Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Software-defined networking-based DDoS defense mechanisms
Swami R., Dave M., Ranga V.  ACM Computing Surveys 52 (2): 1-36, 2019. Type: Article
Date Reviewed: Jul 26 2019

This article surveys distributed denial-of-service (DDoS) attacks on software-defined networks (SDNs). SDNs separate the control plane from the data plane in computer networks, thus allowing more flexible management of traffic and topology. SDNs are an important advancement of network technology. Because of their centralized control and architecture, they are particularly susceptible to DDoS attacks and other threats. However, precisely because of these same features, they are also very useful in the defense against DDoS attacks.

The article discusses SDN threats in general and DDoS threats specifically. A basic classification divides defenses into defenses against DDoS attacks using SDNs and defenses against DDoS threats to SDNs. This division is used to classify the papers considered in this survey. The main contributions of the article are the tables that describe and compare the defenses proposed and the many references. Section 7, “Research Challenges and Issues,” would have been more insightful if the authors had related it to the solutions proposed to defend against DDoS attacks.

The writing is rather poor and sometimes even misleading. The style is verbose and at times repetitive, while the use of technical terms is often not precise. In summary, this is a useful article for researchers looking for relevant references, but it is not so useful for those wanting a conceptual understanding of the threats and defenses in SDN.

Reviewer:  E. B. Fernandez Review #: CR146633 (1910-0371)
Bookmark and Share
  Editor Recommended
Featured Reviewer
 
 
Security and Protection (D.4.6 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Advanced computing and systems for security: volume nine
Chaki R., Cortesi A., Saeed K., Chaki N.,  Springer International Publishing, New York, NY, 2020. 124 pp. Type: Book
Nov 19 2019
Empirically-based secure OS design
Weber S., Shostack A., Solworth J., Zurko M.  NSPW 2017 (Proceedings of the 2017 New Security Paradigms Workshop, Santa Cruz, CA,  Oct 1-4, 2017) 90-93, 2017. Type: Proceedings
Jun 13 2019
Imperfect forward secrecy: how Diffie-Hellman fails in practice
Adrian D., Bhargavan K., Durumeric Z., Gaudry P., Green M., Halderman J., Heninger N., Springall D., Thomé E., Valenta L., VanderSloot B., Wustrow E., Zanella-Béguelin S., Zimmermann P.  Communications of the ACM 62(1): 106-114, 2019. Type: Article
Mar 27 2019
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2019 ThinkLoud, Inc.
Terms of Use
| Privacy Policy