This work is licensed under the Creative Commons Attribution 4.0 International License.
Benzekki K, Fergougui A, Elbelrhiti A. Software-defined networking (SDN): A survey[J]. Security & Communication Networks, 2016, 9(18): 5803–5833.BenzekkiKFergouguiAElbelrhitiASoftware-defined networking (SDN): A survey[J].20169185803583310.1002/sec.1737Search in Google Scholar
Zhu D, Zhang D, He B, et al. Design and implementation of an experimental teaching scheme for the development of SDN northbound applications[C]. In: Proc. of the 14th International Conference on Computer Science & Education (ICCSE), IEEE Computer Society, Washington, DC, USA, 2019, 731–736.ZhuDZhangDHeB[C]. In:Proc. of the 14th International Conference on Computer Science & Education (ICCSE), IEEE Computer SocietyWashington, DC, USA201973173610.1109/ICCSE.2019.8845443Search in Google Scholar
Li J, Li D, Yu Y, et al. Towards full virtualization of SDN infrastructure[J]. Computer Networks, 2018, 143(OCT.9): 1–14.LiJLiDYuYTowards full virtualization of SDN infrastructure[J]2018143OCT.911410.1016/j.comnet.2018.06.014Search in Google Scholar
Das T, Sridharan V, Gurusamy M. A Survey on controller placement in SDN[J]. IEEE Communications Surveys and Tutorials, 2020, 22(1): 472–503.DasTSridharanVGurusamyMA Survey on controller placement in SDN[J].202022147250310.1109/COMST.2019.2935453Search in Google Scholar
He M, Varasteh A, Kellerer W. Towards a flexible design of SDN dynamic control plane: an online optimization approach[J]. IEEE Transactions on Network and Service Management, 2019, (99):1–1.HeMVarastehAKellererWTowards a flexible design of SDN dynamic control plane: an online optimization approach[J].2019991110.1109/TNSM.2019.2935160Search in Google Scholar
Chica C, Imbachi C, Botero F. Security in SDN: a comprehensive survey[J]. Journal of Network and Computer Applications, 2020, 159:102595.ChicaCImbachiCBoteroFSecurity in SDN: a comprehensive survey[J].202015910259510.1016/j.jnca.2020.102595Search in Google Scholar
Matias J, Garay J, Toledo N, et al. Toward an SDN-enabled NFV architecture[J]. IEEE Communications Magazine, 2015, 53(4): 187–193.MatiasJGarayJToledoNToward an SDN-enabled NFV architecture[J].201553418719310.1109/MCOM.2015.7081093Search in Google Scholar
Caicedo V, Prieto Y, Pezoa E, et al. A novel framework for SDN teaching and research: a Chilean University case study[J]. IEEE Communications Magazine, 2019, 57(11): 67–73.CaicedoVPrietoYPezoaEA novel framework for SDN teaching and research: a Chilean University case study[J].20195711677310.1109/MCOM.001.1900261Search in Google Scholar
Hwang J, Ramakrishnan K, Wood T. NetVM: high performance and flexible networking using virtualization on commodity platforms[J]. IEEE Transactions on Network and Service Management, 2015, 12(1): 34–47.HwangJRamakrishnanKWoodTNetVM: high performance and flexible networking using virtualization on commodity platforms[J].2015121344710.1109/TNSM.2015.2401568Search in Google Scholar
Cosgrove S. Teaching software defined networking: It's not just coding[C]. In: Proc. of 2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE). IEEE Computer Society, Washington, DC, USA, 2017, 139–144.CosgroveS[C]. In:Proc. of 2016 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE)IEEE Computer Society, Washington, DC, USA2017139144Search in Google Scholar
Bima E, Inalegwu C, Folorunso A, et al. Software defined network (SDN) based virtual laboratory: an implementation[C]. In: Proc. of International Conference on Information Communication Technology and Its Applications (ICTA). IEEE Computer Society, Washington, DC, USA, 2016, 232–235.BimaEInalegwuCFolorunsoA[C]. In:Proc. of International Conference on Information Communication Technology and Its Applications (ICTA)IEEE Computer Society, Washington, DC, USA2016232235Search in Google Scholar
Alcorn J, Melton S, Chow E. SDN on-the-go (OTG) physical testbed[C]. In: Proc. of 2017 IEEE Conference on Dependable and Secure Computing. IEEE Computer Society, Washington, DC, USA, 2017, 202–208.AlcornJMeltonSChowE[C]. In:Proc. of 2017 IEEE Conference on Dependable and Secure ComputingIEEE Computer Society, Washington, DC, USA201720220810.1109/DESEC.2017.8073808Search in Google Scholar
Tadros N, Rizk M, Mokhtar B. Software defined network-based management for enhanced 5G network services[J]. IEEE Access, 2020(8): 53997–54008.TadrosNRizkMMokhtarBSoftware defined network-based management for enhanced 5G network services[J].20208539975400810.1109/ACCESS.2020.2980392Search in Google Scholar
Jawaharan R, Mohan M, Das T, et al. Empirical evaluation of SDN controllers using Mininet/Wireshark and comparison with Cbench[C]. In: Proc. of IEEE 27th International Conference on Computer Communication and Networks (ICCCN). IEEE Computer Society, Washington, DC, USA, 2018: 1–2.JawaharanRMohanMDasT[C]. In:Proc. of IEEE 27th International Conference on Computer Communication and Networks (ICCCN)IEEE Computer Society, Washington, DC, USA20181210.1109/ICCCN.2018.8487382Search in Google Scholar
Bholebawa I, Dalal U. Performance analysis of SDN/OpenFlow controllers: POX Versus Floodlight[J]. Wireless Personal Communications, 2018, 98(2): 1679–1699.BholebawaIDalalUPerformance analysis of SDN/OpenFlow controllers: POX Versus Floodlight[J].20189821679169910.1007/s11277-017-4939-zSearch in Google Scholar
Jantila S, Chaipah K. A security analysis of a hybrid mechanism to defend DDoS attacks in SDN[J]. Procedia Computer Science, 2016, 86: 437–440.JantilaSChaipahKA security analysis of a hybrid mechanism to defend DDoS attacks in SDN[J].20168643744010.1016/j.procs.2016.05.072Search in Google Scholar
Haddadi M, Beghdad R. A confidence interval based filtering against DDoS attack in cloud environment: a confidence interval against DDoS attack in the cloud[J]. International Journal of Information Security and Privacy (IJISP), 2020, 14(4): 42–56.HaddadiMBeghdadRA confidence interval based filtering against DDoS attack in cloud environment: a confidence interval against DDoS attack in the cloud[J].2020144425610.4018/IJISP.2020100103Search in Google Scholar
Dou W, Chen Q, Chen J. A confidence-based filtering method for DDoS attack defense in cloud environment[J]. Future Generation Computer Systems, 2013, 29(7): 1838–1850.DouWChenQChenJA confidence-based filtering method for DDoS attack defense in cloud environment[J].20132971838185010.1016/j.future.2012.12.011Search in Google Scholar
Bhakthavatsalam K, Shanmugam T, Malarkodi B. Prevention of a SYNflood attack using ExtremeXOS modular operating system[J]. International Journal of Internet Technology and Secured Transactions, 2017, 7(4):364.BhakthavatsalamKShanmugamTMalarkodiBPrevention of a SYNflood attack using ExtremeXOS modular operating system[J].20177436410.1504/IJITST.2017.091527Search in Google Scholar