Research Article

Duo: Software Defined Intrusion Tolerant System Using Dual Cluster

Table 1

Summary table of related work.

Related work TopicDescription

SCIT [7, 16]ITSInitially proposed recovery-based ITS
ACT [12, 13]ITSRecovery-based ITS with adaptive cluster scaling
CloudWatcher [17]SDN/NFVNetwork flow inspection framework using SDN technology
QoSE [18]SDN/NFVOn-demand security service provisioning in an SDN/NFV environment
Bohatei [19]SDN/NFVSDN/NFV-based DDoS defense system
Snort [1]IDSOpen source network intrusion detection system
Suricata [7]
HIF [20]NTCHistory-based IP filtering for SIP protection