[1] LIU Jian,SU Purui,YANG Min,et al.Software and cyber security-a survey[J].Journal of Software,2018,29(1):42-68.(in Chinese)刘剑,苏璞睿,杨珉,等.软件与网络安全研究综述[J].软件学报,2018,29(1):42-68. [2] YANG Zhongyi.Research and implementation of key technologies of network security scanning system[D].Changsha:National University of Defense Technology,2007.(in Chinese)杨忠仪.网络安全扫描系统关键技术的研究与实现[D].长沙:国防科学技术大学,2007. [3] LYON G F.Nmap network scanning:the official Nmap project guide to network discovery and security scanning[EB/OL].[2019-08-10].http://www.doc88.com/t-99193.html. [4] DURUMERIC Z,WUSTROW E,HALDERMAN J A.Zmap:fast Internet-wide scanning and its security applications[EB/OL].[2019-08-10].https://www.usenix.org/sites/default/files/conference/protected-files/durumeric_sec13_slides.pdf. [5] ZHAO Hanyun,LU Songnian,QI Kaiyue.Research on intelligentization of network scan technology[J].Computer Applications and Software,2008,25(3):184-185.(in Chinese)赵汉云,陆松年,齐开悦.网络扫描技术的智能化研究[J].计算机应用与软件,2008,25(3):184-185. [6] ZHAO Qiu,HU Huaping,YU Haiyan.Theory and implementation of IPID covert network scanning[J].Journal of Computer Applications,2005,25(4):870-873.(in Chinese)赵秋,胡华平,余海燕.IPID隐蔽网络扫描的原理与实现[J].计算机应用,2005,25(4):870-873. [7] ODHAVIYA R,MODI A,SHETH R,et al.Feasibility of idle port scanning using RST rate-limit[C]//Proceedings of the 10th International Conference on Security of Information and Networks.New York,USA:ACM Press,2017:224-228. [8] GEORGE C,JEAN D,TIM K,et al.Distributed systems:concepts and design[EB/OL].[2019-08-10].https://cs.fit.edu/~pkc/classes/dc/slides/ch3.pdf. [9] HAFAIEDH I B.A generic formal model for the comparison and analysis of distributed job-scheduling algorithms in grid environment[J].Journal of Parallel and Distributed Computing,2019,132:331-343. [10] FAN Cheng,SU Ruofan.Task scheduling optimization algorithm based on load balancing[J].Computer Engineering and Design,2017,38(6):1532-1535.(in Chinese)樊程,苏若凡.基于负载均衡的任务调度优化算法[J].计算机工程与设计,2017,38(6):1532-1535. [11] TONG Zhao,XIAO Zheng,LI Kenli,et al.Scheduling algorithm in distributed systems based on non-cooperative game[J].Journal of Hunan University (Natural Sciences),2016,43(10):139-147.(in Chinese)童钊,肖正,李肯立,等.分布式系统中基于非合作博弈的调度算法[J].湖南大学学报(自然科学版),2016,43(10):139-147. [12] LIU Yu,XIANG Dongyang,ZHENG Chundi.Scheduling and optimizing algorithm for parallel tasks in heterogeneous distributed computing systems[J].Systems Engineering and Electronics,2016,38(2):332-338.(in Chinese)柳玉,向东阳,郑春弟.面向异构分布式计算环境的并行任务调度优化方法[J].系统工程与电子技术,2016,38(2):332-338. [13] BERNSTEIN P A.Middleware:a model for distributed system services[J].Communications of the ACM,1996,39(2):86-98. [14] JIA Guojun.Design of transaction middleware system based on three-tiered architectures[J].Computer Engineering,2004,30(14):79-80.(in Chinese)贾郭军.基于三层结构交易中间件系统设计[J].计算机工程,2004,30(14):79-80. [15] LIN Peisheng,WANG Yijun,XUE Zhi.Task scheduling algorithm and protocol for distributed rapid port scanning[J].Communications Technology,2017,50(12):2787-2793.(in Chinese)林培胜,王轶骏,薛质.分布式快速端口扫描的任务调度算法与协议研究[J].通信技术,2017,50(12):2787-2793. [16] BANAVAR G,CHANDRA T D,STROM R E,et al.A case for message oriented middleware[C]//Proceedings of International Symposium on Distributed Computing.New York,USA:ACM Press,1999:1-16. [17] PIETZUCH P,BHOLA S.Congestion control in a reliable scalable message-oriented middleware[EB/OL].[2019-08-10].https://xueshu.baidu.com/usercenter/paper/show?paperid=ff6761f3b16079e4a0be643683872b22&site=xueshu_se&hitarticle=1. [18] LI Jing.Research on scanning task scheduling in distributed network security vulnerability scanning system[D].Baoding:North China Electric Power University,2009.(in Chinese)李静.分布式网络安全漏洞扫描系统中扫描任务调度的研究[D].保定:华北电力大学,2009. [19] JACKSON K.OpenStack cloud computing cookbook[M].Birmingham,UK:Packet Publishing Ltd,2013. [20] DONG Yaozu,ZHOU Zhengwei.X86-based system virtual machine development and application[J].Computer Engineering,2006,32(13):71-73.(in Chinese)董耀祖,周正伟.基于X86架构的系统虚拟机技术与应用[J].计算机工程,2006,32(13):71-73. [21] BELOGLAZOV A,PIRAGHAJ S F,ALROKAYAN M,et al.Deploying OpenStack on CentOS using the KVM hypervisor and GlusterFS distributed file system[EB/OL].[2019-08-10].http://citeseerx.ist.psu.edu/viewdoc/download;jsessionid=1949C2BA266A86A208D4455A14C70A68?doi=10.1.1.296.6475&rep=rep1&type=pdf. [22] NASCIMENTO M R,ROTHENBERG C E,SALVADOR M R,et al.Quagflow:partnering quagga with OpenFlow[J].ACM SIGCOMM Computer Communication Review,2011,41(4):441-442. [23] SOBELL M G.A practical guide to Ubuntu Linux[M].[S.l.]:Prentice Hall,2015. |