[1] WANG Rui,JIA Zhiping,JU Lei.An entropy-based distributed DDoS detection mechanism in software-defined networking[C]//Proceedings of 2015 IEEE Trustcom/BigDataSE/ISPA.Washington D.C.,USA:IEEE Press,2015:310-317. [2] ZHANG Lihui,DUAN Haixin,DAI Shidong.Design and implementation of DDoS attack-defense testbed[J].Computer Engineering,2008,34(13):118-120.(in Chinese)张黎辉,段海新,戴世冬.DDoS攻击防御实验床的设计与实现[J].计算机工程,2008,34(13):118-120. [3] LIU Xin,YANG Xiaowei,LU Yanbin.To filter or to authorize:network-layer DoS defense against multimillion-node botnets[J].ACM SIGCOMM Computer Communication Review,2008,38(4):195-206. [4] XU Yang,LIU Yong.DDoS attack detection under SDN context[C]//Proceedings of the 35th Annual IEEE International Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2016:1-9. [5] PRIYA A V,RADHIKA N.Performance comparison of SDN OpenFlow controllers[J].International Journal of Computer Aided Engineering and Technology,2019,11(4/5):467-479. [6] HAN Zizheng.An entropy-based detection of DDoS attacks in SDN[J].Information Technology,2017,41(1):63-66.(in Chinese)韩子铮.SDN中一种基于熵值检测DDoS攻击的方法[J].信息技术,2017,41(1):63-66. [7] MOUSAVI S M,ST-HILAIRE M.Early detection of DDoS attacks against SDN controllers[C]//Proceedings of 2015 International Conference on Computing,Networking and Communications.Washington D.C.,USA:IEEE Press,2015:77-81. [8] KIM Y,LAU W C,CHUAH M C,et al.PacketScore:a statistics-based packet filtering scheme against distributed denial-of-service attacks[J].IEEE Transactions on Dependable and Secure Computing,2006,3(2):141-155. [9] WINTER P,HERMANN E,ZEILINGER M.Inductive intrusion detection in flow-based network data using one-class support vector machines[C]//Proceedings of the 4th IFIP International Conference on New Technologies,Mobility and Security.Washington D.C.,USA:IEEE Press,2011:1-5. [10] NIYAZ Q,SUN W Q,JAVAID A Y.A deep learning based DDoS detection system in software-defined networking (SDN)[J].ICST Transactions on Security and Safety,2017,4(12):153515-153520. [11] FANG Xin,WAN Yang,WEN Xia,et al.DDoS attacks based on protocol analysis of network intrusion detection system research[J].Netinfo Security,2012(4):36-38.(in Chinese)方欣,万扬,文霞,等.基于协议分析技术的网络入侵检测系统中DDoS攻击的方法研究[J].信息网络安全,2012(4):36-38. [12] YE Jin,CHENG Xiangyang,ZHU Jian,et al.A DDoS attack detection method based on SVM in software defined network[J].Security and Communication Networks,2018,2018(4):1-8. [13] SHIN S,YEGNESWARAN V,PORRAS P,et al.Avant-guard:scalable and vigilant switch flow management in software-defined networks[C]//Proceedings of 2013 ACM SIGSAC Conference on Computer & Communica-tions Security.New York,USA:ACM Press,2013:413-424. [14] YANG Xiangrui,HAN Biao,SUN Zhigang,et al.SDN-based DDoS attack detection with cross-plane collaboration and lightweight flow monitoring[C]//Proceedings of 2017 IEEE Global Com-munications Conference.Washington D.C.,USA:IEEE Press,2017:1-6. [15] MAO Jianbiao,HAN Biao,SUN Zhigang,et al.Efficient mismatched packet buffer management with packet order-preserving for OpenFlow networks[J].Computer Networks,2016,110:91-103. [16] SUN Qindong,ZHANG Deyun,GAO Peng.Detecting distributed denial of service attacks based on time series analysis[J].Chinese Journal of Computers,2005,28(5):767-773.(in Chinese)孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. [17] ZHAO Tao,LI Tao,HAN Biao,et al.Design and implementation of software defined hardware counters for SDN[J].Computer Networks,2016,102:129-144. [18] QIN Xi,XU Tongge,WANG Chao.DDoS attack detection using flow entropy and clustering technique[C]//Proceedings of the 11th International Conference on Computational Intelligence and Security.Washington D.C.,USA:IEEE Press,2015:412-415. [19] LÜ Liangfu,ZHANG Jiawan,ZHANG Dan.DDoS attack detection method based on improved wavelet analysis[J].Computer Engineering,2010,36(6):29-31,44.(in Chinese)吕良福,张加万,张丹.基于改进小波分析的DDoS攻击检测方法[J].计算机工程,2010,36(6):29-31,44. [20] YAN Q,YU F,GONG Q X,et al.Software-Defined Networking (SDN) and Distributed Denial of Service (DDoS) attacks in cloud computing environments:a survey,some research issues,and challenges[J].IEEE Communications Surveys & Tutorials,2016,18(1):602-622. [21] RAJARAMAN A,ULLMAN J D.Mining of massive datasets[M].Cambridge,UK:Cambridge University Press,2009. |