[1] |
陈兴蜀, 滑强, 王毅桐 ,等. 云环境下SDN网络低速率DDoS攻击的研究[J]. 通信学报, 2019,40(6): 210-222.
|
|
CHEN X S , HUA Q , WANG Y T ,et al. Research on low-rate DDoS attack of SDN network in cloud environment[J]. Journal on Communications, 2019,40(6): 210-222.
|
[2] |
KUZMANOVIC A , KNIGHTLY E W . Low-rate TCP-targeted denial of service attacks and counter strategies[J]. IEEE/ACM Transactions on Networking, 2006,14(4): 683-696.
|
[3] |
WU X , TANG D , TANG L ,et al. A low-rate DoS attack detection method based on Hilbert spectrum and correlation[C]// Proceedings of 2018 IEEE Smart-World,Ubiquitous Intelligence & Computing,Advanced & Trusted Computing,Scalable Computing & Communications,Cloud & Big Data Computing,Internet of People and Smart City Innovation. 2018: 1358-1363.
|
[4] |
WU Z , PAN Q , YUE M ,et al. Sequence alignment detection of TCP-targeted synchronous low-rate DoS attacks[J]. Computer Networks, 2019,152: 64-77.
|
[5] |
KAUR G , SAXENA V , GUPTA J P . Detection of TCP targeted high bandwidth attacks using self-similarity[J]. Journal of King Saud University:Computer and Information Sciences, 2020,32(1): 35-49.
|
[6] |
ZHANG D , TANG D , TANG L ,et al. Pca-svm-based approach of detecting low-rate DoS attack[C]// Proceedings of 2019 IEEE 21st International Conference on High Performance Computing and Communications. 2019: 1163-1170.
|
[7] |
LIU Z , YIN X , HU Y . CPSS LR-DDoS detection and defense in edge computing utilizing DCNN Q-Learning[J]. IEEE Access, 2020,8: 42120-42130.
|
[8] |
WU Z J , XU Q , WANG J J ,et al. Low-rate DDoS attack detection based on factorization machine in software defined network[J]. IEEE Access, 2020,8: 17404-17418.
|
[9] |
PéREZ-DíAZ J A , VALDOVINOS I A , CHOO K K R ,et al. A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning[J]. IEEE Access, 2020,8: 155859-155872.
|
[10] |
MALIK J , AKHUNZADA A , BIBI I ,et al. Hybrid deep learning:an efficient reconnaissance and surveillance detection mechanism in SDN[J]. IEEE Access, 2020,8: 134695-134706.
|
[11] |
GARG S , KAUR K , KUMAR N ,et al. Hybrid deep-learning-based anomaly detection scheme for suspicious flow detection in SDN:a social multimedia perspective[J]. IEEE Transactions on Multimedia, 2019,21(3): 566-578.
|
[12] |
GUO Y K , LI Y Y , XU Y . Study on the application of LSTM-LightGBM model in stock rise and fall prediction[J]. MATEC Web of Conferences, 2021,336:05011.
|
[13] |
HU W , SHI Y X . Prediction of online consumers’ buying behavior based on LSTM-RF model[C]// Proceedings of 2020 5th International Conference on Communication,Image and Signal Processing (CCISP). 2020: 224-228.
|
[14] |
JAZI H H , GONZALEZ H , STAKHANOVA N ,et al. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling[J]. Computer Networks, 2017,121: 25-36.
|
[15] |
王子恒 . 基于区块链的海量连接管理架构设计与实现[D]. 北京:北京交通大学, 2021.
|
|
WANG Z H . Design and implementation of mass connection management architecture based on blockchain[D]. Beijing:Beijing Jiaotong University, 2021.
|
[16] |
ROSENBROCK K H , ANDERSEN N P S . The third generation partnership project (3GPP)[M]. GSM and UMTS. Chichester,UK:John Wiley & Sons,Ltd,, 221-261.
|
[17] |
PACKET S . Institute of electrical and electronics engineers[J]. IEEE Standard Computer Dictionary a Compilation of IEEE Standard Computer Glossaries, 2009,3(8): 128.
|
[18] |
GUALBERTO E S , DE SOUSA R T , DE BRITO VIEIRA T P ,et al. The answer is in the text:multi-stage methods for phishing detection based on feature engineering[J]. IEEE Access, 2020,8: 223529-223547.
|
[19] |
SUSILO B , SARI R F . Intrusion detection in IoT networks using deep learning algorithm[J]. Information, 2020,11(5): 279.
|