1 |
ANTONATOS S, AKRITIDIS P, MARKATOS E P, et al. Defending against hitlist worms using network address space randomization. Computer Networks, 2007, 51 (12): 3471- 3490.
doi: 10.1016/j.comnet.2007.02.006
|
2 |
KANG M S, LEE S B, GLIGOR V D. The crossfire attack[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2013: 127-141.
|
3 |
LIU Y Q, ZHAO J L, ZHANG G M, et al. NetObfu: a lightweight and efficient network topology obfuscation defense scheme. Computers & Security, 2021, 110, 102447.
|
4 |
HOU T, QU Z, WANG T, et al. ProTO: proactive topology obfuscation against adversarial network topology inference[C]//Proceedings of IEEE Conference on Computer Communications. Washington D. C., USA: IEEE Press, 2020: 1598-1607.
|
5 |
LIU Y Q, XING C Y, ZHANG G M, et al. AntiTomo: network topology obfuscation against adversarial tomography-based topology inference. Computers & Security, 2022, 113, 102570.
|
6 |
LI H K, GAO Y, DONG W, et al. Bound-based network tomography for inferring interesting link metrics[C]//Proceedings of IEEE Conference on Computer Communications. Washington D. C., USA: IEEE Press, 2020: 1588-1597.
|
7 |
林洪秀, 邢长友, 刘亚群, 等. AntiMNT: 一种对抗多源网络层析成像的拓扑混淆机制. 计算机应用研究, 2023, 40 (1): 257- 262.
URL
|
|
LIN H X, XING C Y, LIU Y Q, et al. AntiMNT: a topological confusion mechanism against multi-source network tomography. Application Research of Computers, 2023, 40 (1): 257- 262.
URL
|
8 |
FEAMSTER N, REXFORD J, ZEGURA E. The road to SDN. ACM SIGCOMM Computer Communication Review, 2014, 44 (2): 87- 98.
doi: 10.1145/2602204.2602219
|
9 |
COATES M, CASTRO R, NOWAK R, et al. Maximum likelihood network topology identification from edge-based unicast measurements. ACM SIGMETRICS Performance Evaluation Review, 2002, 30 (1): 11- 20.
doi: 10.1145/511399.511337
|
10 |
SHIH M F, HERO A O. Hierarchical inference of unicast network topologies based on end-to-end measurements. IEEE Transactions on Signal Processing, 2007, 55 (5): 1708- 1718.
doi: 10.1109/TSP.2006.890830
|
11 |
NI J, XIE H Y, TATIKONDA S, et al. Efficient and dynamic routing topology inference from end-to-end measurements. IEEE/ACM Transactions on Networking, 2010, 18 (1): 123- 135.
doi: 10.1109/TNET.2009.2022538
|
12 |
赵洪华, 陈鸣. 基于网络层析成像技术的拓扑推断. 软件学报, 2010, 21 (1): 133- 146.
URL
|
|
ZHAO H H, CHEN M. Topology inference based on network tomography. Journal of Software, 2010, 21 (1): 133- 146.
URL
|
13 |
SHIH M F, HERO A O. Topology discovery on unicast networks: a hierarchical approach based on end-to-end measurements: TR-357[R]. Ann Arbor, USA: University of Michigan, 2005.
|
14 |
MOORE A, ZUEV D, CROGAN M. Discriminators for use in flow-based classification[D]. London, UK: University of London, 2013.
|
15 |
QAZI Z A, LEE J, JIN T, et al. Application-awareness in SDN[C]//Proceedings of ACM SIGCOMM 2013. New York, USA: ACM Press, 2013: 487-488.
|
16 |
HUANG N F, JAI G Y, CHAO H C, et al. Application traffic classification at the early stage by characterizing application rounds. Information Sciences, 2013, 232, 130- 142.
doi: 10.1016/j.ins.2012.12.039
|
17 |
CHARBUTY B, ABDULAZEEZ A. Classification based on decision tree algorithm for machine learning. Journal of Applied Science and Technology Trends, 2021, 2 (1): 20- 28.
doi: 10.38094/jastt20165
|
18 |
COPPOCK H W, FREUND J E. All-or-none versus incremental learning of errorless shock escapes by the rat. Science, 1962, 135 (3500): 318- 319.
doi: 10.1126/science.135.3500.318
|
19 |
刘强, 张颖, 周卫祥, 等. 自适应类增量学习的物联网入侵检测系统. 计算机工程, 2023, 49 (2): 169- 174.
URL
|
|
LIU Q, ZHANG Y, ZHOU W X, et al. Adaptive incremental learning intrusion detection system for Internet of Things. Computer Engineering, 2023, 49 (2): 169- 174.
URL
|
20 |
|
21 |
|
22 |
KNIGHT S, NGUYEN H X, FALKNER N, et al. The Internet topology zoo. IEEE Journal on Selected Areas in Communications, 2011, 29 (9): 1765- 1775.
doi: 10.1109/JSAC.2011.111002
|
23 |
|
24 |
BRINGMANN K, GAWRYCHOWSKI P, MOZES S, et al. Tree edit distance cannot be computed in strongly subcubic time (unless APSP can). ACM Transactions on Algorithms, 2017, 16 (4): 1- 10.
|