[1] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H ,et al. OpenFlow:enabling innovation in campus networks[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2): 69-74.
|
[2] |
SCHEHLMANN L , ABT S , BAIER H . Blessing or curse? Revisiting security aspects of Software-Defined Networking[C]// 10th International Conference on Network and Service Management (CNSM) and Workshop. Piscataway:IEEE Press, 2014: 382-387.
|
[3] |
SCOTT-HAYWARD S , NATARAJAN S , SEZER S . A survey of security in software defined networks[J]. IEEE Communications Surveys & Tutorials, 2016,18(1): 623-654.
|
[4] |
KREUTZ D , RAMOS F M V , VERISSIMO P . Towards secure and dependable software-defined networks[C]// Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking - HotSDN '13. New York:ACM Press, 2013: 55-60.
|
[5] |
LEE S , YOON C , SHIN S . The smaller,the shrewder:a simple malicious application can kill an entire SDN environment[C]// Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization. New York:ACM Press, 2016: 23-28.
|
[6] |
FERNANDES E L . Dpctl documentationcpqd/ofsoftswitch13 wiki github[EB]. 2018.
|
[7] |
ANTIKAINEN M , AURA T , S?REL? M , . Spook in your network:attacking an SDN with a compromised OpenFlow switch[C]// Secure IT Systems. Piscataway:Springer Press, 2014: 229-244.
|
[8] |
任晓龙 . 网络节点重要性排序算法及其应用研究[D]. 杭州:杭州师范大学, 2015.
|
|
REN X L . The study of ranking algorithm of the important node in networks and its applications[D]. Hangzhou:Hangzhou Normal University, 2015.
|
[9] |
游梦娜 . 基于攻击图的网络脆弱性评估技术研究与实现[D]. 北京:北京邮电大学, 2018.
|
|
YOU M N . Research and implementation of network vulnerability assessment technology based on attack graph[D]. Beijing:Beijing University of Posts and Telecommunications, 2018.
|
[10] |
朱禹铭 . 基于贝叶斯的动态网络攻击行为预测方法研究[D]. 秦皇岛:燕山大学, 2019.
|
|
ZHU Y M . Research on dynamic network attack behavior prediction method based on Bayesian[D]. Qinhuangdao:Yanshan University, 2019.
|
[11] |
EOM T , HONG J B , AN S ,et al. A framework for real-time intrusion response in software defined networking using precomputed graphical security models[J]. Security and Communication Networks, 2020: 1-15.
|
[12] |
EOM T , HONG J B , AN S ,et al. A systematic approach to threat modeling and security analysis for software defined networking[J]. IEEE Access, 2019,7: 137432-137445.
|
[13] |
LUO S , DONG M , OTA K ,et al. A security assessment mechanism for software-defined networking-based mobile networks[J]. Sensors (Basel,Switzerland), 2015,15(12): 31843-31858.
|
[14] |
YOON S , CHO J H , KIM D S ,et al. Attack graph-based moving target defense in software-defined networks[J]. IEEE Transactions on Network and Service Management, 2020,17(3): 1653-1668.
|
[15] |
LIU Y , MAN H . Network vulnerability assessment using Bayesian networks[C]// Defense and Security.Proc SPIE 5812,Data Mining,Intrusion Detection,Information Assurance,and Data Networks Security 2005. Piscataway:Society of Photo-Optical Instrumentation Engineers (SPIE) Press,2005, 5812: 61-71.
|
[16] |
ZIMBA A , CHEN H S , WANG Z S . Bayesian network based weighted APT attack paths modeling in cloud computing[J]. Future Generation Computer Systems, 2019,96: 525-537.
|
[17] |
Information security risk assessment[EB]. 2019.
|
[18] |
Definition - what does risk analysismean?[EB]. 2019.
|
[19] |
JOHNSON P , LAGERSTR?M R , EKSTEDT M ,et al. Can the common vulnerability scoring system be trusted? A Bayesian analysis[J]. IEEE Transactions on Dependable and Secure Computing, 2018,15(6): 1002-1015.
|
[20] |
POOLSAPPASIT N , DEWRI R , RAY I . Dynamic security risk management using Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2012,9(1): 61-74.
|
[21] |
Information Technology Labortory. National vulnerability database version 2.5[S]. 2018.
|
[22] |
OU X , GOVINDAVAJHALA S , APPEL A W . MulVAL:alogic-based network security analyzer[C]// USENIX Security Symposium. Piscataway:USENIX Press, 2005: 113-128.
|