| [1] |
KUMAR A, SOMANI G. DDoS at a glance: attack launch to solutions[J]. IT Professional, 2023, 25(3): 36-42.
|
| [2] |
SHARMA A K, KUMAR R. A comprehensive survey of DDoS attacks: evolution, mitigation and emerging trend[C]// 2024 3rd International Conference on Power Electronics and IoT Applications in Renewable Energy and its Control. Mathura:IEEE, 2024(3):185-188.
|
| [3] |
ZAYO. Protecting your business from cyber attacks: the state of DDoS attacks[R], 2024.
|
| [4] |
Stanford University. Clean slate program[EB/OL]. 2006[2024-05-10]. http://cleanslate.stanford.edu/.
|
| [5] |
JIMÉNEZ M B, FERNÁNDEZ D, JORGE E, et al. A survey of the main security issues and solutions for the SDN architecture[J]. IEEE Access, 2021, 9:122016-122038.
|
| [6] |
张健, 曹珩, 王哲. 软件定义网络体系架构安全问题研究[J]. 信息通信技术与政策, 2023, 49(2):35-42.
|
| [7] |
RASOOL R, WANG H, ASHRAF U. A survey of link flooding attacks in software defined network ecosystems[J]. Journal of Network and Computer Applications, 2020, 172: 102803.
|
| [8] |
VAUGHAN-NICHOLS S J. OpenFlow: the next generation of the network[J]. Computer, 2022, 44(8):13-15.
|
| [9] |
Open Networking Foundation. OpenFlow switch specification (Version 1.5.1)[R], 2015.
|
| [10] |
王丽君, 刘永强, 张健. 基于OpenFlow的未来互联网试验技术研究[J]. 电信网技术, 2011, 37(6):1-4.
|
| [11] |
TUSSHAR U, ANKIT K J. Survey on DDoS attack techniques and solutions in software-defined network[M]//GUPTA B B, PEREZ G M, AGRAWAL D P. Handbook of computer networks and cyber security. Berlin: Springer International Publishing, 2020:389-419.
|
| [12] |
KLYMASH M, SHPUR O, PELEH N, et al. Concept of intelligent detection of DDoS attacks in SDN networks using machine learning[C]// 2020 IEEE International Conference on Problems of Infocommunications, Science and Technology. Kharkiv:IEEE, 2020:609-612.
|
| [13] |
KAUR S, KUMAR K, AGGARWAL N, et al. A comprehensive survey of DDoS defense solutions in SDN: taxonomy, research challenges, and future directions[J]. Computers & Security, 2021, 110:102423.
|
| [14] |
SINGH J, BEHAL S. Detection and mitigation of DDoS attacks in SDN: a comprehensive review, research challenges and future directions[J]. Computer Science Review, 2020, 37:1-24.
|
| [15] |
陈豪杰, 贾创辉, 邵维专. SDN环境下DDoS攻击检测研究进展[J]. 现代计算机, 2019(2):47-51.
|
| [16] |
李传煌, 吴艳, 钱正哲, 等. SDN下基于深度学习混合模型的DDoS攻击检测与防御[J]. 通信学报, 2018, 39(7):1-12.
|
| [17] |
李春江, 尹少平, 池浩田, 等. SDN中基于统计与集成自编码器的DDoS攻击检测模型[J]. 计算机科学, 2024(3):1-13.
|
| [18] |
贾锟, 王君楠, 刘峰. SDN环境下的DDoS检测与缓解机制[J]. 信息安全学报, 2021, 6(1):18-29.
|
| [19] |
WANG H, LI Y. Overview of DDoS attack detection in software-defined networks[J]. IEEE Access, 2024, 12:38351-38381.
|
| [20] |
MISHRA A, GUPTA N, GUPTA B. Defense mechanisms against DDoS attack based on entropy in SDN-cloud using POX controller[J]. Telecommunication Systems, 2021, 77(1):47-62.
|
| [21] |
赵普, 赵文涛, 付章杰. 基于Renyi熵的SDN自主防护系统[J]. 网络与信息安全学报, 2021, 7(3): 85-94.
|
| [22] |
傅友, 邹东升. SDN中基于条件熵和决策树的DDoS攻击检测方法[J]. 重庆大学学报, 2023, 46(7):1-8.
|
| [23] |
REVATHI M, RAMALINGAM V, AMUTHA B. A machine learning based detection and mitigation of the DDoS attack by using SDN controller framework[J]. Wireless Personal Communications, 2022, 127(3):2417-2441.
|
| [24] |
ZHU L, TANG X, SHEN M, et al. Privacy-preserving DDoS attack detection using cross-domain traffic in software defined networks[J]. IEEE Journal on Selected Areas in Communications, 2018, 36(3):628-643.
|
| [25] |
XU Y, LIU Y. DDoS attack detection under SDN context[C]// The 35th Annual IEEE International Conference on Computer Communications. San Francisco: IEEE, 2016, 35:1-9.
|
| [26] |
ITAGI V, JAVALI M, MADHUKESHWAR H, et al. DDoS attack detection in SDN environment using bi-directional recurrent neural network[C]// 2021 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics. Nitte:IEEE, 2021:123-128.
|
| [27] |
WANG J, LIU J. Deep learning for securing software-defined industrial internet of things: attacks and countermeasures[J]. IEEE Internet of Things Journal, 2022, 9(13):11179-11189.
|
| [28] |
白坚镜, 顾瑞春, 刘清河. SDN环境中基于Bi-LSTM的DDoS攻击检测方案[J]. 计算机工程与科学, 2023, 45(2):277-285.
|