Research Article
Duo: Software Defined Intrusion Tolerant System Using Dual Cluster
Table 1
Summary table of related work.
| Related work | Topic | Description |
| SCIT [7, 16] | ITS | Initially proposed recovery-based ITS | ACT [12, 13] | ITS | Recovery-based ITS with adaptive cluster scaling | CloudWatcher [17] | SDN/NFV | Network flow inspection framework using SDN technology | QoSE [18] | SDN/NFV | On-demand security service provisioning in an SDN/NFV environment | Bohatei [19] | SDN/NFV | SDN/NFV-based DDoS defense system | Snort [1] | IDS | Open source network intrusion detection system | Suricata [7] | HIF [20] | NTC | History-based IP filtering for SIP protection |
|
|