[1] |
KAUR CHAHAL J , BHANDARI A , BEHAL S . Distributed denial of service attacks:a threat or challenge[J]. New Review of Information Networking, 2019,24(1): 31-103.
|
[2] |
IETF. A source address validation architecture (SAVA) testbed and deployment experience:RFC5210[S]. 2008.
|
[3] |
IETF. Ingress filtering for multihomed networks.Technical report,BCP 84:RFC3704[S]. 2004.
|
[4] |
ZHANG Y , JIANG J , XU K ,et al. BDS:anear-optimal overlay network for inter-datacenter data replication[C]// Proceedings of the ACM Thirteenth Eurosys Conference. New York:ACM Press, 2018: 10-23.
|
[5] |
ZHANG Y , TIANI Y , WANG W ,et al. Federated routing scheme for large-scale cross domain network[C]// Proceeding of IEEE Conference on Computer Communications Workshops. Piscataway:IEEE Press, 2020: 1358-1359.
|
[6] |
IETF. Network ingress filtering:defeating denial of service attacks which employ IP source address spoofing:RFC2827[S]. 2000.
|
[7] |
LI J , MIRKOVIC J , WANG M ,et al. SAVE:source address validity enforcement protocol[C]// Proceedings of Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies. Piscataway:IEEE Press, 2002: 1557-1566.
|
[8] |
LIU X , YANG X , WETHERALL D ,et al. Efficient and secure source authentication with packet passports[C]// Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet.New York:ACM Press. 2006.
|
[9] |
XIAO P , BI J , FENG T . O-CPF:an openflow based intra-AS source address validation application[C]// Proceedings of the 8th CFI. New York:ACM Press, 2013.
|
[10] |
HUANG Q , SUN H , PATRICK LEE P C ,et al. OmniMon:re-architecting network telemetry with resource efficiency and full accuracy[C]// Proceedings on ACM SIGCOMM. New York:ACM Press, 2020: 404-421.
|
[11] |
CHEN X , HUANG Q , ZHANG D ,et al. ApproSync:approximate state synchronization for programmable networks[C]// IEEE International Conference on Network Protocols.[S.l.:s.n. ], 2020.
|
[12] |
ZHANG C , HU G , CHEN G ,et al. Towards an SDN-based integrated architecture for mitigating ip spoofing attack[J]. IEEE Access, 2017(6): 22764-22777.
|
[13] |
LIANG X , CHEN H . A SDN-based hierarchical authentication mechanism for IPv6 address[C]// Proceedings of 2019 IEEE International Conference on Intelligence and Security Informatics (ISI). Piscataway:IEEE Press, 2019:225.
|
[14] |
KORCYNSKI M , NOSYK Y , QASIM L ,et al. Don’t forget to lock the front door! inferring the deployment of source address validation of inbound traffic[C]// Proceedings of International Conference on Passive and Active Network Measurement. Switzerland:Springer,Cham, 2020: 107-121.
|
[15] |
IETF. OSPFv3 link state advertisement (LSA) extensibility:RFC8362[S]. 2018.
|
[16] |
IETF. A policy control mechanism in IS-IS using administrative tags:RFC5130[S]. 2008.
|
[17] |
IETF. BGP extended communities attribute:RFC4360[S]. 2006.
|