[1] |
CHEN Xingshu,HUA Qiang,WANG Yitong,GE Long,ZHU Yi.
Research on low-rate DDoS attack of SDN network in cloud environment
[J]. Journal on Communications, 2019, 40(6): 210-222.
|
[2] |
Hongyan QIAN,Hao XUE,Ming CHEN.
UDM:NFV-based prevention mechanism against DDoS attack on SDN controller
[J]. Journal on Communications, 2019, 40(3): 116-124.
|
[3] |
Junfeng TIAN,Liuling QI.
DDoS attack detection method based on conditional entropy and GHSOM in SDN
[J]. Journal on Communications, 2018, 39(8): 140-149.
|
[4] |
Heng HE,Yan HU,Lianghan ZHENG,Zhengyuan XUE.
Efficient DDoS attack detection and prevention scheme based on SDN in cloud environment
[J]. Journal on Communications, 2018, 39(4): 139-151.
|
[5] |
Miao WANG,Li-ming WANG,Zhen XU,Duo-he MA.
Research on DDoS detection in multi-tenant cloud based on entropy change
[J]. Journal on Communications, 2016, 37(Z1): 204-210.
|
[6] |
UZhi-jun W,UIYi C,UEMeng Y.
VHSAP-based approach of defending against DDoS attacks for cloud computing routing platforms
[J]. Journal on Communications, 2015, 36(1): 30-37.
|
[7] |
.
Research on tracking DDoS based on
NTP reflection amplification attack
[J]. Journal on Communications, 2014, 35(Z1): 7-35.
|
[8] |
Guang JIN,Fei ZHANG,Jiang-bo QIAN,Hong-hao ZHANG.
DDoS defense with IP traceback and path identification
[J]. Journal on Communications, 2011, 32(2): 61-67.
|
[9] |
Jun-feng TIAN,Hong-tao ZHU,Dong-dong SUN,Zhi-ming BI,Qian LIU.
Model of coorperation defense DDoS attack based on client reputation
[J]. Journal on Communications, 2009, 30(3): 12-20.
|
[10] |
Ren-yan LU,Lei CHEN,Xin LIU,De-jian YE.
Defense scheme of DoS,DDoS attack in streaming media service
[J]. Journal on Communications, 2009, 30(10A): 58-62.
|
[11] |
Guang JIN,Jian-gang YANG,Yuan LI,Hui-zhan ZHANG.
Optimal path identification to defend against DDoS attacks
[J]. Journal on Communications, 2008, 29(9): 46-53.
|
[12] |
Fen YAN,Yi-qun CHEN,Hao HUANG,Xin-chun YIN.
Detecting DDoS attack based on compensation non-parameter CUSUM algorithm
[J]. Journal on Communications, 2008, 29(6): 128-134.
|
[13] |
Zhi-jun WU,Dong ZHANG.
Attack simulation and signature extraction of low-rate DDoS
[J]. Journal on Communications, 2008, 29(1): 71-76.
|
[14] |
Bao-feng HUANG.
IP traceback scheme based on histroy marking
[J]. Journal on Communications, 2006, 27(11A): 85-87.
|
[15] |
IJin-ming L,ANGRu-chuan W.
Study of a new packet marking scheme for DDoS attack source traceback
[J]. Journal on Communications, 2005, 26(11): 18-23.
|