[1] Y. Wang and I. Matta, “Sdn management layer: Design requirements and future direction,” in Network Protocols (ICNP), IEEE 22nd International Conference on, 2014.##
[2] M. Ghasabi, M. Deypir, and E. Mahdipour, “A New Algorithm Based on Hellinger Distance for Mitigation of DDoS Attacks in Software Defined Networks,” Journal of Electronical & Cyber Defence, vol. 5, pp. 29-41, 2017. (In Persian)##
[3] B. A. A. Nunes, M. Mendonca, X.-N. Nguyen, K. Obraczka, and T. Turletti, “A survey of ##
[4] software-defined networking: Past, present, and future of programmable networks,” IEEE Communications Surveys & Tutorials, vol. 16, pp. 1617-1634, 2014.##
[5] Y. Jarraya, T. Madi, and M. Debbabi, “A survey and a layered taxonomy of software-defined networking,” IEEE Communications Surveys & Tutorials, vol. 16, pp. 1955-1980, 2014.##
[6] H. Li, F. Wei, and H. Hu, “Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN,” In Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2019.##
[7] M. H. Khairi, S. H. Ariffin, N. A. Latiff, A. S. Abdullah, and M. K. Hassan, “A Review of Anomaly Detection Techniques and Distributed Denial of Service (DDoS) on Software Defined Network (SDN),” Engineering, Technology & Applied Science Research, vol. 8, pp. 2724-2730, 2018.##
[8] P. Wang, L. Huang, H. Xu, B. Leng, and H. Guo, “Rule Anomalies Detecting and Resolving for Software Defined Networks,” in IEEE Global Communications Conference (GLOBECOM), 2015.##
[9] P. Zhang, S. Xu, Z. Yang, H., Li, H. Wang, and C. Hu, “FOCES: Detecting Forwarding Anomalies in Software Defined Networks,” In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), 2018.##
[10] P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A security enforcement kernel for OpenFlow networks,” in Proceedings of the first workshop on Hot topics in software defined networks, 2012.##
[11] A. Khurshid, W. Zhou, M. Caesar, and P. Godfrey, “Veriflow: Verifying network-wide invariants in real time,” ACM Sigcomm Computer Communication Review, vol. 42, pp. 467-472, 2012.##
[12] A. AuYoung et al., “Democratic resolution of resource conflicts between sdn control programs,” in Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, 2014.##
[13] E. Al-Shaer and S. Al-Haj, “FlowChecker: Configuration analysis and verification of federated OpenFlow infrastructures,” in Proceedings of the 3rd ACM workshop on Assurable and usable security configuration, 2010.##
[14] A. D. Ferguson, A. Guha, C. Liang, R. Fonseca, and S. Krishnamurthi, “Hierarchical policies for software defined networks,” in Proceedings of the first workshop on Hot topics in software defined networks, 2012.##
[15] G. Zhang, S. Cheng, X. Song, and F. Jiang, “Detecting and Resolving Flow Entries Collisions in Software Defined Networks,” In Proceedings of the 2019 3rd International Conference on Computer Science and Artificial Intelligence, 2019.##
[16] E. Al-Shaer, H. Hamed, R. Boutaba, and M. Hasan, “Conflict classification and analysis of distributed firewall policies,” IEEE journal on selected areas in communications, vol. 23, pp. 2069-2084, 2005.##
[17] Q.&nbs