1 |
Open Networking Foundation. Software-Defined Networking: the New Norm for Networks, 2012
|
2 |
McKeown N , Anderson T , Balakrishnan H , et al. OpenFlow:enabling innovation in campus networks. Computer Communication Review, 2008,38(2):69~74
|
3 |
ONF. OpenFlow Switch Specification 1.3.4, 2014
|
4 |
Braga R , Mota E , Passito A . Lightweight DDoS flooding attack detection using NOX/OpenFlow. Proceedings of IEEE 35th Conference on Local Computer Networks (LCN), Denver, Colorado, USA, 2010:408~415
|
5 |
Mousavi S M , St-Hilaire M . Early detection of DDoS attacks against SDN controllers. Proceedings of 2015 International Conference on Computing, Networking and Communications (ICNC), Ottawa, Canada, 2015:77~81
|
6 |
Su W , Wu L , Huang Y , et al. Design of event-based intrusion detection system on OpenFlow network. Proceedings of IEEE International Conference on Dependable Systems and Networks (SDN), Budapest, Hungary, 2013:1~2
|
7 |
Giotis K , Argyropoulos C , Androulidakis G , et al. Combining OpenFlow and sFlow for an effective and scalable anomaly detection and mitigation mechanism on SDN environments. Computer Networks, 2014(62):122~136
|
8 |
POX. , 2015
|
9 |
Hofstede R , Celeda P , Trammell B , et al. Flow monitoring explained: from packet capture to data analysis with NetFlow and IPFIX. IEEE Communications Surveys and Tutorials, 2014,16(4):2037~2064
|
10 |
Denning D E . An intrusion-detection model. IEEE Transactions on Software Engineering, 1987,13(2):222~232
|
11 |
Lakhina A , Crovella M , Diot C . Mining anomalies using traffic feature distributions. Proceedings of ACM SIGCOMM, Philadelphia, PA, USA, 2005:217~228
|
12 |
陈小辉 . 基于数据挖掘算法的入侵检测方法. 计算机工程, 2010,36(17):72~76 Chen X H . Intrusion detection method based on data mining algorithm. Computer Engineering, 2010,36(17):72~76
|
13 |
杜强, 孙敏 . 基于改进聚类分析算法的入侵检测系统研究. 计算机工程与应用, 2011,47(11):106~108 Du Q , Sun M . Intrusion detection system based on improved clustering algorithm. Computer Engineering and Applications. 2011,47(11):106~108
|
14 |
Scapy. , 2014
|