References
1.Sadiku, I. B., Ajayi, W., Sakpere, W., John-Dewole, T., & Badru, R. A. (2022). Effect of traditional and software-defined networking on performance of computer network. Scientific Journal of Informatics, 9(2), 111–122. https://doi.org/10.15294/sji.v9i2.31315
2.Haji, S. H., Zeebaree, S. R., Saeed, R. H., Ameen, S. Y., Shukur, H. M., Omar, N., & Yasin, H. M. (2021). Comparison of software defined networking with traditional networking. Asian Journal of Research in Computer Science, 9(2), 1–18. https://doi.org/10.9734/ajrcos/2021/v9i230216
3.Awais, M., Asif, M., Ahmad, M. B., Mahmood, T., & Munir, S. (2021, July). Comparative analysis of traditional and software defined networks. In 2021 Mohammad Ali Jinnah University International Conference on Computing (MAJICC) (pp. 1–6). IEEE. https://doi.org/10.1109/MAJICC53071.2021.9526236
4.Zoraida, B. S. E., & Indumathi, G. (2024). A comparative study on software-defined network with traditional networks. TEM Journal, 13(1), 167. https://doi.org/10.18421/TEM131-17
5.Nunes, B. A. A., Mendonca, M., Nguyen, X. N., Obraczka, K., & Turletti, T. (2014). A survey of software-defined networking: Past, present, and future of programmable networks. IEEE Communications surveys & tutorials, 16(3), 1617–1634. https://doi.org/10.1109/SURV.2014.012214.00180
6.Tsai, P. W., Tsai, C. W., Hsu, C. W., & Yang, C. S. (2018). Network monitoring in software-defined networking: A review. IEEE Systems Journal, 12(4), 3958–3969. https://doi.org/10.1109/JSYST.2018.2798060
7.Xie, J., Guo, D., Hu, Z., Qu, T., & Lv, P., Control plane of software defined networks:A survey, Computer communications 67 (2015) 1–10. https://doi.org/10.1016/j.comcom.2015.06.004
8.Yu, Y., Li, X., Leng, X., Song, L., Bu, K., Chen, Y., … Xiao, X. (2018). Fault management in software-defined networking: A survey. IEEE Communications Surveys & Tutorials,21(1), 349–392. https://doi.org/10.1109/COMST.2018.2868922.
9.Ndiaye, M., Hancke, G. P., & Abu-Mahfouz, A. M. (2017). Software defined networking for improved wireless sensor network management: A survey. Sensors (Basel, Switzerland), 17(5), 1031. https://doi.org/10.3390/s17051031
10.Rasool, Z. I., Ali, A., R. S., & Abdulzahra, M. M. (2021, February). Network management in software-defined network: A survey. In IOP Conference Series: Materials Science and Engineering (Vol. 1094, No. 1, p. 012055). IOP Publishing. https://doi.org/10.1088/1757-899X/1094/1/012055
11.AbdelBaky, M., Diaz-Montes, J., & Parashar, M. (2018). Software-defined environments for science and engineering. The International Journal of High Performance Computing Applications, 32(1), 104–122. https://doi.org/10.1177/1094342017710706
12.Banitalebi Dehkordi, A., Soltanaghaei, M., & Boroujeni, F. Z. (2021). The DDoS attacks detection through machine learning and statistical methods in SDN. Journal of Supercomputing, 77(3). https://doi.org/10.1007/s11227-020-03323-w
13.Jain, A. K., Shukla, H., & Goel, D. (2024). A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks. Cluster Computing, 27(9), 13129–13164. https://doi.org/10.1007/s10586-024-04596-z
14.Balarezo, J. F., Wang, S., Chavez, K. G., Al-Hourani, A., & Kandeepan, S. (2022). A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks. Engineering Science and Technology an International Journal, 31, 101065. https://doi.org/10.1016/j.jestch.2021.09.011
15.Setitra, M. A., Fan, M., Benkhaddra, I., & Bensalem, Z. E. A. (2024). DoS/DDoS attacks in Software Defined Networks: Current situation, challenges and future directions. Computer Communications, 222, 77–96. https://doi.org/10.1016/j.comcom.2024.04.035
16.Rashidi, C., Aljunid, S., Ghani, F., Anuar, M., & Fadhil, H. A. (2012). Code length optimization using flexible cross correlation (fcc) code in ocdma networks, in: IEEE 3rd international conference on photonics, IEEE, 2012, pp. 355–359. https://doi.org/10.1109/ICP.2012.6379828
17.Keraf, N. D., Aljunid, S., Rashidi, C., & Ehkan, P. (2016). Performance of 2-d hybrid fccmdw code on ocdma system with the presence of phase induced intensity noise. ARPN J Eng Appl Sci, 11(22), 13203–13208.
18.Rakissaga, W. A. O., Kouraogo, P. J., & Ouedraogo, T. F. (2025, May). Preventing DDoS Attacks in SDN Networks: A Model of Defense Against Packet-in Flooding. In 2025 IEEE World AI IoT Congress (AIIoT) (pp. 1025–1030). IEEE. https://doi.org/10.1109/AIIoT65859.2025.11105220
19.Phu, A. T., Li, B., Ullah, F., Huque, T. U., Naha, R., Babar, M. A., & Nguyen, H. (2023). Defending SDN against packet injection attacks using deep learning. Computer Networks, 234, 109935. https://doi.org/10.1016/j.comnet.2023.109935
20.Shah, S. Q. A., Khan, F. Z., & Ahmad, M. (2022). Mitigating TCP SYN flooding based EDOS attack in cloud computing environment using binomial distribution in SDN. Computer Communications, 182, 198–211. https://doi.org/10.1016/j.comcom.2021.11.008
21.Kartadie, R., Kusjani, A., Warsito, R., Kusnanto, Y., & Harnaningrum, L. N. (2025). Implementation of ICMP flood detection and mitigation system based on software-defined network and sFlow-RT. TELKOMNIKA (Telecommunication Computing Electronics and Control), 23(3), 816–824. http://doi.org/10.12928/telkomnika.v23i3.26304
22.Zhang, C., Hu, G., Chen, G., Sangaiah, A. K., Zhang, P. A., Yan, X., & Jiang, W. (2017). Towards a SDN-based integrated architecture for mitigating IP spoofing attack. Ieee Access : Practical Innovations, Open Solutions, 6, 22764–22777. https://doi.org/10.1109/ACCESS.2017.2785236
23.Girdler, T., & Vassilakis, V. G. (2021). Implementing an intrusion detection and prevention system using Software-Defined Networking: Defending against ARP spoofing attacks and Blacklisted MAC Addresses. Computers & Electrical Engineering, 90, 106990. https://doi.org/10.1016/j.compeleceng.2021.106990
24.Ahalawat, A., Babu, K. S., Turuk, A. K., & Patel, S. (2022). A low-rate DDoS detection and mitigation for SDN using Renyi Entropy with Packet Drop. Journal of Information Security and Applications, 68, 103212. https://doi.org/10.1016/j.jisa.2022.103212
25.Jaraba, F., Mahajan, G., Jani, J., Ipu, R., & Butakov, S. (2024). Exploring current solutions against DDoS attacks in SDN environment. Procedia Computer Science, 238, 127–134. https://doi.org/10.1016/j.procs.2024.06.007
26.Anusuya, R., Prabhu, M. R., Prathima, C., & Kumar, J. A. (2023). Detection of TCP, UDP and ICMP DDOS attacks in SDN Using Machine Learning approach. Journal of Survey in Fisheries Sciences, 10(4S), 964–971.
27.Charleys, B. K., & Amuthaguka, D. (2024, March). Architecture and Attacks in Software Defined Networking, and its Security Using Machine Learning. In 2024 3rd International Conference on Sentiment Analysis and Deep Learning (ICSADL) (pp. 111–116). IEEE. https://doi.org/10.1109/ICSADL61749.2024.00024
28.Kalkan, K., Altay, L., Gür, G., & Alagöz, F. (2018). JESS: Joint entropy-based DDoS defense scheme in SDN. IEEE Journal on Selected Areas in Communications, 36(10), 2358–2372. https://doi.org/10.1109/JSAC.2018.2869997
29.Su, J., & Jiang, M. (2023). A hybrid entropy and blockchain approach for network security defense in SDN-based IIoT. Chinese Journal of Electronics, 32(3), 531–541. https://doi.org/10.23919/cje.2022.00.103
30.Kareem, M. I., & Jasim, M. N. (2022). Entropy-based distributed denial of service attack detection in software-defined networking. Indonesian Journal of Electrical Engineering and Computer Science, 27(3), 1542–1549. http://doi.org/10.11591/ijeecs.v27.i3.pp1542-1549
31.Mishra, A., Gupta, N., & Gupta, B. B. (2021). Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller. Telecommunication systems, 77(1), 47–62. https://doi.org/10.1007/s11235-020-00747-w