Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Software-defined networking-based DDoS defense mechanisms
Swami R., Dave M., Ranga V. ACM Computing Surveys52 (2):1-36,2019.Type:Article
Date Reviewed: Jul 26 2019

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topology. SDNs are an important advancement of network technology. Because of their centralized control and architecture, they are particularly susceptible to DDoS attacks and other threats. However, precisely because of these same features, they are also very useful in the defense against DDoS attacks.

The article discusses SDN threats in general and DDoS threats specifically. A basic classification divides defenses into defenses against DDoS attacks using SDNs and defenses against DDoS threats to SDNs. This division is used to classify the papers considered in this survey. The main contributions of the article are the tables that describe and compare the defenses proposed and the many references. Section 7, “Research Challenges and Issues,” would have been more insightful if the authors had related it to the solutions proposed to defend against DDoS attacks.

The writing is rather poor and sometimes even misleading. The style is verbose and at times repetitive, while the use of technical terms is often not precise. In summary, this is a useful article for researchers looking for relevant references, but it is not so useful for those wanting a conceptual understanding of the threats and defenses in SDN.

Reviewer:  E. B. Fernandez Review #: CR146633 (1910-0371)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Practical UNIX security
Garfinkel S., Spafford G., O’Reilly & Associates, Inc., Sebastopol, CA, 1991. Type: Book (9780937175729)
Jun 1 1992
Trusted products evaluation
Chokhani S. Communications of the ACM 35(7): 64-76, 1992. Type: Article
Oct 1 1993
An experience using two covert channel analysis techniques on a real system design
Haigh J., Kemmerer R., McHugh J., Young W. IEEE Transactions on Software Engineering SE-13(2): 157-168, 1987. Type: Article
Nov 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy