|
[1]“Open Networking Foundation,” https://www.opennetworking.org/ [Online]Date accessed: July 12, 2020. [2]“FireEye M-Trends Reports,” https://content.fireeye.com/m-trends/rpt-m-trends-2020 [Online]Date accessed: July 12, 2020. [3]“Open Threat Intelligence Community,” https://otx.alienvault.com/ [Online]Date accessed: July 12, 2020. [4]S. Van Rossem et al., "Deploying elastic routing capability in an SDN/NFV-enabled environment," 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), San Francisco, CA, 2015, pp. 22-24, doi: 10.1109/NFV-SDN.2015.7387398. [5]Y. Zhao, L. Iannone and M. Riguidel, "On the performance of SDN controllers: A reality check," 2015 IEEE Conference on Network Function Virtualization and Software Defined Network (NFV-SDN), San Francisco, CA, 2015, pp. 79-85, doi: 10.1109/NFV-SDN.2015.7387410. [6]V. Deepa, K. M. Sudar and P. Deepalakshmi, "Detection of DDoS Attack on SDN Control plane using Hybrid Machine Learning Techniques," 2018 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India, 2018, pp. 299-303, doi: 10.1109/ICSSIT.2018.8748836. [7]S. Nanda, F. Zafari, C. DeCusatis, E. Wedaa and B. Yang, "Predicting network attack patterns in SDN using machine learning approach," 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Palo Alto, CA, 2016, pp. 167-172, doi: 10.1109/NFV-SDN.2016.7919493. [8]M. Aslan and A. Matrawy, "On the Impact of Network State Collection on the Performance of SDN Applications," in IEEE Communications Letters, vol. 20, no. 1, pp. 5-8, Jan. 2016, doi: 10.1109/LCOMM.2015.2496955. [9]“Open Virtual Switch,” https://www.openvswitch.org/ [Online]Date accessed: July 12, 2020. [10]“OpenFlow Switch Specification,” https://www.opennetworking.org/wp-content/uploads/2014/10/openflow-switch-v1.5.1.pdf [Online]Date accessed: July 12, 2020. [11]S. Gangadhar and J. P. G. Sterbenz, "Machine learning aided traffic tolerance to improve resilience for software defined networks," 2017 9th International Workshop on Resilient Networks Design and Modeling (RNDM), Alghero, 2017, pp. 1-7, doi: 10.1109/RNDM.2017.8093035. [12]“Introduction to SIEM,” https://www.mindfireit.com/cyber-security/introduction-to-siem/ [Online]Date accessed: July 12, 2020. [13]“AlienVault SIEM User Guide,” https://cybersecurity.att.com/documentation/usm-appliance-user-guide.htm [Online]Date accessed: July 12, 2020. [14]D. Zhang and D. Zhang, "The Analysis of Event Correlation in Security Operations Center," 2011 Fourth International Conference on Intelligent Computation Technology and Automation, Shenzhen, Guangdong, 2011, pp. 1214-1216, doi: 10.1109/ICICTA.2011.584. [15]K. Li, R. Chen, L. Gu, C. Liu and J. Yin, "A Method Based on Statistical Characteristics for Detection Malware Requests in Network Traffic," 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), Guangzhou, 2018, pp. 527-532, doi: 10.1109/DSC.2018.00084. [16]M. Landauer, F. Skopik, M. Wurzenberger, W. Hotwagner and A. Rauber, "A Framework for Cyber Threat Intelligence Extraction from Raw Log Data," 2019 IEEE International Conference on Big Data (Big Data), Los Angeles, CA, USA, 2019, pp. 3200-3209, doi: 10.1109/BigData47090.2019.9006328. [17]S. Dong, D. Zhou and W. Ding, "The Study of Network Traffic Identification Based on Machine Learning Algorithm," 2012 Fourth International Conference on Computational Intelligence and Communication Networks, Mathura, 2012, pp. 205-208, doi: 10.1109/CICN.2012.211. [18]S. Dong and M. Sarem, "DDoS Attack Detection Method Based on Improved KNN With the Degree of DDoS Attack in Software-Defined Networks," in IEEE Access, vol. 8, pp. 5039-5048, 2020, doi: 10.1109/ACCESS.2019.2963077. [19]“NSL-KDD dataset,” https://www.unb.ca/cic/datasets/nsl.html [Online]Date accessed: July 12, 2020. [20]“KDD Cup 1999 Data,” http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html [Online]Date accessed: July 12, 2020. [21]“The CTU-13 Dataset,” https://www.stratosphereips.org/datasets-ctu13 [Online]Date accessed: July 12, 2020. [22]A. Abubakar and B. Pranggono, "Machine learning based intrusion detection system for software defined networks," 2017 Seventh International Conference on Emerging Security Technologies (EST), Canterbury, 2017, pp. 138-143, doi: 10.1109/EST.2017.8090413. [23]T. Limmer and F. Dressler, "Flow-based TCP connection analysis," 2009 IEEE 28th International Performance Computing and Communications Conference, Scottsdale, AZ, 2009, pp. 376-383, doi: 10.1109/PCCC.2009.5403846.
|