[1] |
BONGUET A , BELLAICHE M . A survey of denial-of-service and distributed denial of service attacks and defenses in cloud computing[J]. Future Internet, 2017,9(3): 43.
|
[2] |
ARSHI M , NASREEN M D , MADHAVI K . A survey of DDOS attacks using machine learning techniques[J]. E3S Web of Conferences, 2020(184): 01052.
|
[3] |
XIE X , LI J P , HU X Y ,et al. High performance DDoS attack detection system based on distribution statistics[M]// Lecture Notes in Computer Science. Cham: Springer International Publishing, 2019: 132-142.
|
[4] |
董聪, 姜波, 卢志刚 ,等. 面向网络空间安全情报的知识图谱综述[J]. 信息安全学报, 2020(5): 56-76.
|
|
DONG C , JIANG B , LU Z G ,et al. Knowledge graph for cyberspace security intelligence:a survey[J]. Journal of Cyber Security, 2020(5): 56-76.
|
[5] |
MITRE. Common attack pattern enumeration and classification[EB]. 2009.
|
[6] |
BERMAN D , BUCZAK A , CHAVIS J ,et al. A survey of deep learning methods for cyber security[J]. Information, 2019,10(4): 122.
|
[7] |
OBRST L , CHASE P , MARKELOFF R . Developing an ontology of the cyber security domain[C]// STIDS.[S.l.:s.n.], 2012: 49-56.
|
[8] |
CHEN X J , JIA S B , XIANG Y . A review:knowledge reasoning over knowledge graph[J]. Expert Systems With Applications, 2020(141): 112948.
|
[9] |
王勇超, 罗胜文, 杨英宝 ,等. 知识图谱可视化综述[J]. 计算机辅助设计与图形学学报, 2019,31(10): 1666-1676.
|
|
WANG Y C , LUO S W , YANG Y B ,et al. A survey on knowledge graph visualization[J]. Journal of Computer-Aided Design& Computer Graphics, 2019,31(10): 1666-1676.
|
[10] |
陈佳 . 基于知识图谱的 DDoS 攻击源检测研究[J]. 信息安全研究, 2020,6(1): 91-96.
|
|
CHEN J . DDoS attack detection based on knowledge graph[J]. Journal of Information Security Research, 2020,6(1): 91-96.
|
[11] |
ZHANG Z J . Graph databases for knowledge management[J]. IT Professional, 2017,19(6): 26-32.
|
[12] |
MISAKI M , TSUDA T , INOUE S ,et al. Distributed database and application architecture for big data solutions[C]// Proceedings of IEEE Transactions on Semiconductor Manufacturing. Piscataway:IEEE Press, 2016: 328-332.
|
[13] |
SHEN G W , WANG W L , MU Q L ,et al. Data-driven cybersecurity knowledge graph construction for industrial control system security[J]. Wireless Communications and Mobile Computing, 2020,2020: 1-13.
|
[14] |
王子恒 . 基于区块链的海量连接管理架构设计与实现[D]. 北京:北京交通大学, 2021.
|
|
WANG Z H . Design and implementation of mass connection management architecture based on blockchain[D]. Beijing:Beijing Jiaotong University, 2021.
|