Question1: In Software-Defined Networking (SDN), what are the hot research areas in anomaly-based DDoS detection?

Question2: What are the new or prominent DDoS attack types worthy of study, such as low-rate DDoS attacks and flow table overflow attacks?

Question3: Is the flow table overflow attack proposed much later?

More Xiangfeng Guo's questions See All
Similar questions and discussions