[1] |
MCKEOWN N,ANDERSON T,BALAKRISHNAN H,et al.OpenFlow:enabling Innovation in campus networks[J].ACM SIGCOMM Computer Communications Review,2008,38(2):69-74.
|
[2] |
GAO Xing,GU Zhongshu,KAYAALPP M,et al.ContainerLeaks:emerging security threats of information leakages in container clouds[C]//Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2017:215-136.
|
[3] |
KOPONEN T,CASADO M,GUDE N,et al.Onix:a distributed control platform for large-scale production networks[C]//Proceedings of the 7th USENIX Symposium on Networked Systems and Design and Implementation.Washington D.C.,USA:IEEE Press,2010:251-264.
|
[4] |
JAIN S,KUMAR S,MANDAL S,et al.B4:experience with a globally-deployed software defined wan[J].ACM SIGCOMM Computer Communication Review,2013,43(3):3-14.
|
[5] |
PFAFF B,PETTIT J,KOPONENT,et al.The design and implementation of open vSwitch[C]//Proceedings of the 12th USENIX Symposium on Networked Systems and Design and Implementation.New York,USA:ACM Press,2015:117-130.
|
[6] |
WANG Haopei,XU Lei,GU Guofei,et al.FloodGuard:a DoS attack prevention extension in software-defined networks[C]//Proceedings of IEEE/IFIP International Conference on Dependable Systems and Networks.Washington D.C.,USA:IEEE Press,2015:239-250.
|
[7] |
HONG Sunming,XU Lei,WANG Haopei,et al.Poisoning network visibility in software-defined networks:new attacks and countermeasures[C]//Proceedings of Internet Society Network and Distributed System Security Symposium.San Diego,USA:[s.n.],2015:123-132.
|
[8] |
JERO S,KOCH W,SKOWYRA R,et al.Identifier binding attacks and defenses in software-defined networks[C]//Proceedings of the 26th USENIX Security Symposium.New York,USA:ACM Press,2017:485-496.
|
[9] |
SHIN S,YEGNESWARAN V,PORRAS P,et al.Avant-guard:scalable and vigilant switch flow management in software-defined networks[C]//Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security.New York,USA:ACM Press,2013:413-424.
|
[10] |
GANG Shang,PENG Zhe,XIAO Bin,et al.Flooddefender:protecting data and control plane resources under SDN-aimed dos attacks[C]//Proceedings of INFOCOM IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2017:1-9.
|
[11] |
WANG An,GUO Yang,HAO Fang,et al.Scotch:elastically scaling up SDN control-plane using vswitch based overlay[C]//Proceedings of the 10th ACM International Conference on Emerging Networking Experiments and Technologies.New York,USA:ACM Press,2014:403-414.
|
[12] |
LENG Junyuan,ZHOU Yadong,ZHANG Junjie,et al.An inference attack model for flow table capacity and usage:exploiting the vulnerability of flow table overflow in software-defined network[J].Water Air and Soil Pollution,2015,85(3):1413-1418.
|
[13] |
QIAN Ying,YOU Wangqing,QIAN Kai.OpenFlow flow table overflow attacks and countermeasures[C]//Proceedings of European Conference on Networks and Communications.Washington D.C.,USA:IEEE Press,2016:205-209.
|
[14] |
SONCHACK J,DUBEY A,AVIV A J,et al.Timing-based reconnaissance and defense in software-defined networks[C]//Proceedings of the 32nd Annual Conference on Computer Security Applications.New York,USA:ACM Press,2016:89-100.
|
[15] |
AKHUNZADA A,AHMED E,GANI A,et al.Securing software defined networks:taxonomy,requirements,and open issues[J].IEEE Communications Magazine,2015,53(4):36-44.
|
[16] |
张梦豪,毕军,白家松,等.针对SDN基础设施的拒绝服务攻击防护框架[J].东南大学学报(自然科学版),2017,47(增刊):1-8.
|
[17] |
王涛,陈鸿昶,程国振.基于网络资源管理技术的SDN DoS攻击动态防御机制[J].计算机研究与发展,2017,54(10):2356-2368.
|