[1] |
赛门铁 . 2018 年安全威胁趋势预测[J]. 网络安全和信息化, 2018(1): 103-105.
|
|
EC . Security threat trend forecast in 2018[J]. Security &Informatization, 2018(1): 103-105.
|
[2] |
JAJODIA S , GHOSH A K , SWARUP V ,et al. Moving target defense[M]. New York: Springer, 2011.
|
[3] |
YANG W , ZHENG Z Q , CHEN G R ,et al. Security analysis of a distributed networked system under eavesdropping attacks[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2020,67(7): 1254-1258.
|
[4] |
GURUNG S , CHAUHAN S . A survey of black-hole attack mitigation techniques in MANET:merits,drawbacks,and suitability[J]. Wireless Networks, 2020,26(3): 1981-2011.
|
[5] |
SINGH M P , BHANDARI A . New-flow based DDoS attacks in SDN:Taxonomy,rationales,and research challenges[J]. Computer Communications, 2020,154: 509-527.
|
[6] |
LILLICRAP T P , HUNT J J , PRITZEL A ,et al. Continuous control with deep reinforcement learning[J]. arXiv Preprint,arXiv:1509.02971, 2015.
|
[7] |
BOSSHART P , DALY D , GIBB G ,et al. P4[J]. ACM SIGCOMM Computer Communication Review, 2014,44(3): 87-95.
|
[8] |
DUAN Q , AL-SHAER E , JAFARIAN H . Efficient random route mutation considering flow and network constraints[C]// 2013 IEEE Conference on Communications and Network Security. Piscataway:IEEE Press, 2013: 260-268.
|
[9] |
JAFARIAN J H , AL-SHAER E , DUAN Q . Formal approach for route agility against persistent attackers[C]// European Symposium on Research in Computer Security. Berlin:Springer, 2013: 237-254.
|
[10] |
ZHAO Z , GONG D F , LU B ,et al. SDN-based double hopping communication against sniffer attack[J]. Mathematical Problems in Engineering, 2016,2016: 1-13.
|
[11] |
ASEERI A , NETJINDA N , HEWETT R . Alleviating eavesdropping attacks in software-defined networking data plane[C]// Proceedings of the 12th Annual Conference on Cyber and Information Security Research. New York:ACM Press, 2017: 1-8.
|
[12] |
ZHOU Z , XU C Q , KUANG X H ,et al. An efficient and agile spatio-temporal route mutation moving target defense mechanism[C]// 2019 IEEE International Conference on Communications. Piscataway:IEEE Press, 2019: 1-6.
|
[13] |
DUAN Q , AL-SHAER E , CHATTERJEE S ,et al. Proactive routing mutation against stealthy distributed denial of service attacks:metrics,modeling,and analysis[J]. The Journal of Defense Modeling and Simulation:Applications,Methodology,Technology, 2018,15(2): 219-230.
|
[14] |
LIU J , ZHANG H Q , GUO Z C . A defense mechanism of random routing mutation in SDN[J]. IEICE Transactions on Information and Systems, 2017,100(5): 1046-1054.
|
[15] |
雷程, 马多贺, 张红旗 ,等. 基于最优路径跳变的网络移动目标防御技术[J]. 通信学报, 2017,38(3): 133-143.
|
|
LEI C , MA D H , ZHANG H Q ,et al. Network moving target defense technique based on optimal forwarding path migration[J]. Journal on Communications, 2017,38(3): 133-143.
|
[16] |
ZHANG T , KUANG X H , ZHOU Z ,et al. An intelligent route mutation mechanism against mixed attack based on security awareness[C]// 2019 IEEE Global Communications Conference. Piscataway:IEEE Press, 2019: 1-6.
|
[17] |
ZHANG T , XU C Q , ZHANG B C ,et al. DQ-RM:deep reinforcement learning-based route mutation scheme for multimedia services[C]// 2020 International Wireless Communications and Mobile Computing. Piscataway:IEEE Press, 2020: 291-296.
|
[18] |
KIM C , SIVARAMAN A , KATTA N ,et al. In-band network telemetry via programmable dataplanes[J]. ACM SIGCOMM, 2015,17: 1-2.
|
[19] |
KANDULA S , KATABI D , SINHA S ,et al. Dynamic load balancing without packet reordering[J]. ACM SIGCOMM Computer Communication Review, 2007,37(2): 51-62.
|
[20] |
KAUR K , SINGH J , GHUMMAN N S . Mininet as software defined networking testing platform[C]// International Conference on Communiction,Computing & Systems. Piscataway:IEEE Press, 2014: 1-6.
|
[21] |
WAXMAN B M . Routing of multipoint connections[J]. IEEE Journal on Selected Areas in Communications, 1988,6(9): 1617-1622.
|
[22] |
ABADI M , BARHAM P , CHEN J ,et al. TensorFlow:a system for large-scale machine learning[C]// Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation. Berkeley:USENIX Association, 2016: 265-283.
|