[1] |
诸葛建伟, 韩心彗, 周勇林 ,等. 僵尸网络研究与进展[J]. 软件学报, 2008,19(3): 702-715.
|
|
ZHU-GE J W , HAN X H , ZHOU Y L ,et al. Research and development of Botnets[J]. Journal of Software, 2008,19(3): 702-715.
|
[2] |
SMITH J , SIMS J . Securing cloud,SDN and large data network environments from emerging DDoS attacks[C]// The International Conference on Cloud Computing,Data Science & Engineering. 2017.
|
[3] |
AHMED M E , KIM H . DDoS attack mitigation in internet of things using software defined networking[J]. Proceedings of Big Data Computing Service and Applications, 2017.
|
[4] |
HOQUE N , BHATTACHARYYA D K , KALITA J K . Botnet in DDoS Attacks:Trends and Challenges[J]. IEEE Communications Surveys & Tutorials, 2015,17(4): 2242-2270.
|
[5] |
MIRKOVIC J , REIHER P . A taxonomy of DDoS attack and DDoS defense mechanisms[J]. ACM Sigcomm Computer Communications Review, 2004,34(2): 39-53.
|
[6] |
ZARGAR S T , JOSHI J , TIPPER D . A survey of defense mechanism against distributed denial of service flooding attacks[J]. IEEE Communications Surveys & Tutorials, 2013,15(4): 2046-2069.
|
[7] |
GIL T M , POLETTO M . MULTOPS:a data-structure for bandwidth attach detection[C]// The 10th Conference on USENIX Security Symposium. 2001.
|
[8] |
MIRKOVIC J , REIHER P . D-WARD:a source-end defense against flooding denial-of-service attacks[J]. IEEE Transactions on Dependable and Secure Computing, 2005,2(3): 216-232.
|
[9] |
YAO G , BI J , VASILAKOS A V . Passive IP traceback:disclosing the locations of ip spoofers from path backscatter[J]. IEEE Transactions on Information Forensics and Security, 2015,10(3): 471-484.
|
[10] |
KANSAL V , DAVE M . Proactive DDoS attack detection and isolation[C]// The International Conference on Computer,Communications and Electronics. 2017.
|
[11] |
LU N , SU S , JING M ,et al. A router based packet filtering scheme for defending against DoS attacks[J]. IEEE China Communications, 2014,11(10): 136-146.
|
[12] |
MIZRAK A T , SAVAGE S , MARZULLO K . Detecting compromised routers via packet forwarding behavior[J]. IEEE Network, 2008,22(2): 34-39.
|
[13] |
MAHAJAN R , BELLOVIN S M . Controlling high bandwidth aggregates in the network[J]. ACM Sigcomm Computer Communication Review, 2002,32(3): 62-73.
|
[14] |
LIU X , YANG X , LU Y . To filter or to authorize:network-layer DoS defense against multimillion-node botnets[C]// ACM Sigcomm Conference on Data Communication. 2008: 195-206.
|
[15] |
柳袆, 付枫, 孙鑫 . 基于全局网络PCA的DDoS攻击检测方法[J]. 计算机应用研究, 2012,29(6): 2205-2207.
|
|
LIU Y , FU F , SUN X . DDoS detection method based on network-wide PCA[J]. Application Research of Computers, 2012,29(6): 2205-2207.
|
[16] |
黄靖, 杨树堂, 陆松年 . 一种基于流量控制技术的分布式 DDoS攻击检测框架研究[J]. 计算机应用与软件, 2008,25(6): 6-7.
|
|
HUANG J , YANG S T , LU S N . On framework of distributed DDOS attack detection based on flow control technique[J]. Application Research of Computers, 2008,25(6): 6-7.
|
[17] |
田晓朋, 邬家炜, 陈孝全 . 基于DDoS攻击的检测防御模型的研究[J]. 计算机工程与科学, 2009,31(1): 14-16.
|
|
TIAN X P , WU J W , CHEN X Q . Research on the model of detection and defense based on DDoS attacks[J]. Computer engineering and science, 2009,31(1): 14-16.
|
[18] |
PARK K , LEE H . On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law Internets[J]. ACM Sigcomm Computer Communication Review, 2001,31(4): 15-26.
|
[19] |
YAAR A , PERRIG A , SONG D . StackPi:new packet marking and filtering mechanisms for DDoS and IP spoofing defense[J]. IEEE Journal on Selected Areas in Communications, 2006,24(10): 1853-1863.
|
[20] |
YAU D K Y , LUI J C S , LIANG F . Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles[C]// The 10th IEEE International Workshop on Quality of Service. 2002: 35-44.
|
[21] |
KIM J , SHIN S . Software-defined HoneyNet:towards mitigating link flooding attacks[C]// IEEE/IFIP International Conference on Dependable Systems and Networks. 2017.
|
[22] |
YANG M H , YANG M C . RIHT:a novel hybrid IP traceback scheme[J]. IEEE Transactions on Information Forensics and Security, 2012,7(2): 789-797.
|
[23] |
KARASAWA T , SOSHI M , MIYAJI A . A novel hybrid IP traceback scheme with packet counters[C]// The 5th International Conference on Internet and Distributed Computing Systems. 2012.
|
[24] |
WANG B , ZHENG Y , LOU W ,et al. DDoS attack protection in the era of cloud computing and software-defined networking[J]. Elsevier Computer Networks, 2015,81(C): 308-319.
|
[25] |
WANG H , JIN C , SHIN K G . Defense against spoofed IP traffic using hop-count filtering[J]. IEEE/ACM Transactions on Networking, 2007,15(1): 40-53.
|
[26] |
PATIL S P , PATIL Y S . A survey on DDoS attacks and its defending methods in cloud[J]. International Journal of Innovative Research in Computer and Communication Engineering, 2015,3(11): 119878-11976.
|
[27] |
SAHI A , LAI D , LI Y ,et al. An efficient DDoS TCP flood attack detection and prevention system in a cloud environment[J]. IEEE Access, 2017,5: 6036-6048.
|
[28] |
RUKAVITSYN A , BORISENKO K , SHOROV A . Self-learning method for DDoS detection model in cloud computing[C]// IEEE Young Researchers in Electrical and Electronic Engineering. 2017: 544-547.
|
[29] |
WAHAB O A , BENTAHAR J , OTROK H ,et al. Optimal load distribution for the detection of VM-based DDoS attacks in the cloud[J]. IEEE Transactions on Services Computing, 1939,(99):1.
|
[30] |
LUA R , YOW K C . Mitigating DDoS attacks with transparent and intelligent fast-flux swarm network[J]. IEEE Network, 2011,25(4): 28-33.
|
[31] |
CHEN J , WANG Y , WANG X . On-demand security architecture for cloud computing[J]. Computer, 2012,45(7): 73-78.
|
[32] |
SOMANI G , GAUR M S , SANGHI D ,et al. Combating DDoS attacks in the cloud:requirements,trends,and future directions[J]. IEEE Cloud Computing, 2017,4(1): 22-32.
|
[33] |
DAYAL N , SRIVASTAVA S . Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN[C]// The International Conference on Communication Systems and Networks. 2017: 274-281.
|
[34] |
MEHDI S A , KHALID J , KHAYAM S A . Revisiting traffic anomaly detection using software defined networking[C]// The International Conference on Recent Advances in Intrusion Detection. 2011: 161-180.
|
[35] |
JIN R , WANG B . Malware detection for mobile devices using software-defined networking[C]// IEEE Research and Educational Experiment Workshop. 2013: 81-88.
|
[36] |
YAO G , BI J , XIAO P . Source address validation solution with OpenFlow/NOX architecture[C]// IEEE International Conference on Network Protocols,IEEE Computer Society. 2011: 7-12.
|
[37] |
YU Y , CHEN Q , LI X . Distributed collaborative monitoring in software defined networks[J]. Computer Science, 2014.
|
[38] |
肖甫, 马俊青, 黄洵松 ,等. SDN环境下基于KNN的DDoS攻击检测方法[J]. 南京邮电大学学报, 2015,35(1): 84-88.
|
|
XIAO F , MA J Q , HUANG X S ,et al. DDoS attack detection based on KNN in software defined networks[J]. Journal of Nanjing University of Posts and Telecommunications, 2015,35(1): 84-88.
|
[39] |
PASSITO A , MOTA E , BENNESBY R ,et al. AgNOS:a framework for autonomous control of software-defined networks[C]// IEEE International Conference on Advanced Information Networking and Applications. 2014: 405-412.
|
[40] |
KLOTI R , KOTRONIS V , SMITH P . OpenFlow:a security analysis[C]// IEEE International Conference on Network Protocols. 2014: 1-6.
|
[41] |
WUNDSAM A , DAN L , SEETHARAMAN S ,et al. OFRewind:enabling record and replay troubleshooting for networks[C]// Usenix Conference on Usenix Technical. 2011: 29-29.
|
[42] |
王秀磊, 陈鸣, 邢长友 ,等. 一种防御 DDoS 攻击的软件定义安全网络体制[J]. 软件学报, 2016,27(12): 3104-3119.
|
|
WANG X L , CHEN M , XING C Y ,et al. Software defined security networking mechanism against DDoS attacks[J]. Journal of Software, 2016,27(12): 3104-3119.
|
[43] |
HAMEED S , KHAN H A . Leveraging SDN for collaborative DDoS mitigation[C]// The International Conference on Networked Systems. 2017.
|
[44] |
FRANCOIS J , FESTOR O . Anomaly traceback using software defined networking[J]. International Workshop on Information Forensics & Security, 2014
|
[45] |
YAN Q , GONG Q , YU F R . Effective software-defined networking controller scheduling method to mitigate DDoS attacks[J]. Electronics Letters, 2017,53(7): 469-471.
|
[46] |
BELYAEV M , GAIVORONSKI S . Towards load balancing in SDN-networks during DDoS-attacks[C]// IEEE Science and Technology Conference. 2015: 1-6.
|
[47] |
JESUS W P D , SILVA D A D , JUNIOR R T D S ,et al. Analysis of SDN contributions for cloud computing security[C]// IEEE/ACM International Conference on Utility and Cloud Computing. 2015: 922-927.
|
[48] |
YAN Q , YU F R . Distributed denial of service attacks in software-defined networking with cloud computing[J]. IEEE Communications Magazine, 2015,53(4): 52-59.
|