P. Zhang, H. Wang, C. Hu, and C. Lin, “On denial of service attacks
in software defined networks,” IEEE Network, vol. 30, no. 6, pp. 28-33,
 S. M. Mousavi and M. St-Hilaire, “Early detection of DDoS
attacks against SDN controllers,” in Computing, Networking and
Communications (ICNC), 2015 International Conference on. IEEE, 2015,
 R. Kokila, S. T. Selvi, and K. Govindarajan, “DDos detection and analysis
in SDN-based environment using support vector machine classifier,” in
Advanced Computing (ICoAC), 2014 Sixth International Conference on.
IEEE, 2014, pp. 205-210.
 K. Kumar, R. Joshi, and K. Singh, “A distributed approach using
entropy to detect DDoS attacks in ISP domain,” in Signal Processing,
Communications and Networking, 2007. ICSCN’07. International
Conference on. IEEE, 2007, pp. 331-337.
 X. Ma and Y. Chen, “DDoS detection method based on chaos analysis
of network traffic entropy,” IEEE Communications Letters, vol. 18, no.
1, pp. 114-117, 2014.
 Y. Xiang, K. Li, and W. Zhou, “Low-rate DDoS attacks detection and
traceback by using new information metrics,” IEEE Transactions on
Information Forensics and Security, vol. 6, no. 2, pp. 426-437, 2011.
 Q. Yan, F. R. Yu, Q. Gong, and J. Li, “Software-defined networking
(SDN) and distributed denial of service (DDoS) attacks in cloud
computing environments: A survey, some research issues, and
challenges,” IEEE Communications Surveys & Tutorials, vol. 18, no. 1,
pp. 602-622, 2016.
 L. Barki, A. Shidling, N. Meti, D. Narayan, and M. M. Mulla,“Detection
of distributed denial of service attacks in software defined networks,”
in Advances in Computing, Communications and Informatics (ICACCI),
2016 International Conference on. IEEE, 2016, pp. 2576-2581.
 N.-N. Dao, J. Park, M. Park, and S. Cho, “A feasible method to combat
against DDoS attack in SDN network,” in Information Networking
(ICOIN), 2015 International Conference on. IEEE, 2015, pp. 309-311.
 X. Huang, X. Du, and B. Song, “An effective DDoS defense scheme for
SDN,” in Communications (ICC), 2017 IEEE International Conference
on. IEEE, 2017, pp. 1-6.
 Y. Rubner, C. Tomasi, and L. J. Guibas, “The earth mover’s distance
as a metric for image retrieval,” International journal of computer vision,
vol. 40, no. 2, pp. 99-121, 2000.
 D. Zhang and G. Lu, “Evaluation of similarity measurement for image
retrieval,” in Neural Networks and Signal Processing, 2003. Proceedings
of the 2003 International Conference on, vol. 2. IEEE, 2003, pp. 928-931.
 K. Benton, L. J. Camp, and C. Small, “OpenFlow vulnerability
assessment,” in Proceedings of the second ACM SIGCOMM workshop
on Hot topics in software defined networking. ACM, 2013, pp. 151-152.
 M. Team, “Mininet,” 2014.
 S. Floodlight, “OpenFlow controller,” Web:
 P. Biondi, “Scapy, a powerful interactive packet manipulation program,”
 Y Zhou, W Ni, K Zheng, R. P. Liu, and Y. Yang, “Scalable Node-Centric
Route Mutation for Defense of Large-Scale Software-Defined Networks,”
Security and Communication Networks, 2017.
 Y Zhou, K Zheng, W Ni, and R. P. Liu. “Elastic Switch Migration
for Control Plane Load Balancing in SDN,” IEEE Access, 2018, DOI