[1] |
KREUTZ D , RAMOS F M V , ESTEVES V P ,et al. Software-defined networking:a comprehensive survey[J]. Proceedings of the IEEE, 2014,103(1): 10-13.
|
[2] |
SEZER S , SCOTT H S , CHOUHAN P K ,et al. Are we ready for SDN? implementation challenges for software-defined networks[J]. IEEE Communications Magazine, 2013,51(7): 36-43.
|
[3] |
SHIN S , GU G . Attacking software-defined networks:a first feasibility study[C]// ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING. , 2013: 165-166.
|
[4] |
NEELAM D , SHASHANK S . Analyzing behavior of DDoS attacks to identify DDoS detection features in SDN[C]// IEEE International Conference on Communication System and Networks (COMSNETS), 2017.
|
[5] |
CHEN K Y , JUNUTHULA A R , SIDDHRAU I K ,et al. SDNShiled:towards more comprehensive defense against DDoS attacks on SDN control plane[C]// IEEE Conference on Communications and Networks Security (CNS). 2016.
|
[6] |
KLOTI R , KOTRONIS V , SMITH P . OpenFlow:a security analysis[C]// IEEE International Conference on Network Protocols. 2013: 1-6.
|
[7] |
BENTON K , CAMP L J , SMALL C . OpenFlow vulnerability assessment[C]// ACM SIGCOMM Workshop on Hot Topics in Software Defined NETWORKING. 2013: 151-152.
|
[8] |
DAYAL N , MAITY P , SRIVASTAVA S ,et al. Research trends in security and DDoS in SDN[J]. Security & Communication Networks, 2016,9.
|
[9] |
MOUSAVI S M , STHILAIRE M . Early detection of DDoS attacks against SDN controllers[C]// International Conference on Computing,NETWORKING and Communications. 2015: 77-81.
|
[10] |
DONG P , DU X , ZHANG H ,et al. A detection method for a novelDDoS attack against SDN controllers by vast new low-traffic flows[C]// IEEE International Conference on Communications. 2016: 1-6.
|
[11] |
BRAGA R , MOTA E , PASSITO A . Lightweight DDoS flooding attack detection using NOX/OpenFlow[C]// Conference on Local Computer Networks. 2010: 408-415.
|
[12] |
姚琳元, 董平, 张宏科 . 基于对象特征的软件定义网络分布式拒绝服务攻击检测方法[J]. 电子与信息学报, 2017,39(2): 381-388.
|
|
YAO L Y , DONG P , ZHANG H K . Distributed denial of service attack detection based on object character in software defined network[J]. Journal of Electronica & Information Technology, 2017,39(2): 381-388.
|
[13] |
杨雅辉, 姜电波, 沈晴霓 ,等. 基于改进的 GHSOM 的入侵检测研究[J]. 通信学报, 2011,32(1): 121-126.
|
|
YANG Y H , JIANG D B , SHEN Q N ,et al. Research on intrusion detection based on an improved GHSOM[J]. Journal on Communications, 2011,32(1): 121-126.
|
[14] |
阳时来, 杨雅辉, 沈晴霓 ,等. 一种基于半监督 GHSOM 的入侵检测方法[J]. 计算机研究与发展, 2013,50(11): 2375-2382.
|
|
YANG S L , YANG Y H , SHEN Q N ,et al. A method of intrusion detection based on semi-supervised GHSOM[J]. Journal of Computer Research and Development, 2013,50(11): 2375-2382.
|
[15] |
SHANNON C E . A mathematical theory of communication[J]. ACM Sigmobile Mobile Computing & Communications Review, 1948,27(4): 379-423.
|
[16] |
MA D , XU Z , LIN D . Defending blind DDoS attack on SDN based on moving target defense[C]// International Conference on Security and Privacy in Communication Systems. 2014: 463-480.
|
[17] |
BORGNAT P , DEWAELE G , FUKUDA K ,et al. Seven years and one day:sketching the evolution of internet traffic[C]// INFOCOM. 2009: 711-719.
|