1. P. J. Criscuolo, Distributed Denial of Service, Tribe Flood Network 2000, and Stacheldraht CIAC-2319, Department of Energy Computer Incident Advisory Capability (CIAC), UCRL-ID-136939, Rev. 1.,Lawrence Livermore National Laboratory, February 14, 2000.
2. I. Farris, T. Taleb, Y. Khettab, and J. Song, “A survey on emerging SDN and NFV security mechanisms for IoT systems,” IEEE Commun. Surveys Tuts., vol. 21, no. 1, pp. 812–837, 1st Quart., 2019.
3. M. Du and K. Wang, “An SDN-enabled pseudo-honeypot strategy for distributed denial of service attacks in industrial Internet of Things,” IEEE Trans. Ind. Informat., vol. 16, no. 1, pp. 648–657, Jan. 2020.
4. A taxonomy of DdoS attack and DdoS defence mechanisms;Mirkovic J;ACM SIGCOMM Computer Communication Review,2004
5. Afsaneh, MohammadReza Soltanaghaei, and Farsad Zamani Boroujeni. “The DdoS attacks detection through machine learning and statistical methods in SDN;Banitalebi Dehkordi;The Journal of Supercomputing,2021