{"id":"https://openalex.org/W2221972625","doi":"https://doi.org/10.1109/milcom.2015.7357519","title":"An SDN-supported collaborative approach for DDoS flooding detection and containment","display_name":"An SDN-supported collaborative approach for DDoS flooding detection and containment","publication_year":2015,"publication_date":"2015-10-01","ids":{"openalex":"https://openalex.org/W2221972625","doi":"https://doi.org/10.1109/milcom.2015.7357519","mag":"2221972625"},"language":"en","primary_location":{"id":"doi:10.1109/milcom.2015.7357519","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357519","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010095679","display_name":"Tommy Chin","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Tommy Chin","raw_affiliation_strings":["Rochester Institute of Technology, New York, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, New York, USA","institution_ids":["https://openalex.org/I155173764"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041245378","display_name":"Xenia Mountrouidou","orcid":null},"institutions":[{"id":"https://openalex.org/I130905186","display_name":"Wofford College","ror":"https://ror.org/04dzs7b08","country_code":"US","type":"education","lineage":["https://openalex.org/I130905186"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xenia Mountrouidou","raw_affiliation_strings":["Wofford College, Spartanburg, SC, USA"],"affiliations":[{"raw_affiliation_string":"Wofford College, Spartanburg, SC, USA","institution_ids":["https://openalex.org/I130905186"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100341802","display_name":"Xiang\u2010Yang Li","orcid":null},"institutions":[{"id":"https://openalex.org/I145311948","display_name":"Johns Hopkins University","ror":"https://ror.org/00za53h95","country_code":"US","type":"education","lineage":["https://openalex.org/I145311948"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Xiangyang Li","raw_affiliation_strings":["Johns Hopkins University, Baltimore, Maryland, USA"],"affiliations":[{"raw_affiliation_string":"Johns Hopkins University, Baltimore, Maryland, USA","institution_ids":["https://openalex.org/I145311948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101689516","display_name":"Kaiqi Xiong","orcid":null},"institutions":[{"id":"https://openalex.org/I155173764","display_name":"Rochester Institute of Technology","ror":"https://ror.org/00v4yb702","country_code":"US","type":"education","lineage":["https://openalex.org/I155173764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kaiqi Xiong","raw_affiliation_strings":["Rochester Institute of Technology, New York, USA"],"affiliations":[{"raw_affiliation_string":"Rochester Institute of Technology, New York, USA","institution_ids":["https://openalex.org/I155173764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5010095679"],"corresponding_institution_ids":["https://openalex.org/I155173764"],"apc_list":null,"apc_paid":null,"fwci":5.3252,"has_fulltext":false,"cited_by_count":55,"citation_normalized_percentile":{"value":0.96027827,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"659","last_page":"664"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7985553741455078},{"id":"https://openalex.org/keywords/testbed","display_name":"Testbed","score":0.7036632299423218},{"id":"https://openalex.org/keywords/flooding","display_name":"Flooding (psychology)","score":0.585041880607605},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.5831518769264221},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.5740892887115479},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.5509648323059082},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.546829104423523},{"id":"https://openalex.org/keywords/network-topology","display_name":"Network topology","score":0.5409373641014099},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5232297778129578},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5171177387237549},{"id":"https://openalex.org/keywords/software-defined-networking","display_name":"Software-defined networking","score":0.5104926824569702},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.4883238971233368},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.4837234318256378},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4823153018951416},{"id":"https://openalex.org/keywords/network-monitoring","display_name":"Network monitoring","score":0.4767675995826721},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.47598496079444885},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45514798164367676},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3968474566936493},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.22763663530349731},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1310877799987793},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.13025245070457458}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7985553741455078},{"id":"https://openalex.org/C31395832","wikidata":"https://www.wikidata.org/wiki/Q1318674","display_name":"Testbed","level":2,"score":0.7036632299423218},{"id":"https://openalex.org/C186594467","wikidata":"https://www.wikidata.org/wiki/Q1429176","display_name":"Flooding (psychology)","level":2,"score":0.585041880607605},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.5831518769264221},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.5740892887115479},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.5509648323059082},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.546829104423523},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.5409373641014099},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5232297778129578},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5171177387237549},{"id":"https://openalex.org/C77270119","wikidata":"https://www.wikidata.org/wiki/Q1655198","display_name":"Software-defined networking","level":2,"score":0.5104926824569702},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.4883238971233368},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.4837234318256378},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4823153018951416},{"id":"https://openalex.org/C81877898","wikidata":"https://www.wikidata.org/wiki/Q1965787","display_name":"Network monitoring","level":2,"score":0.4767675995826721},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.47598496079444885},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45514798164367676},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3968474566936493},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.22763663530349731},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1310877799987793},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.13025245070457458},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.0},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/milcom.2015.7357519","is_oa":false,"landing_page_url":"https://doi.org/10.1109/milcom.2015.7357519","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"MILCOM 2015 - 2015 IEEE Military Communications Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1568205223","https://openalex.org/W1583113493","https://openalex.org/W1969449821","https://openalex.org/W1972041827","https://openalex.org/W1983559153","https://openalex.org/W2017524370","https://openalex.org/W2031175798","https://openalex.org/W2040146912","https://openalex.org/W2162932000","https://openalex.org/W2163375756","https://openalex.org/W2229773071","https://openalex.org/W2288766236","https://openalex.org/W2413928768","https://openalex.org/W6684140911","https://openalex.org/W6689768548"],"related_works":["https://openalex.org/W2767068794","https://openalex.org/W4229489764","https://openalex.org/W3114854705","https://openalex.org/W2735897973","https://openalex.org/W4213341501","https://openalex.org/W3195575042","https://openalex.org/W1543555101","https://openalex.org/W2898113880","https://openalex.org/W2793567886","https://openalex.org/W4308272253"],"abstract_inverted_index":{"Software":[0],"Defined":[1],"Networking":[2],"(SDN)":[3],"has":[4],"the":[5,81,103,123,169,187],"potential":[6,141],"to":[7,38,133,151,162,192],"enable":[8],"novel":[9],"security":[10],"applications":[11],"that":[12,42,60,118],"support":[13],"flexible,":[14],"on-demand":[15],"deployment":[16],"of":[17,29,48,95,125,189],"system":[18],"elements.":[19],"It":[20],"can":[21],"offer":[22],"targeted":[23],"forensic":[24],"evidence":[25],"collection":[26],"and":[27,50,66,80,98,105,183,200],"investigation":[28],"computer":[30],"network":[31,39,52,63,113],"attacks.":[32],"Such":[33],"unique":[34],"capabilities":[35],"are":[36],"instrumental":[37],"intrusion":[40],"detection":[41,79,184],"is":[43,131],"challenged":[44],"by":[45,70],"large":[46],"volumes":[47],"data":[49,104],"complex":[51],"topologies.":[53],"This":[54],"paper":[55],"presents":[56],"an":[57,138],"innovative":[58],"approach":[59,130,161],"coordinates":[61],"distributed":[62],"traffic":[64],"Monitors":[65,76],"attack":[67,88,115],"Correlators":[68,82],"supported":[69],"Open":[71],"Virtual":[72],"Switches":[73],"(OVS).":[74],"The":[75,180],"conduct":[77],"anomaly":[78],"perform":[83],"deep":[84],"packet":[85],"inspection":[86],"for":[87,112,172],"signature":[89,116],"recognition.":[90],"These":[91],"elements":[92],"take":[93],"advantage":[94],"complementary":[96],"views":[97],"information":[99,126],"availability":[100],"on":[101,168],"both":[102],"control":[106],"planes.":[107],"Moreover,":[108],"they":[109],"collaboratively":[110],"look":[111],"flooding":[114],"constituents":[117],"possess":[119],"different":[120],"characteristics":[121],"in":[122,186],"level":[124],"abstraction.":[127],"Therefore,":[128],"this":[129,158],"able":[132],"not":[134],"only":[135],"quickly":[136],"raise":[137],"alert":[139],"against":[140],"threats,":[142],"but":[143],"also":[144],"follow":[145],"it":[146],"up":[147],"with":[148,157],"careful":[149],"verification":[150],"reduce":[152],"false":[153],"alarms.":[154],"We":[155],"experiment":[156],"SDN-supported":[159],"collaborative":[160],"detect":[163],"TCP":[164],"SYN":[165],"flood":[166],"attacks":[167],"Global":[170],"Environment":[171],"Network":[173],"Innovations":[174],"(GENI),":[175],"a":[176,190],"realistic":[177],"virtual":[178],"testbed.":[179],"response":[181],"times":[182],"accuracy,":[185],"context":[188],"small":[191],"medium":[193],"corporate":[194],"network,":[195],"have":[196],"demonstrated":[197],"its":[198],"effectiveness":[199],"scalability.":[201]},"counts_by_year":[{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":11},{"year":2018,"cited_by_count":8},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":2}],"updated_date":"2026-01-28T23:14:49.684275","created_date":"2025-10-10T00:00:00"}
