[1] |
SARASWAT S , AGARWAL V , GUPTA H P ,et al. Challenges and solutions in software defined networking:a survey[J]. Journal of Network and Computer Applications, 2019,141: 23-58.
|
[2] |
王涛, 陈鸿昶, 程国振 . 软件定义网络及安全防御技术研究[J]. 通信学报, 2017,38(11): 133-160.
|
|
WANG T , CHEN H C , CHENG G Z . Research on soft-ware-defined network and the security defense technology[J]. Journal on Communications, 2017,38(11): 133-160.
|
[3] |
岳猛, 王怀远, 吴志军 ,等. 云计算中DDoS攻防技术研究综述[J]. 计算机学报, 2020,43(12): 2315-2336.
|
|
YUE M , WANG H Y , WU Z J ,et al. A survey of DDoS attack and defense technologies in cloud computing[J]. Chinese Journal of Com-puters, 2020,43(12): 2315-2336.
|
[4] |
MIZRAK A T , CHENG Y C , MARZULLO K ,et al. Detecting and isolating malicious routers[J]. IEEE Transactions on Dependable and Secure Computing, 2006,3(3): 230-244.
|
[5] |
AKHUNZADA A , GANI A , ANUAR N B ,et al. Secure and dependable software defined networks[J]. Journal of Network and Computer Applications, 2016,61: 199-221.
|
[6] |
SHAGHAGHI A , KAAFAR M A , BUYYA R ,et al. Software-defined network (SDN) data plane security:issues,solutions,and future directions handbook of computer networks and cyber security[J]. arXiv Preprint,arXiv:1804.00262, 2018.
|
[7] |
KIM T H J , BASESCU C , JIA L M ,et al. Lightweight source authentication and path validation[J]. ACM SIGCOMM Computer Communication Review, 2015,44(4): 271-282.
|
[8] |
WU B , XU K , LI Q ,et al. RFL:robust fault localization on unreliable communication channels[J]. Computer Networks, 2019,158: 158-174.
|
[9] |
ZHANG P , WU H , ZHANG D ,et al. Verifying rule enforcement in software defined networks with REV[J]. IEEE/ACM Transactions on Networking, 2020,28(2): 917-929.
|
[10] |
祝现威, 常朝稳, 朱智强 ,等. 基于身份属性的 SDN 控制转发方法[J]. 通信学报, 2019,40(11): 1-18.
|
|
ZHU X W , CHANG C W , ZHU Z Q ,et al. SDN control and forwarding method based on identity attribute[J]. Journal on Communications, 2019,40(11): 1-18.
|
[11] |
王首一, 李琦, 张云 . 轻量级的软件定义网络数据包转发验证[J]. 计算机学报, 2019,42(1): 176-189.
|
|
WANG S Y , LI Q , ZHANG Y . LPV:lightweight packet forward-ing verification in SDN[J]. Chinese Journal of Computers, 2019,42(1): 176-189.
|
[12] |
左志斌, 常朝稳, 祝现威 . 一种基于数据平面可编程的软件定义网络报文转发验证机制[J]. 电子与信息学报, 2020,42(5): 1110-1117.
|
|
ZUO Z B , CHANG C W , ZHU X W . A software-defined net-working packet forwarding verification mechanism based on programmable data plane[J]. Journal of Electronics & Informa-tion Technology, 2020,42(5): 1110-1117.
|
[13] |
林耘森箫, 毕军, 周禹 ,等. 基于 P4 的可编程数据平面研究及其应用[J]. 计算机学报, 2019,42(11): 2539-2560.
|
|
LIN Y S X , BI J , ZHOU Y ,et al. Research and applications of programmable data plane based on P4[J]. Chinese Journal of Computers, 2019,42(11): 2539-2560.
|
[14] |
DHAWAN M , PODDAR R , MAHAJAN K ,et al. SPHINX:detecting security attacks in software-defined networks[C]// Proceedings of 2015 Network and Distributed System Security Symposium. Virginia:the Internet Society, 2015: 1-15.
|
[15] |
吴平, 常朝稳, 马莹莹 . 基于端址重载的 SDN 包转发验证[J]. 通信学报, 2021,42(7): 70-83.
|
|
WU P , CHANG C W , MA Y Y . Port address overloading based packet forwarding verification in SDN[J]. Journal on Communications, 2021,42(7): 70-83.
|
[16] |
SENGUPTA S , CHOWDHARY A , SABUR A ,et al. A survey of moving target defenses for network security[J]. IEEE Communications Surveys & Tutorials, 2020,22(3): 1909-1941.
|
[17] |
JAFARIAN J H , AL-SHAER E , DUAN Q . Formal approach for route agility against persistent attackers[M]. Berlin: Springer, 2013: 237-254.
|
[18] |
DUFFIELD N G , GROSSGLAUSER M . Trajectory sampling for direct traffic observation[J]. IEEE/ACM Transactions on Networking, 2001,9(3): 280-292.
|
[19] |
GOLDBERG S , XIAO D , BARAK B ,et al. Measuring path quality in the presence of adversaries:the role of cryptography in network accountability[R]. 2007.
|
[20] |
HAGERUP T , RüB C , . A guided tour of Chernoff bounds[J]. Information Processing Letters, 1990,33(6): 305-308.
|