参考文献/References:
[1] 郑毅, 华一强, 何晓峰. SDN的特征、发展现状及趋势[J]. 电信科学, 2013, 29(9): 102-107.
[2] 王丽娜, 王斐, 刘维杰. 面向SDN的安全威胁及其对抗技术研究[J]. 武汉大学学报(理学版), 2019, 65(2): 153-164.
[3] 王月, 吕光宏, 曹勇. 软件定义网络安全研究[J]. 计算机技术与发展, 2018, 28(4): 128-132.
[4] 高晓楠. 软件定义网络中DDoS攻击研究综述[J]. 电子技术与软件工程, 2019(9): 214-216.
[5] VELLIANGIRI S, PREMALATHA J. Intrusion detection of distributed denial of service attack in cloud[J]. Cluster Computing, 2019, 22(5): 10615-10623.
[6] 杨盾, 王小鹏. 应对DDoS攻击的SDN网络安全特性研究[J]. 软件, 2018, 39(3): 175-180.
[7] 陆悠, 奚雪峰, 吴宏杰, 等. 基于拓扑划分的SDN多控制器部署方法[J]. 计算机应用研究, 2017, 34(11): 3388-3393.
[8] AMBROSIN M, CONTI M, DE GASPARI F, et al. LineSwitch[J]. IEEE/ACM Transactions on Networking(TON), 2017, 25(2): 1206-1219.
[9] LATAH M, TOKER L. A novel intelligent approach for detecting DoS flooding attacks in software-defined networks[J]. International Journal of Advances in Intelligent Informatics, 2018, 4(1): 11-20.
[10] LI H D, WEI F, HU H X. Enabling dynamic network access control with anomaly-based IDS and SDN[J]. Security in Software Defined Networks & Network Function Virtualization, 2019: 13-16.
[11] LATIF Y A, MOUSA H M, MAHMOUD H. Improved DDoS detection utilizing deep neural networks and feedforward neural networks as autoencoder[J]. Future Internet, 2022, 14(8): 240.
[12] 田俊峰, 齐鎏岭. SDN中基于条件熵和GHSOM的DDoS攻击检测方法[J]. 通信学报, 2018, 39(8): 140-149.
[13] LI Z Y, XING W J, SAMER K, et al. Detecting saturation attacks based on self-similarity of OpenFlow traffic[J]. IEEE Transactions on Network and Service Management, 2020, 17(1): 607-621.
[14] KHAMAISEH S, SERRA E, LI Z Y, et al. Detecting saturation attacks in SDN via machine learning[C]//2019 4th International Conference on Computing, Communications and Security(ICCCS). Rome: IEEE, 2019: 1-8.
[15] KHAMAISEH S Y, ALSMADI I, AL-ALAJ A. Deceiving machine learning-based saturation attack detection systems in SDN[C]//2020 IEEE Conference on Network Function Virtualization and Software Defined Networks(NFV-SDN). Leganes: IEEE, 2020: 44-50.
(责任编辑:谭晓荷)