Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Software-defined networking-based DDoS defense mechanisms
Swami R., Dave M., Ranga V.  ACM Computing Surveys 52 (2): 1-36, 2019. Type: Article
Date Reviewed: Jul 26 2019

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topology. SDNs are an important advancement of network technology. Because of their centralized control and architecture, they are particularly susceptible to DDoS attacks and other threats. However, precisely because of these same features, they are also very useful in the defense against DDoS attacks.

The article discusses SDN threats in general and DDoS threats specifically. A basic classification divides defenses into defenses against DDoS attacks using SDNs and defenses against DDoS threats to SDNs. This division is used to classify the papers considered in this survey. The main contributions of the article are the tables that describe and compare the defenses proposed and the many references. Section 7, “Research Challenges and Issues,” would have been more insightful if the authors had related it to the solutions proposed to defend against DDoS attacks.

The writing is rather poor and sometimes even misleading. The style is verbose and at times repetitive, while the use of technical terms is often not precise. In summary, this is a useful article for researchers looking for relevant references, but it is not so useful for those wanting a conceptual understanding of the threats and defenses in SDN.

Reviewer:  E. B. Fernandez Review #: CR146633 (1910-0371)
Bookmark and Share
  Editor Recommended
Featured Reviewer
Security and Protection (D.4.6 )
Would you recommend this review?
Other reviews under "Security and Protection": Date
Security and privacy on blockchain
Zhang R., Xue R., Liu L.  ACM Computing Surveys 52(3): 1-34, 2019. Type: Article
May 27 2020
Dynamic malware analysis in the modern era--a state of the art survey
Or-Meir O., Nissim N., Elovici Y., Rokach L.  ACM Computing Surveys 52(5): 1-48, 2019. Type: Article
May 14 2020
 Beginning security with Microsoft technologies: protecting Office 365, devices, and data
Lakshmi V.,  Apress, New York, NY, 2019. 252 pp. Type: Book (978-1-484248-52-2)
Apr 24 2020

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2020 ThinkLoud, Inc.
Terms of Use
| Privacy Policy