[1] |
JAJODIA S , GHOSH A K , SWARUP V ,et al. Moving target defense:creating asymmetric uncertainty for cyber threats[M]. Springer Science & Business Media, 2011.
|
[2] |
LEI C , MA D H , ZHANG H Q . Optimal strategy selection for moving target defense based on Markov game[J]. IEEE Access, 2017.
|
[3] |
SUN K , JAJODIA S . Protecting enterprise networks through attack surface expansion[C]// The 2014 Workshop on Cyber Security Analytics,Intelligence and Automation. 2014: 29-32.
|
[4] |
LEI C , MA D , ZHANG H ,et al. Moving target network defense effectiveness evaluation based on change-point detection[J]. Mathematical Problems in Engineering, 2016: 20166-391502.
|
[5] |
YADAV T , RAO A M . Technical aspects of cyber kill chain[C]// International Symposium on Security in Computing and Communication.Springer International Publishing. 2015: 438-452.
|
[6] |
DUAN Q,AL-SHAER E , JAFARIAN H . Efficient random route mutation considering flow and network constraints[C]// IEEE Conference on Communications and Network Security (CNS). 2013: 260-268.
|
[7] |
NELAKUDITI S , LEE S , YU Y ,et al. Fast local rerouting for handling transient link failures[J]. IEEE/ACM Transactions on Networking (ToN), 2007,15(2): 359-372.
|
[8] |
JAFARIAN J H , AL-SHAER E , DUAN Q . Formal approach for route agility against persistent attackers[C]// European Symposium on Research in Computer Security. 2013: 237-254.
|
[9] |
DOLEV S , DAVID S T . SDN-Based Private Interconnection[C]// 2014 IEEE 13th International Symposium on Network Computing and Applications (NCA). 2014: 129-136.
|
[10] |
SHU T , KRUNZ M , LIU S . Secure data collection in wireless sensor networks using randomized dispersive routes[J]. IEEE Transactions on Mobile Computing, 2010,9(7): 941-954.
|
[11] |
BOHACEK S , HESPANHA J P , LEE J ,et al. Game theoretic stochastic routing for fault tolerance and security in computer networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2007,18(9): 1227-1240.
|
[12] |
GILLANI F,AL-SHAER E , LO S , et al . Agile virtualized infrastructure to proactively defend against cyber-attacks[C]// 2015 IEEE Conference on Computer Communications (INFOCOM). 2015: 729-737.
|
[13] |
BJ?RNER N , DE MOURA L . Z310:applications,enablers,challenges and directions[C]// Sixth International Workshop on Constraints in Formal Verification. 2009.
|
[14] |
QAZI Z A , LEE J , JIN T ,et al. Application-awareness in SDN[J]. ACM SIGCOMM Computer Communication Review, 2013,43(4): 487-488.
|
[15] |
HAN S , PENG Z , WANG S . The maximum flow problem of uncertain network[J]. Information Sciences, 2014,265: 167-175.
|
[16] |
YU M , YI Y , REXFORD J ,et al. Rethinking virtual network embedding:substrate support for path splitting and migration[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2): 17-29.
|
[17] |
COHEN R,LEWIN-EYTAN L , NAOR J S , et al . On the effect of forwarding table size on SDN network utilization[C]// IEEE INFOCOM 2014-IEEE Conference on Computer Communications. 2014: 1734-1742.
|
[18] |
KAR K , KODIALAM M , LAKSHMAN T V ,et al. Routing for network capacity maximization in energy-constrained ad hoc networks[C]// INFOCOM. 2003.
|
[19] |
LIANG W , GUO X . On-line multicasting for network capacity maximization in energy-constrained ad hoc networks[J]. IEEE Transactions Mobile Computing, 2006,5: 1215-1227.
|
[20] |
HUANG M , LIANG W , XU Z ,et al. Dynamic routing for network throughput maximization in software-defined networks[C]// IEEE INFOCOM The 35th Annual IEEE International Conference on Computer Communications. 2016: 978-986.
|
[21] |
PENG B , KEMP A H , BOUSSAKTA S . QoS routing with bandwidth and hop-count consideration:a performance perspective[J]. Journal of Communications, 2006,1(2): 1-11.
|
[22] |
JACOBSON V . Congestion avoidance and control[J]. ACM SIGCOMM Computer Communication Review, 1988,18(4): 314-329
|
[23] |
HAO J , ORLIN J . A faster algorithm for finding the minimum cut in a directed graph[J]. Journal of Algorithms, 1994,17(3): 424-446.
|
[24] |
KIRKPATRICK K . Software-defined networking[J]. Communications of the ACM, 2013,56(9): 16-19.
|
[25] |
LEUNG K C , LI V O K , YANG D . An overview of packet reordering in transmission control protocol(TCP):problems,solutions,and challenges[J]. IEEE Transactions on Parallel & Distributed Systems, 2007,18: 522-535.
|
[26] |
LANTZ B , HELLER B , MCKEOWN N . A network in a laptop:rapid prototyping for software-defined networks[C]// The 9th ACM SIGCOMM Workshop on Hot Topics in Networks. 2010.
|
[27] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H ,et al. OpenFlow:enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2): 69-74.
|
[28] |
MEDVED J , VARGA R , TKACIK A ,et al. Opendaylight:towards a model-driven SDN controller architecture[C]// 2014 IEEE 15th International Symposium on a World of Wireless,Mobile and Multimedia Networks. 2014: 1-6.
|