[1] |
JAIN S , KUMAR A , MANDAL S , et al. B4: experience with a glob-ally-deployed software defined WAN[J]. ACM SIGCOMM Computer Communication Review, 2013,43(4):3-14.
|
[2] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H , et al. Open-flow: enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2):69-74.
|
[3] |
ZHANG L , ESTRIN D , BURKE J , et al. Named data networking (NDN) project[J]. Relatório Técnico NDN-0001, Xerox Palo Alto Re-search Center-PARC, 2010.
|
[4] |
HAN D , ANAND A , DOGAR F R , et al. XIA: efficient support for evolvable internetworking[C]// Presented as part of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 2012:309-322.
|
[5] |
PANG R , ALLMAN M , PAXSON V , et al. The devil and packet trace anonymization[J]. ACM SIGCOMM Computer Communication Re-view, 2006,36(1):29-38.
|
[6] |
FUENTES F , KAR D C . Ethereal vs tcpdump: a comparative study on packet sniffing tools for educational purpose[J]. Journal of Computing Sciences in Colleges, 2005,20(4):169-176.
|
[7] |
LI Y , SLAGELL A , LUO K , et al. Canine: a combined conversion and anonymization tool for processing netflows for security[C]// International Conference on Telecommunication Systems Modeling and Analysis. 2005:21.
|
[8] |
PANG R , ALLMAN M , PAXSON V , et al. The devil and packet trace anonymization[J]. ACM SIGCOMM Computer Communication Re-view, 2006,36(1):29-38.
|
[9] |
SLAGELL A J , LAKKARAJU K , LUO K . FLAIM: a multi-level anonymization framework for computer and network logs[C]// LISA. 2006,6:3-8.
|
[10] |
FARAH T , TRAJKOVIC L . Anonym: a tool for anonymization of the Internet traffic[C]// IEEE International Conference on Cybernetics (CYBCONF). IEEE, 2013:261-266.
|
[11] |
LIN Y D , LIN P C , WANG S H , et al. Pcaplib: a system of extracting, classifying, and anonymizing real packet traces[J]. IEEE Systems Journal, 2016,10(2):520-531.
|
[12] |
PAUL R R , VALGENTI V C , KIM M S . Real-time net shuffle: graph distortion for on-line anonymization[C]// The 2011 19th IEEE Interna-tional Conference on Network Protocols. IEEE Computer Society, 2011:133-134.
|
[13] |
DINKAR K P , JAIN S A . Security and privacy preserving policy in mobile crowd sensing[J]. International Journal of Engineering Science, 2016,5206.
|
[14] |
BLANTON E . Tcpurify: TCP packet sniffer[EB/OL]. (2002-9)..
|
[15] |
BELLARE M . Practice-oriented provable-security[J]. Lecture Notes in Computer Science, 1998,156(11):221-231.
|
[16] |
FAN J , XU J , AMMAR M H , et al. Prefix-preserving IP address ano-nymization: measurement-based security evaluation and a new cryp-tography-based scheme[J]. Computer Networks, 2004,46(2):253-72.
|
[17] |
DAEMEN J , RIJMEN V . AES proposal: Rijndael[S]. US: NIST, 2003.
|
[18] |
NATARAJAN S , WOLF T . Network-level privacy for hosted cloud services[C]// 2014 International Conference and Workshop on the Network of the Future (NOF), IEEE, 2014:1-8.
|
[19] |
LI S , DOH I , CHAE K . An anonymous IP-based privacy protection routing mechanism for CDN[C]// 2016 International Conference on Information Networking (ICOIN). 2016:75-80.
|
[20] |
RAMASWAMY R , WOLF T . High-speed prefix-preserving IP address anonymization for passive measurement systems[J]. IEEE/ACM Transactions on Networking, 2007,15(1):26-39.
|
[21] |
史冰, 吴连国, 丁伟 . IP 地址前缀保留匿名化算法的改进[J]. 微电子学与计算机, 2007,24(10):167-170. SHI B , WU L G , DING W . Improvement of prefix-preserving IP address anonymization algorithm[J]. Microelectronics & Computer, 2007,24(10):167-170.
|
[22] |
JENKINS J R J . Isaac[C]// Fast Software Encryption. Springer Berlin Heidelberg, 1996:41-49.
|
[23] |
ZHANG P , HUANG X , LUO M , et al. Fast restorable prefix- preserv-ing IP address anonymization for IPv4/IPv6[J]. The Journal of China Universities of Posts and Telecommunications, 2010,17:93-98.
|
[24] |
CAO K , LI Y , YANG H , et al. Poster: an online prefix-preserving IP address anonymization algorithm for passive measurement sys-tems[C]// International Conference on Security and Privacy in Com-munication Systems. Springer International Publishing, 2015:581-584.
|
[25] |
AHUJA R K , MAGNANTI T L , ORLIN J B . Network flows[R]. School of Management Cambridge, MA, 1988.
|
[26] |
THOMPSON K , MILLER G J , WILDER R . Wide-area Internet traffic patterns and characteristics[J]. Network, 1997,11(6):10-23.
|
[27] |
张广兴, 张大方, 谢高岗 , 等. Internet 城域出口链路流量测量与特征分析[J]. 电子学报, 2007,35(11):2092-2097. ZHANG G X , ZHANG D F , XIE G G , et al. Internet traffic measure-ment and characteristic analysis on output link of metro area net-work[J]. Acta Electronica Sinica, 2007,35(11):2092-2097.
|
[28] |
BAKSHI R , CUDRE M P , WYLOT M . A comparison of different data structures to store RDF data[R]. 2013.
|
[29] |
GOGLIN S D , CORNETT L . Flexible and extensible receive side scaling: U.S. Patent 7,584,286[P]. 2009-9-1.
|
[30] |
WOO S , PARK K . Scalable TCP session monitoring with symmetric receive-side scaling[R]. Korea: KAIST, 2012.
|
[31] |
VIEGA J , MESSIER M , CHANDRA P , . Network security with openssl:cryptography for secure communications[M]. O'Reilly Media, Inc, 2002.
|
[32] |
KROYETZ T , ROGAWAY P . The software performance of authenti-cated-encryption modes[C]// Fast Software Encryption. Springer Berlin Heidelberg, 2011:306-327.
|
[33] |
ALMEIDA V , BESTTAYROS A , CROYELLA M , et al. Characterizing reference locality in the WWW[C]// Fourth International Conference on. Parallel and Distributed Information Systems. IEEE, 1996:92-103.
|
[34] |
葛敬国, 唐海娜, 鄂跃鹏 , 等. 海云创新试验环境管控与服务系统总体设计[J]. 网络新媒体技术, 2012,1(6):45-51. GE J G , TANG H N , E Y P , et al. The overall design of resource con-trol and service system in the sea-cloud innovative and experimental environment[J]. Journal of Network New Media, 2012,1(6):45-51.
|