[1] |
KUMAR M J, MISHRA S, ELANGOVAN G R, et al. Bayesian Decision Model Based Reliable Route Formation in Internet of Things[J]. Indonesian Journal of Electrical Engineering and Computer Science, 2024, 34(3): 1677-1685.
|
[2] |
DOULIGERIS C, MITROKOTSA A. DDoS Attacks and Defense Mechanisms: Classification and State-of-the-Art[J]. Computer Networks, 2004, 44(5): 643-666.
|
[3] |
KUMARI P, JAIN A K. A Comprehensive Study of DDoS Attacks over IoT Network and their Countermeasures[EB/OL]. (2022-01-13)[2024-10-11]. https://www.sciencedirect.com/science/article/abs/pii/S0167404823000068.
|
[4] |
DEHKORDI A B, SOLTANAGHAEI M R, BOROUJENI F Z. The DDoS Attacks Detection through Machine Learning and Statistical Methods in SDN[J]. The Journal of Supercomputing, 2021, 77(3): 2383-2415.
|
[5] |
HE Qiang, WANG Cheng, CUI Guangming, et al. A Game-Theoretical Approach for Mitigating Edge DDoS Attack[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 19(4): 2333-2348.
|
[6] |
AHUJA N, SINGAL G, MUKHOPADHYAY D, et al. Automated DDoS Attack Detection in Software Defined Networking[EB/OL]. (2021-05-19)[2024-10-11]. https://www.sciencedirect.com/science/article/abs/pii/S1084804521001296.
|
[7] |
SHAFIQ M, TIAN Zhihong, BASHIR A K, et al. CorrAUC: A Malicious BOT-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques[J]. IEEE Internet of Things Journal, 2020, 8(5): 3242-3254.
|
[8] |
GUO Yutong, GAO Yang, WANG Yan, et al. DPI & DFI: A Malicious Behavior Detection Method Combining Deep Packet Inspection and Deep Flow Inspection[J]. Procedia Engineering, 2017, 174: 1309-1314.
|
[9] |
PARRA G D L T, RAD P, CHOO K K R. Implementation of Deep Packet Inspection in Smart Grids and Industrial Internet of Things: Challenges and Opportunities[J]. Journal of Network and Computer Applications, 2019, 135: 32-46.
|
[10] |
WEI Bing, XU Zhen. Defense Approach against Application Level DDoS Attacks Based on Authentication Mechanism[J]. Computer Engineering and Design, 2010, 31(2): 231-234.
|
|
魏冰, 徐震. 基于验证机制的应用层 DDoS 攻击防御方法[J]. 计算机工程与设计, 2010, 31(2): 231-234.
|
[11] |
DEVI S R, YOGESH P. An Effective Approach to Counter Application Layer DDoS Attacks[C]// IEEE. 2012 the Third International Conference on Computing, Communication and Networking Technologies (ICCCNT’12). New York: IEEE, 2012: 1-4.
|
[12] |
ELSAYED M S, LE-KHAC N A, AZER M A, et al. A Flow-Based Anomaly Detection Approach with Feature Selection Method against DDoS Attacks in SDNs[J]. IEEE Transactions on Cognitive Communications and Networking, 2022, 8(4): 1862-1880.
|
[13] |
YU Bowen. Research and Implementation of Key Technologies of Intrusion Detection Based on DPI and GAN[D]. Nanjing: Nanjing University of Posts and Telecommunications, 2021.
|
|
于博文. 基于深度包检测和生成对抗网络的入侵检测关键技术研究与实现[D]. 南京: 南京邮电大学, 2021.
|
[14] |
SAINZ M, GARITANO I, ITURBE M, et al. Deep Packet Inspection for Intelligent Intrusion Detection in Software-Defined Industrial Networks: A Proof of Concept[J]. Logic Journal of the IGPL, 2020, 28(4): 461-472.
|
[15] |
BISWAS R, KIM S, WU Jie. Sampling Rate Distribution for Flow Monitoring and DDoS Detection in Datacenter[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 2524-2534.
|
[16] |
SONG Wenguang, BESHLEY M, PRZYSTUPA K, et al. A Software Deep Packet Inspection System for Network Traffic Analysis and Anomaly Detection[EB/OL]. (2020-03-14)[2024-10-11]. https://www.mdpi.com/1424-8220/20/6/1637.
|
[17] |
LI Jinling, WANG Binqiang, ZHANG Zhen. Detecting App-DDoS Attacks Based on Flow Analysis[J]. Application Research of Computers, 2013, 30(2): 487-490.
|
|
李锦玲, 汪斌强, 张震. 基于流量分析的 App-DDoS 攻击检测[J]. 计算机应用研究, 2013, 30(2): 487-490.
|
[18] |
ZHANG Zhe. Research on DDoS Attack Defense System Based on Flowcleaning Strategy[D]. Xi’an: Xidian University, 2018.
|
|
张哲. 基于流量清洗策略的DDoS攻击防御系统研究[D]. 西安: 西安电子科技大学, 2018.
|
[19] |
ZHANG Qian. Exploration and Practice of Traffic Analysis Technology in Network Security Confrontation[J]. Netinfo Security, 2020(S2): 114-117.
|
|
张倩. 流量分析技术在网络安全对抗上的探索实践[J]. 信息网络安全, 2020(S2): 114-117.
|
[20] |
LIU Tao, YIN Sheng. Detection and Identification of DDoS Attacks Based on Cross Entropy in SDN Environment[J]. Computer Application and Software, 2021, 38(2): 328-333.
|
|
刘涛, 尹胜. SDN环境中基于交叉熵的分阶段DDoS攻击检测与识别[J]. 计算机应用与软件, 2021, 38(2): 328-333.
|