[1] WU Jiangxing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese) 邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. [2] LEI Cheng,MA Duohe,ZHANG Hongqi,et al.Network moving target defense technique based on optimal forwarding path migration[J].Journal on Communications,2017,38(3):133-143.(in Chinese) 雷程,马多贺,张红旗,等.基于最优路径跳变的网络移动目标防御技术[J].通信学报,2017,38(3):133-143. [3] BONALD T.The erlang model with non-poisson call arrivals[J].ACM SIGMETRICS Performance Evaluation Review,2006,34(1):276-286. [4] ZHANG Bin,YANG Jiahai,WU Jianping.Survey and analysis on the Internet traffic model[J].Journal of Software,2011,22(1):115-131.(in Chinese) 张宾,杨家海,吴建平.Internet流量模型分析与评述[J].软件学报,2011,22(1):115-131. [5] LELAND W E,TAQQU M S,WILLINGER W,et al.On the self-similar nature of Ethernet traffic[J].ACM SIGCOMM Computer Communication Review,1993,23(4):183-193. [6] LEDESMA S,LIU D R.Synthesis of fractional Gaussian noise using linear approximation for generating self-similar network traffic[J].ACM SIGCOMM Computer Communication Review,2000,30(2):4-17. [7] ZHANG Y,ROUGHAN M,DUFFIELD N,et al.Fast accurate computation of large-scale IP traffic matrices from link loads[J].ACM SIGMETRICS Performance Evaluation Review,2003,31(1):206-217. [8] BOTTA A,DAINOTTI A,PESCAPÉ A.A tool for the generation of realistic network workload for emerging networking scenarios[J].Computer Networks,2012,56(15):3531-3547. [9] WALDMANN S,MILLER K,WOLISZ A.Traffic model for HTTP-based adaptive streaming[C]//Proceedings of 2017 IEEE Conference on Computer Communications Workshops.Washington D.C.,USA:IEEE Press,2017:1-6. [10] KUANG X H,LI J,XU F.Network traffic generator based on distributed agent for large-scale network emulation environment[C]//Proceedings of International Conference on Intelligent Science and Big Data Engineering.Berlin,Germany:Springer,2018:68-79. [11] HALILI E H.Apache JMeter:a practical beginner’s guide to automated testing and performance measurement for your websites[EB/OL].[2019-07-12].http://www.openisbn.org/download/1847192955.pdf. [12] BRADY J,GUNTHER N J.How to emulate Web traffic using standard load testing tools[EB/OL].[2019-07-12].https://arxiv.org/abs/1607.05356. [13] WLILSON M.Load runner architecture[EB/OL].[2019-07-12].http://www.wilsonmar.com/1loadrun.htm. [14] LIU Q Y,ZHAO X H,WILLINGER W,et al.Self-similarity in social network dynamics[J].ACM Transactions on Modeling and Performance Evaluation of Computing Systems,2016,2(1):1-26. [15] NA Zhenyu,LIU Yi,CUI Yang,et al.Research on aggregation and propagation of self-similar traffic in satellite network[J].International Journal of Hybrid Information Technology,2015,8(1):325-338. [16] CROVELLA M E,BESTAVROS A.Self-similarity in world wide Web traffic:evidence and possible causes[J].ACM Transactions on Networking,1997,5(6):835-846. [17] SHI Jiangtao,WANG Yonggang,DAI Xuelong,et al.On study and implementation of self-similar network traffic[J].Journal on Communications,2005,26(6):112-117.(in Chinese)石江涛,王永纲,戴雪龙,等.自相似网络业务流量的研究与实现[J].通信学报,2005,26(6):112-117. [18] HAO Zhenhua,JIAO Wencheng,HAO Dawei,et al.Design and implementation of network traffic generator based on ON/OFF model[J].Science Technology and Engineering,2008,8(12):3219-3223.(in Chinese)郝震华,矫文成,郝大为,等.基于ON/OFF模型的网络流量产生器的设计与实现[J].科学技术与工程,2008,8(12):3219-3223. [19] KURT L.Understanding docker[EB/OL].[2019-07-12].https://www.usenix.org/system/files/login/articles/login_winter17_11_lidl.pdf. [20] WANG Xingwei,ZHAO Hong,ZHU Jiakeng.GRPC:a communication cooperation mechanism in distributed systems[J].ACM SIGOPS Operating Systems Review,1993,27(3):75-86. |