[1] |
YANG H Y , ZHANG L , ZHANG X G ,et al. An adaptive IoT network security situation prediction model[J]. Mobile Networks and Applications, 2022,27(1): 371-381.
|
[2] |
YANG H Y , YUAN H H , ZHANG L . Risk assessment method of IoT host based on attack graph[J]. Mobile Networks and Applications, 2023: 1-10.
|
[3] |
一个藏在我们身边的巨型僵尸网络:Pink[EB]. 2023.
|
|
A giant zombie network hidden around us:Pink[EB]. 2023.
|
[4] |
YANG H Y , ZHANG Z X , XIE L X ,et al. Network security situation assessment with network attack behavior classification[J]. International Journal of Intelligent Systems, 2022,37(10): 6909-6927.
|
[5] |
DDoS attack report for Q3 2022[EB]. 2023.
|
[6] |
DOSHI R , APTHORPE N , FEAMSTER N . Machine learning DDoS detection for consumer Internet of things devices[C]// Proceedings of the 2018 IEEE Security and Privacy Workshops (SPW). Piscataway:IEEE Press, 2018: 29-35.
|
[7] |
LIU Z , HU C Z , SHAN C . Riemannian manifold on stream data:Fourier transform and entropy-based DDoS attacks detection method[J]. Computers & Security, 2021(109): 102392.
|
[8] |
AHMED M E , ULLAH S , KIM H . Statistical application fingerprinting for DDoS attack mitigation[J]. IEEE Transactions on Information Forensics and Security, 2019,14(6): 1471-1484.
|
[9] |
DAS S , VENUGOPAL D , SHIVA S ,et al. Empirical evaluation of the ensemble framework for feature selection in DDoS attack[C]// Proceedings of the 2020 7th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/2020 6th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom). Piscataway:IEEE Press, 2020: 56-61.
|
[10] |
DOSHI K , YILMAZ Y , ULUDAG S . Timely detection and mitigation of stealthy DDoS attacks via IoT networks[J]. IEEE Transactions on Dependable and Secure Computing, 2021,18(5): 2164-2176.
|
[11] |
ZHU T , QIU X K , RAO Y ,et al. HiAtGang:how to mine the gangs hidden behind DDoS attacks[J]. Chinese Journal of Electronics, 2022,31(2): 293-303.
|
[12] |
SALAHUDDIN M A , POURAHMADI V , ALAMEDDINE H A ,et al. Chronos:DDoS attack detection using time-based autoencoder[J]. IEEE Transactions on Network and Service Management, 2022,19(1): 627-641.
|
[13] |
LIU X Q , REN J D , HE H T ,et al. Low-rate DDoS attacks detection method using data compression and behavior divergence measurement[J]. Computers & Security, 2021(100): 102107.
|
[14] |
JIA Y Z , ZHONG F T , ALRAWAIS A ,et al. FlowGuard:an intelligent edge defense mechanism against IoT DDoS attacks[J]. IEEE Internet of Things Journal, 2020,7(10): 9552-9562.
|
[15] |
BHAYO J , JAFAQ R , AHMED A ,et al. A time-efficient approach toward DDoS attack detection in IoT network using SDN[J]. IEEE Internet of Things Journal, 2022,9(5): 3612-3630.
|
[16] |
DING D M , SAVI M , SIRACUSA D . Tracking normalized network traffic entropy to detect DDoS attacks in P4[J]. IEEE Transactions on Dependable and Secure Computing, 2022,19(6): 4019-4031.
|
[17] |
RAVI N , SHALINIE S M . Learning-driven detection and mitigation of DDoS attack in IoT via SDN-cloud architecture[J]. IEEE Internet of Things Journal, 2020,7(4): 3559-3570.
|
[18] |
KUSHWAH G S , RANGA V . Optimized extreme learning machine for detecting DDoS attacks in cloud computing[J]. Computers & Security, 2021(105): 102260.
|
[19] |
DORIGUZZI-CORIN R , MILLAR S , SCOTT-HAYWARD S , ,et al. Lucid:a practical,lightweight deep learning solution for DDoS attack detection[J]. IEEE Transactions on Network and Service Management, 2020,17(2): 876-889.
|
[20] |
CVITI? I , PERAKOVIC D , GUPTA B B ,et al. Boosting-based DDoS detection in Internet of things systems[J]. IEEE Internet of Things Journal, 2022,9(3): 2109-2123.
|
[21] |
张龙, 王劲松 . SDN中基于信息熵与DNN的DDoS攻击检测模型[J]. 计算机研究与发展, 2019,56(5): 909-918.
|
|
ZHANG L , WANG J S . DDoS attack detection model based on information entropy and DNN in SDN[J]. Journal of Computer Research and Development, 2019,56(5): 909-918.
|
[22] |
ZHOU L , ZHU Y , ZONG T R ,et al. A feature selection-based method for DDoS attack flow classification[J]. Future Generation Computer Systems, 2022,132: 67-79.
|
[23] |
TORABI H , MIRTAHERI S L , GRECO S . Practical autoencoder based anomaly detection by using vector reconstruction error[J]. Cybersecurity, 2023,6(1): 1-13.
|
[24] |
AYDIN H , ORMAN Z , ALI AYDIN M . A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment[J]. Computers & Security, 2022(118): 102725.
|
[25] |
AKGUN D , HIZAL S , CAVUSOGLU U . A new DDoS attacks intrusion detection model based on deep learning for cybersecurity[J]. Computers & Security, 2022(118): 102748.
|
[26] |
HAJIMAGHSOODI M , JALILI R . RAD:a statistical mechanism based on behavioral analysis for DDoS attack countermeasure[J]. IEEE Transactions on Information Forensics and Security, 2022(17): 2732-2745.
|
[27] |
The Bot-IoT dataset[EB]. 2023.
|
[28] |
SHARAFALDIN I , LASHKARI A H , HAKAK S ,et al. Developing realistic distributed denial of service (DDoS) attack dataset and taxonomy[C]// Proceedings of the 2019 International Carnahan Conference on Security Technology (ICCST). Piscataway:IEEE Press, 2019: 1-8.
|