[1] |
BRAGA R , MOTA E , PASSITO A . Lightweight DDoS flooding attack detection using NOX/OpenFlow[C]// The 35th Annual IEEE Conference on Local Computer Networks. 2010.
|
[2] |
BEHAL S , SINGH J . Detection and mitigation of DDoS attacks in SDN:a comprehensive review,research challenges and future directions[J]. Computer Science Review, 2020,37: 1-25.
|
[3] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H ,et al. OpenFlow:enabling innovation in campus networks[J]. ACM Sigcomm Computer Communication Review, 2008,38(2): 69-74.
|
[4] |
ZHAO P , ZHAO W , LIU Q . Multi-objective link-separation multipath selection using k max-min for software-defined MANET[C]// 2019 15th International Conference on Mobile Ad-Hoc and Sensor Networks (MSN). 2019: 253-258.
|
[5] |
SALMAN O , ELHAJJ I H , KAYSSI A ,et al. A review on machine learning-based approaches for Internet traffic classification[J]. Annals of Telecommunications, 2020: 1-38.
|
[6] |
WILLIAMS N , ZANDER S , ARMITAGE G . A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification[J]. ACM SIGCOMM Computer Communication Review, 2006,36(5): 5-16.
|
[7] |
LAKHINA A , CROVELLA M , DIOT C . Mining anomalies using traffic feature distributions[C]// ACM Sigcomm Conference on Applications. 2005:217.
|
[8] |
FIADINO P D , DALCONZO A , SCHIAVONE M ,et al. Challenging entropy-based anomaly detection and diagnosis in cellular networks[J]. ACM Sigcomm Computer Communication Review, 2015,45(4): 87-88.
|
[9] |
TIMCENKO V V , IBRAHIM J , GAJIN S . The hybrid machine learning support for entropy based network traffic anomaly detection[C]// ICIST 2019. 2019: 144-149.
|
[10] |
IBRAHIM J , TIMCENKO V V , GAJIN S . A comprehensive flow-based anomaly detection architecture using entropy calculation and machine learning classification[C]// ICIST 2019. 2019: 138-143.
|
[11] |
SHUKLA A S , MAURYA R . Entropy-based anomaly detection in a network[J]. Wireless Personal Communications, 2018,99: 1487-1501.
|
[12] |
SCHAEFFER-FILHO A , MAUTHE A , HUTCHISON D ,et al. PReSET:a toolset for the evaluation of network resilience strategies[C]// IFIP/IEEE International Symposium on Integrated Network Management. 2013.
|
[13] |
STONE-GROSS B , COVA M , GILBERT B ,et al. Analysis of a Botnet Takeover[J]. IEEE Security & Privacy, 2011,9(1): 64-72.
|
[14] |
WANG Q , CHEN Z , CHEN C ,et al. On the robustness of the botnet topology formed by worm infection[C]// Global Telecommunications Conference. 2010.
|
[15] |
周佳骏, 汪婷婷 . 基于计算机网络对抗的 Agobot 实例分析[J]. 网络安全技术与应用, 2013,(7): 86-88.
|
|
ZHOU J J , WANG T T . Instance analysis of Agobot based on computer network operations[J]. Network Security Technology & Application, 2013,(7): 86-88.
|
[16] |
李世杰, 倪洪 . 面向DDoS防御设备安全性测试的Scapy应用[J]. 网络安全技术与应用, 2020,(1): 20-22.
|
|
LI S J , NI H . Scapy application for DDoS defense equipment se curity test[J]. Network Security Technology and Application, 2020,(1): 20-22.
|
[17] |
KAUR K , SINGH J , GHUMMAN N S . Mininet as Software Defined Networking Testing Platform[C]// International Conference on Communiction,Computing & Systems. 2014.
|