参考文献
[1]张永铮,肖军,云晓春,等.DDoS攻击检测和控制方法[J].软件学报,2012,23(8):2058-2072.
[2]Zander S,Nguyen T,Armitage G.Automated Traffic Classification and Application Identification Using
Machine Learning[C]//Proceedings of CLCN’05.Washington D.C.,USA:IEEE Computer Society Press,2005:250-257.
[3]Liu Yun,Cheng Jieren,Yin Jianping,et al.Anomaly Detection for DDoS Attacks via Behavior Profiles Deviation Degree[C]//Proceedings of the 3rd International Conference on Computer Design and Applications.Washington D.C.,USA:IEEE Press,2011:13278-13282.
[4]Phillip P,Seungwon S,Vinod Y,et al.A Security Enforcement Kernel for OpenFlow Networks[C]//Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks.New York,USA:ACM Press,2012:121-126.
[5]McKeown N,Anderson T,Balakrishnan H.OpenFlow:Enabling Innovation in Campus Networks[J].ACM SIGCOMM Computer Communication Review,2008,38(2):69-74.
[6]左青云,陈鸣,赵广松,等.基于OpenFlow的SDN技术[J].软件学报,2013,24(5):1078-1097.
[7]Charfi Y,Wakamiya N,Murata M.Future Mobile Network Management with Attractor Selection[C]//Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services.Washington D.C.,USA:IEEE Press,2012:27-30.
[8]Dan P.Trust in the Cloud:The Role of SDN[J].Network Security,2013,(3):5-6.
[9]王硕,赵荣彩,单征.基于FSS时间序列分析的DDoS检测算法[J].计算机工程,2012,38(12):13-16.
[10]Braga R,Mota E,Passito A.Lightweight DDoS Flooding Attack Detection Using NOX/OpenFlow[C]//Proceedings of the 35th Conference on Local Computer Networks.Washington D.C.,USA:IEEE Press,2010:408-415.
[11]Mehdi S A,Khalid J,Khayam S A.Revisiting Traffic Anomaly Detection Using Software Defined Networ-king[C]//Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2011:161-180.
[12]Giotis K,Argyropoulos C,Androulidakis G,et al.Combining OpenFlow and sFlow for an Effective and Scalable Anomaly Detection And Mitigation Mechanism on SDN Environments[J].Computer Networks,2014,62(4):122-136.
[13]左青云,陈鸣,王秀磊,等.一种基于SDN的在线流量异常检测方法[J].西安电子科技大学学报,2015,42(1):155-160.
编辑陆燕菲 |