSM.2017.2741258.
[12] B. G. Assefa and O. Ozkasap, “RESDN: A Novel Metric and Method for Energy Efficient Routing in Software Defined Networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 736–749, Jun. 2020, doi: 10.1109/TNSM.2020.2973621.
[13] L. F. Eliyan and R. di Pietro, “DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges,” Future Generation Computer Systems, vol. 122, pp. 149–171, Sep. 2021, doi: 10.1016/j.future.2021.03.011.
[14] C. Kolias, G. Kambourakis, A. Stavrou, and J. Voas, “DDoS in the IoT: Mirai and other botnets,” Computer (Long Beach Calif), vol. 50, no. 7, pp. 80–84, 2017, doi: 10.1109/MC.2017.201.
[15] “DDoS attack that disrupted internet was largest of its kind in history, experts say | Hacking | The Guardian.” https://www.theguardian.com/technology/2016/oct/26/ddos-attack-dyn-mirai-botnet (accessed Jun. 10, 2022).
[16] “DDoS report Q3 2019 | Securelist.” https://securelist.com/ddos-report-q3-2019/94958/ (accessed Jun. 10, 2022).
[17] 2019 IEEE 9th International Conference on Advanced Computing (IACC). IEEE, 2019.
[18] C. D. Cajas and D. O. Budanov, “Mitigation of Denial of Service Attacks Using OpenDaylight Application in Software-Defined Networking,” in Proceedings of the 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering, ElConRus 2021, Jan. 2021, pp. 260–265. doi: 10.1109/ElConRus51938.2021.9396272.
[19] S. M. Mousavi and M. St-Hilaire, “Early Detection of DDoS Attacks Against Software Defined Network Controllers,” Journal of Network and Systems Management, vol. 26, no. 3, pp. 573–591, Jul. 2018, doi: 10.1007/s10922-017-9432-1.
[20] “DDOS Attack Detection & Prevention in SDNusing OpenFlow Statistics,” 2019.
[21] S. Aluru, Jaypee Institute of Information Technology University, University of Florida. College of Engineering, IEEE Computer Society, IEEE Computer Society. Technical Committee on Parallel Processing, and Institute of Electrical and Electronics Engineers, 2018 Eleventh International Conference on Contemporary Computing (IC3) : 2-4 August 2018, Jaypee Institute of Information Technology, Noida, India.
[22] O. Rahman, M. A. G. Quraishi, and C. H. Lung, “DDoS attacks detection and mitigation in SDN using machine learning,” in Proceedings - 2019 IEEE World Congress on Services, SERVICES 2019, Jul. 2019, pp. 184–189. doi: 10.1109/SERVICES.2019.00051.
[23] S. Gao, Z. Peng, B. Xiao, A. Hu, Y. Song, and K. Ren, “Detection and mitigation of DoS attacks in software defined networks,” IEEE/ACM Transactions on Networking, vol. 28, no. 3, pp. 1419–1433, Jun. 2020, doi: 10.1109/TNET.2020.2983976.
[24] Institute of Electrical and Electronics Engineers., 2018 IEEE International Conference on Communications (ICC) : proceedings : Kansas City, MO, USA, 20 -24 May 2018.
[25] Institute of Electrical and Electronics Engineers, 2019 4th International Conference on Internet of Things: Smart Innovation and Usages (IoT-SIU).
[26] S. Batool et al., “Lightweight Statistical Approach towards TCP SYN Flood DDoS Attack Detection and Mitigation in SDN Environment,” Security and Communication Networks, vol. 2022, 2022, doi: 10.1155/2022/2593672.
[27] “Mininet: An Instant Virtual Network on Your Laptop (or Other PC) - Mininet.” http://mininet.org/ (accessed Mar. 31, 2022).
[28] “Scapy.” https://scapy.net/ (accessed Apr. 02, 2022).
[29] S. M. Mousavi and M. St-Hilaire, “Early Detection of DDoS Attacks Against Software Defined Network Controllers,” Journal of Network and Systems Management, vol. 26, no. 3, pp. 573–591, Jul. 2018, doi: 10.1007/s10922-017-9432-1.
[30] A. Mishra, N. Gupta, and B. B. Gupta, “Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller,” Telecommun Syst, vol. 77, no. 1, pp. 47–62, May 2021, doi: 10.1007/s11235-020-00747-w.