[1] |
MCKEOWN N , ANDERSON T , BALAKRISHNAN H ,et al. OpenFlow[J]. ACM SIGCOMM Computer Communication Review, 2008,38(2): 69-74.
|
[2] |
CHICA J C C , IMBACHI J C , BOTERO J F . Security in SDN:a comprehensive survey[J]. Journal of Network and Computer Applications, 2020, 159:102595.1-102595.23.
|
[3] |
周启钊, 于俊清, 李冬 . SDN控制层泛洪防御机制研究:检测与缓解[J]. 通信学报, 2021,42(11): 41-53.
|
|
ZHOU Q Z , YU J Q , LI D . Research on flood defense mechanism of SDN control layer:detection and mitigation[J]. Journal on Communications, 2021,42(11): 41-53.
|
[4] |
王涛, 陈鸿昶 . 基于多维异构特征与反馈感知调度的 SDN 内生安全控制平面[J]. 电子学报, 2021,49(6): 1117-1124.
|
|
WANG T , CHEN H C . An SDN endogenous security control plane based on multi-dimensional heterogeneous features and feedback-aware scheduling strategy[J]. Acta Electronica Sinica, 2021,49(6): 1117-1124.
|
[5] |
VARADHARAJAN V , TUPAKULA U . Counteracting attacks from malicious end hosts in software defined networks[J]. IEEE Transactions on Network and Service Management, 2020,17(1): 160-174.
|
[6] |
YANG S , CUI L Z , CHEN Z T ,et al. An efficient approach to robust SDN controller placement for security[J]. IEEE Transactions on Network and Service Management, 2020,17(3): 1669-1682.
|
[7] |
陆以勤, 毛中书, 程喆 ,等. SDN 拓扑攻击及其防御[J]. 华南理工大学学报(自然科学版), 2020,48(11): 114-122.
|
|
LU Y Q , MAO Z S , CHENG Z ,et al. Research on SDN topology attack and its defense mechanism[J]. Journal of South China University of Technology (Natural Science Edition), 2020,48(11): 114-122.
|
[8] |
PAGE L , BRIN S , MOTWANI R ,et al. The PageRank citation ranking:bringing order to the Web[R]. 1999.
|
[9] |
罗智勇, 杨旭, 孙广路 ,等. 基于马尔可夫的有限自动机入侵容忍系统模型[J]. 通信学报, 2019,40(10): 79-89.
|
|
LUO Z Y , YANG X , SUN G L ,et al. Finite automaton intrusion tolerance system model based on Markov[J]. Journal on Communications, 2019,40(10): 79-89.
|
[10] |
CHEN Y Y , XU B , LONG J ,et al. Information security assessment of wireless sensor networks based on Bayesian attack graphs[J]. Journal of Intelligent & Fuzzy Systems:Applications in Engineering and Technology, 2021,41(3): 4511-4517.
|
[11] |
HUSáK M , KOMáRKOVá J , BOU-HARB E ,et al. Survey of attack projection,prediction,and forecasting in cyber security[J]. IEEE Communications Surveys & Tutorials, 2019,21(1): 640-660.
|
[12] |
MUNOZ-GONZALEZ L , SGANDURRA D , BARRERE M ,et al. Exact inference techniques for the analysis of Bayesian attack graphs[J]. IEEE Transactions on Dependable and Secure Computing, 2017,16(2): 231-244.
|
[13] |
ZENG J P , WU S , CHEN Y Y ,et al. Survey of attack graph analysis methods from the perspective of data and knowledge processing[J]. Security and Communication Networks, 2019,2019: 1-16.
|
[14] |
POKHREL N R , TSOKOS C P . Cybersecurity:a stochastic predictive model to determine overall network security risk using Markovian process[J]. Journal of Information Security, 2017,8(2): 91-105.
|
[15] |
SUN X Y , DAI J , LIU P ,et al. Using Bayesian networks for probabilistic identification of zero-day attack paths[J]. IEEE Transactions on Information Forensics and Security, 2018,13(10): 2506-2521.
|
[16] |
王辉, 张娟, 赵雅 ,等. 一种新型贝叶斯模型的网络风险评估方法[J]. 小型微型计算机系统, 2020,41(9): 1898-1904.
|
|
WANG H , ZHANG J , ZHAO Y ,et al. Network risk assessment method of a new type of Bayesian model[J]. Journal of Chinese Computer Systems, 2020,41(9): 1898-1904.
|
[17] |
RUOHONEN J . A look at the time delays in CVSS vulnerability scoring[J]. Applied Computing and Informatics, 2019,15(2): 129-135.
|
[18] |
肖云鹏, 卢星宇, 许明 ,等. 机器学习经典算法实践[M]. 北京: 清华大学出版社, 2018.
|
|
XIAO Y P , LU X Y , XU M ,et al. Classical algorithm practice of machine learning[M]. Beijing: Tsinghua University Press, 2018.
|
[19] |
马春光, 汪诚弘, 张东红 ,等. 一种基于攻击意愿分析的网络风险动态评估模型[J]. 计算机研究与发展, 2015,52(9): 2056-2068.
|
|
MA C G , WANG C H , ZHANG D H ,et al. A dynamic network risk assessment model based on attacker’s inclination[J]. Journal of Computer Research and Development, 2015,52(9): 2056-2068.
|
[20] |
王洋, 吴建英, 黄金垒 ,等. 基于贝叶斯攻击图的网络入侵意图识别方法[J]. 计算机工程与应用, 2019,55(22): 73-79.
|
|
WANG Y , WU J Y , HUANG J L ,et al. Network intrusion intention recognition method based on Bayesian attack graph[J]. Computer Engineering and Applications, 2019,55(22): 73-79.
|