[1] |
Chen Sheng-hua.Discussion on Internet of Things security in 5G[J].Network Security Technology & Application,2021(8):82-84.(in Chinese)
|
[2] |
Shu Yue-jie.DDoS attack detection mechanism based on deep learning under SDN network architecture[D].Harbin: Harbin Institute of Technology,2020.(in Chinese)
|
[3] |
Tencent Security,NSFOCUS.Global DDoS threat report in the first half of 2021[R].Shenzhen:Tencent Security,2021.(in Chinese)
|
[4] |
Cui Y,Qian Q,Guo C,et al.Towards DDoS detection mechanisms in software-defined networking[J].Journal of Network and Computer Applications,2021,190:103156.
|
[5] |
Fang L W H Q.A comprehensive analysis of DDoS attacks based on DNS[J].Journal of Physics Conference Series,2021,2024(1):012027.
|
[6] |
Erhan D, Anarim E.Istatistiksel yntemler ile DDoS saldr tespiti DDoS detection using statistical methods[C]∥Proc of the 28th Signal Processing and Communications Applications Conference,2020:1-4.
|
[7] |
Tayfour O E,Marsono M N.Collaborative detection and mitigation of DDoS in software-defined networks[J].The Journal of Supercomputing,2021,77(11):13166-13190.
|
[8] |
Revathi S,Malathi A.A detailed analysis on NSL-KDD dataset using various machine learning techniques for intrusion detection[J].International Journal of Engineering Research & Technology,2013,2(12):1848-1853.
|
[9] |
Yu Y,Guo L,Liu Y,et al.An efficient SDN-based DDoS attack detection and rapid response platform in vehicular networks[J].IEEE Access,2018,6:44570-44579.
|
[10] |
Wang Y,Hu T,Tang G,et al.SGS:Safe-guard scheme for protecting control plane against DDoS attacks in software-defined networking[J].IEEE Access,2019,7:34699-34710.
|
[11] |
Cui J,Wang M,Luo Y,et al.DDoS detection and defense mechanism based on cognitive-inspired computing in SDN[J].Future Generation Computer Systems,2019,97(8):275-283.
|
[12] |
Luo Yi-han. Design and implementation of DDoS attack warning system based on LSTM[D].Haikou:Hainan University,2019.(in Chinese)
|
[13] |
Yang X,Han B,Sun Z,et al.SDN-based DDoS attack detection with crossplane collaboration and light weight flow monitoring[C]∥Proc of 2017 IEEE Global Communications Conference,2017:1-6.
|
[14] |
Nadeem M W,Goh H G,Ponnusamy V,et al.DDoS detection in SDN using machine learning techniques[J].Computers,Materials & Continua,2022,71(1):771-789.
|
[15] |
Florance G,Anandhi R J.Study on SDN with security issues using Mininet[J].Recent Trends in Intensive Computing, 2021,39(1):104-113.
|
[16] |
Bhardwaj S,Panda S N.Performance evaluation using RYU SDN controller in software-defined networking environment[J].Wireless Personal Communications,2022,122(1):701-723.
|
[17] |
Islam M T,Islam N,Refat M A.Node to node performance evaluation through RYU SDN controller[J].Wireless Personal Communications,2020,112(1):555-570.
|
[18] |
Shiravi A,Shiravi H,Tavallaee M,et al.Toward developing a systematic approach to generate benchmark datasets for intrusion detection[J].Computers & Security,2012,31(3):357-374.
|
[19] |
Wan J,Zou C,Zhou K,et al.IoT sensing framework with inter-cloud computing capability in vehicular networking[J].Electronic Commerce Research,2014,14(3):389-416.
|
[20] |
Gou Ling. Network traffic detection and analysis method based on empirical mode decomposition[D].Chengdu:University of Electronic Science and Technology of China,2018.(in Chinese)
|
[21] |
Wang Ling-jiao,Lü Cong-xia,Guo Hua.Research on DDoS attack detection based on support vector machine in SDN environment[J].Journal of Yunnan University(Natural Sciences Edition),2021,43(1):52-59.(in Chinese)
|
[22] |
Gaur V,Kumar R.Analysis of machine learning classifiers for early detection of DDoS attacks on IoT devices[J].Arabian Journal for Science and Engineering,2021,46(12):12757-12779.
|
|
附中文参考文献:
|
[1] |
陈胜华.5G时代物联网安全的探讨[J].网络安全技术与应用,2021(8):82-84.
|
[2] |
束越婕.SDN网络架构下基于深度学习的DDoS攻击检测机制[D].哈尔滨:哈尔滨工业大学,2020.
|
[3] |
腾讯安全,绿盟科技.2021上半年全球DDoS威胁报告[R].深圳:腾讯科技,2021.
|
[12] |
罗逸涵.基于LSTM的DDoS攻击预警系统的设计与实现[D].海口:海南大学,2019.
|
[20] |
苟玲.基于经验模态分解的网络流量检测与分析方法[D].成都:电子科技大学,2018.
|
[21] |
王灵矫,吕琮霞,郭华.SDN环境下基于支持向量机的DDoS攻击检测研究[J].云南大学学报(自然科学版),2021,43(1):52-59.
|