[1] |
TOURRILHES J , SHARMA P , PETTIT J ,et al. SDN and OpenFlow evolution:a standards perspective[J]. Computer, 2014,47(11): 22-29.
|
[2] |
KU?NIAR M , PERE?íNI P , KOSTI? D ,et al. Methodology,measurement and analysis of flow table update characteristics in hardware OpenFlow switches[J]. Computer Networks, 2018,4(11): 5-16.
|
[3] |
吴琼 . 基于 SDN 的服务链的研究与实现[D]. 成都:西南交通大学, 2017.
|
|
WU Q . Research and implementation of service chain based on SDN[D]. Chengdu:Southwest Jiaotong University, 2017.
|
[4] |
周桥 . 基于SDNFV的服务功能链部署优化技术研究[D]. 郑州:信息工程大学, 2017.
|
|
ZHOU Q . Research on service function chain deployment optimization technology based on SDN[D]. Zhengzhou:Information Engineering University, 2017.
|
[5] |
PORRAS P , SHIN S , YEGNESWARAN V ,et al. A security enforcement kernel for OpenFlow networks[C]// Proceedings of the HotSDN Workshop at SIG-COMM. New York:ACM Press, 2012: 121-126.
|
[6] |
CHEUNG S , FONG M , PORRAS P ,et al. Securing the software-defined network control layer[J]. 2015:
|
[7] |
KAUR R , SINGH A , SINGH S ,et al. Security of software defined networks:taxonomic modeling,key components and open research area[C]// Proceedings of International Conference on Electrical,Electronics,and Optimization Techniques (ICEEOT). Piscataway:IEEE Press, 2016.
|
[8] |
SONCHACK J , AVIV A J , KELLER E ,et al. POSTER:OFX:enabling OpenFlow extensions for switch-level security applications[C]// Proceedings of ACM SIGSAC Conference on Computer& Communications Security. New York:ACM Press, 2015.
|
[9] |
MIN J X . Research on mimic defense in cyberspace[J]. Journal of Information Security, 2016,1(4): 1-10.
|
[10] |
GUO W B , LI F . Research on Web application security vulnerability scanning technology[J]. Information Communications, 2017(12): 123-124.
|
[11] |
SHI L Y , LI Y , MA M F . New progress in honeypot technology research[J]. Journal of Electronics & Information Technology, 2019,41(2): 249-259.
|
[12] |
MA H L , YI P , JIANG Y K ,et al. Mimic defense architecture of router based on dynamic heterogeneous redundant algorithm[J]. Journal of Information Security, 2017,2(1): 29-42.
|
[13] |
仝青, 张铮, 张为华 ,等. 拟态防御Web服务器设计与实现[J]. 软件学报, 2017,28(4): 883-897.
|
|
TONG Q , ZHANG Z , ZHANG W H ,et al. Design and implementation of mimic defense Web server[J]. Journal of Software, 2017,28(4): 883-897
|
[14] |
URGO M , VANCZA J . A branch-and-bound approach for the single machine maximum lateness stochastic scheduling problem to minimize the value-at-risk[J]. Flexible Services and Manufacturing Journal, 2019(31): 472-496.
|
[15] |
QIU D H , LI H , SUN J L . Measuring software similarity based on structure and property of class diagram[C]// Proceedings of Sixth International Conference on Advanced Computational Intelligence.[S.l.:s.n]. 2013: 75-80.
|
[16] |
WANG Z P , HU H C , CHENG G Z . A DNS framework design based on mimic security defense[J]. Electronic Journal, 2017,45(11): 6-9.
|
[17] |
胡腾, 李观文, 周华春 . 面向服务的数据中心安全框架[J]. 电信科学, 2018,34(1): 8-16.
|
|
HU T , LI G W , ZHOU H C . Service-oriented security framework for datacenter networks[J]. Telecommunications Science, 2018,34(1): 8-16.
|