• Electronics Optics & Control
  • Vol. 23, Issue 3, 49 (2016)
SUN Peng
Author Affiliations
  • [in Chinese]
  • show less
    DOI: 10.3969/j.issn.1671-637x.2016.03.012 Cite this Article
    SUN Peng. Source Address Validation Methods Based on SDN[J]. Electronics Optics & Control, 2016, 23(3): 49 Copy Citation Text show less
    References

    [1] MICKEOWN N, ANDERSON T, BALAKRISHNAN H, et al. OpenFlow:enabling innovation in campus networks[J].ACM Sigcomm Computer Communication Review, 2008, 38(2):69-74.

    [3] BREMLER B A, LEVY H.Spoofing prevention method [C]//The 24th Annual Joint Conference of the Computer and Communications Societies, Proceedings, IEEE, 2005:536-547.

    [4] FERGUSON P, SENIE D.ITEF RFC 2827 network ingress filtering:defeating denial of service attacks which employ IP source address spoofing[S].Washington:ISOC, 2000.

    [5] BOLTON C, LOWE G.Analyses of the reverse path forwarding routing algorithm[C]//The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Florence, 2004:485-491.

    [6] PARK K H, LEE H J.On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets[C]//Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New York:ACM, 2001:15-26.

    [7] CHENG J, WANG H N, KANG G S.Hop-count filtering:an effective denfense against spoofed DDoS traffic[C]//Proceedings of the 10th ACM Conference on Computer and Communications Security, New York:ACM, 2003:30-41.

    [8] WU J P, BI J, LI X.IRTF RFC5210 a Source Address Validation Architecture (SAVA) test bed and deployment experience[S].Washington:ISOC, 2008.

    [9] SAVAGE S, WETHERALL D, KARLIN A, et al.Network support for IP traceback[J].IEEE/ACM Transactions on Networking, 2001, 9(3):226-237.

    [10] ABRAHAM Y, PERRIG A, SONG D.Pi:a path identification mechanism to defend against DDoS attacks[C]//Symposium on Security and Privacy, Proceedings, IEEE, 2003:93-107.

    [11] WU J P, REN G.Building a next generation Internet with source address validation architecture[J].Science in China, 2008, 38(10):1583-1593.

    [12] CHUNG S, LIAO L, WAN J.Software defined networks [J].Communications Magazine, IEEE, 2013, 51(2):113-117.

    [13] WEN F X, YONG G W, CHUAN H F, et al.A survey on software defined networking[J].IEEE Communications Surveys & Tutorials, 2014, 17(1):27-51.