Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Software-defined networking-based DDoS defense mechanisms
Swami R., Dave M., Ranga V.  ACM Computing Surveys 52 (2): 1-36, 2019. Type: Article
Date Reviewed: Jul 26 2019

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topology. SDNs are an important advancement of network technology. Because of their centralized control and architecture, they are particularly susceptible to DDoS attacks and other threats. However, precisely because of these same features, they are also very useful in the defense against DDoS attacks.

The article discusses SDN threats in general and DDoS threats specifically. A basic classification divides defenses into defenses against DDoS attacks using SDNs and defenses against DDoS threats to SDNs. This division is used to classify the papers considered in this survey. The main contributions of the article are the tables that describe and compare the defenses proposed and the many references. Section 7, “Research Challenges and Issues,” would have been more insightful if the authors had related it to the solutions proposed to defend against DDoS attacks.

The writing is rather poor and sometimes even misleading. The style is verbose and at times repetitive, while the use of technical terms is often not precise. In summary, this is a useful article for researchers looking for relevant references, but it is not so useful for those wanting a conceptual understanding of the threats and defenses in SDN.

Reviewer:  E. B. Fernandez Review #: CR146633 (1910-0371)
Bookmark and Share
  Editor Recommended
Featured Reviewer
Security and Protection (D.4.6 )
Would you recommend this review?
Other reviews under "Security and Protection": Date
Empirically-based secure OS design
Weber S., Shostack A., Solworth J., Zurko M.  NSPW 2017 (Proceedings of the 2017 New Security Paradigms Workshop, Santa Cruz, CA,  Oct 1-4, 2017) 90-93, 2017. Type: Proceedings
Jun 13 2019
Imperfect forward secrecy: how Diffie-Hellman fails in practice
Adrian D., Bhargavan K., Durumeric Z., Gaudry P., Green M., Halderman J., Heninger N., Springall D., Thomé E., Valenta L., VanderSloot B., Wustrow E., Zanella-Béguelin S., Zimmermann P.  Communications of the ACM 62(1): 106-114, 2019. Type: Article
Mar 27 2019
Resiliency of mobile OS security for secure personal ubiquitous computing
Lee S., Lee S., Kang T., Kwon M., Lee N., Kim H.  Personal and Ubiquitous Computing 22(1): 23-34, 2018. Type: Article
Jun 25 2018

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy