[1] |
JAIN S , KUMAR A , MANDAL S ,et al. B4:experience with a globally-deployed software defined wan[J]. Computer Communication Review, 2013,43(4): 3-14.
|
[2] |
KREUTZ D , RAMOS F M V , VERISSIMO P . Towards secure and dependable software-defined networks[C]// ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013: 55-60.
|
[3] |
LENG J , ZHOU Y , ZHANG J ,et al. An inference attack model for flow table capacity and usage:exploiting the vulnerability of flow table overflow in software-defined network[J]. Water Air & Soil Pollution, 2015,85(3): 1413-1418.
|
[4] |
SONCHACK J , DUBEY A , AVIV A J ,et al. Timing-based reconnaissance and defense in software-defined networks[C]// Conference on Computer Security Applications. 2016: 89-100.
|
[5] |
CUI H , KARAME G O , KLAEDTKE F ,et al. On the fingerprinting of software-defined networks[J]. IEEE Transactions on Information Forensics & Security, 2016,11(10): 2160-2173.
|
[6] |
BERDE P , GEROLA M , HART J ,et al. ONOS:towards an open,distributed SDN OS[C]// The Workshop on Hot Topics in Software Defined Networking. 2014: 1-6.
|
[7] |
MEDVED J , VARGA R , TKACIK A ,et al. OpenDaylight:towards a model-driven SDN controller architecture[C]// International Symposium on a World of Wireless,Mobile and Multimedia Networks. 2014: 1-6.
|
[8] |
LI H , LI P , GUO S ,et al. Byzantine-resilient secure software-defined networks with multiple controllers in cloud[C]// International Conference on Communications. 2014: 695-700.
|
[9] |
ELDEFRAWY K , KACZMAREK T . Byzantine fault tolerant software-defined networking (SDN) controllers[C]// Computer Society International Conference on Computers,Software & Applications. 2016: 208-213.
|
[10] |
WANG T , LIU F , GUO J ,et al. Dynamic SDN controller assignment in data center networks:Stable matching with transfers[C]// The IEEE International Conference on Computer Communications. 2016: 1-9.
|
[11] |
QI C , WU J , HU H ,et al. An intensive security architecture with multi-controller for SDN[C]// Computer Communications Workshops. 2016: 401-402.
|
[12] |
扈红超, 陈福才, 王禛鹏 . 拟态防御 DHR 模型若干问题探讨和性能评估[J]. 信息安全学报, 2016,1(4): 40-51.
|
|
HU H C , CHEN F C , WANG Z P . Discussion and performance evaluation of the proposed DHR model[J]. Journal of Cyber Security, 2016,1(4): 40-51
|
[13] |
QI C , WU J , HU H ,et al. Dynamic-scheduling mechanism of controllers based on security policy in software-defined network[J]. Electronics Letters, 2016,52(23): 1918-1920.
|
[14] |
LU Z P , CHEN F C . Poster:A Secure control plane with dynamic Multi-NOS for SDN[C]// Network and Distributed System Security Symposium (NDSS). 2017.
|
[15] |
ZHUANG R , DELOACH S A , OU X . Towards a theory of moving target defense[C]// ACM Workshop on Moving Target Defense. ACM, 2014: 31-40.
|
[16] |
RUI ZHUANG , ALEXANDRU G ,et al. A theory of cyber attacks a step towards analyzing mtd systems[J].--> In Proceedings of the 2nd ACM Workshop on Moving Target Defense (MTD), 2015.
|
[17] |
BROOKS M , YANG B . A Man-in-the-Middle attack against OpenDayLight SDN control-ler[C]// ACM Conference on Research in Information Technology. ACM, 2015: 45-49.
|
[18] |
ECESSA. What does network downtime & latency cost your business[EB/OL]. .
|
[19] |
ILGUN K , KEMMERER R A , PORRAS P A . State transition analysis:a rule-based intrusion detection approach[J]. IEEE Transactions on Software Engineering, 1995,21(3): 181-199.
|
[20] |
LEE S , YOON C . DELTA:a security assessment framework for software-defined networks[C]// Network and Distributed System Security Symposium. 2017.
|
[21] |
WANG H , LI F , CHEN S . Towards cost-effective moving target defense against DDoS and covert channel attacks[C]// ACM Workshop on Moving Target Defense. 2016: 15-25.
|
[22] |
WANG A , CHANG W , MOHAISEN A ,et al. Delving into internet DDoS attacks by botnets:characterization and analysis[C]// The 45th IEEE International Conference on Dependable Systems and Networks (DSN). 2015.
|
[23] |
MATTHEWS T . INCAPSULA survey :what DDoS attacks really cost businesses[EB/OL]. .
|
[24] |
JAFARIAN J H , AL-SHAER E , QI D . Adversary-aware IP address randomization for proactive agility against sophisticated attackers[C]// The 34th IEEE Conference on Computer Communications (INFOCOM). 2015: 238-276.
|