Page 433 - 《软件学报》2025年第8期
P. 433

3856                                                       软件学报  2025  年第  36  卷第  8  期


                     Fundamentals, advances, and applied research. Journal of Network and Computer Applications, 2023, 212: 103561. [doi: 10.1016/j.jnca.
                     2022.103561]
                  [9]  Bosshart  P,  Daly  D,  Gibb  C,  Izzard  M,  McKeown  N,  Rexford  J,  Schlesinger  C,  Talayco  D,  Vahdat  A,  Varghese  G,  Walker  D.  P4:
                     Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review, 2014, 44(3): 87–95. [doi:
                     10.1145/2656877.2656890]
                 [10]  Liu ZX, Namkung H, Nikolaidis G, Lee J, Kim C, Jin X, Braverman V, Yu ML, Sekar V. Jaqen: A high-performance switch-native
                     approach for detecting and mitigating volumetric DDoS attacks with programmable switches. In: Proc. of the 30th USENIX Security
                     Symp. (USENIX Security 2021). Vancouver: USENIX Association, 2021. 3829–3846.
                 [11]  da  Silveira  Ilha  A,  Lapolli  ÂC,  Marques  JA,  Gaspary  LP.  Euclid:  A  fully  in-network,  p4-based  approach  for  real-time  DDoS  attack
                     detection  and  mitigation.  IEEE  Trans.  on  Network  and  Service  Management,  2021,  18(3):  3121–3139.  [doi:  10.1109/TNSM.2020.
                     3048265]
                 [12]  GitHub: Behavioral model (BMv2). 2024. https://github.com/p4lang/behavioral-model
                 [13]  Erhan D, Anarım E. Boğaziçi University distributed denial of service dataset. Data in Brief, 2020, 32: 106187. [doi: 10.1016/j.dib.2020.
                     106187]
                 [14]  McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J. OpenFlow: Enabling innovation in
                     campus networks. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69–74. [doi: 10.1145/1355734.1355746]
                 [15]  Open Tofino. 2024. https://github.com/barefootnetworks/open-tofino
                 [16]  Cormode G. Count-Min Sketch. In: Kao MY, ed. Encyclopedia of Algorithms. New York: Springer, 2016. 464–468. [doi: 10.1007/978-1-
                     4939-2864-4_579]
                 [17]  Phaal P, Panchen S, McKee N. InMon corporation’s sFlow: A method for monitoring traffic in switched and routed networks. RFC 3186,
                     Internet Engineering Task Force, 2001.
                 [18]  Claise B. Cisco systems NetFlow services export version 9. RFC 3954. Internet Engineering Task Force, 2004.
                 [19]  Hoque N, Kashyap H, Bhattacharyya DK. Real-time DDoS attack detection using FPGA. Computer Communications, 2017, 110: 48–58.
                     [doi: 10.1016/j.comcom.2017.05.015]
                 [20]  Tao Y, Yu S. DDoS attack detection at local area networks using information theoretical metrics. In: Proc. of the 12th IEEE Int’l Conf. on
                     Trust, Security and Privacy in Computing and Communications. Melbourne: IEEE, 2013. 233–240. [doi: 10.1109/TrustCom.2013.32]
                 [21]  Fortunati S, Gini F, Greco MS, Farina A, Graziano A, Giompapa S. An improvement of the state-of-the-art covariance-based methods for
                     statistical anomaly detection algorithms. Signal, Image and Video Processing, 2016, 10(4): 687–694. [doi: 10.1007/s11760-015-0796-y]
                 [22]  Ye J, Cheng XY, Zhu J, Feng LT, Song L. A DDoS attack detection method based on SVM in software defined network. Security and
                     Communication Networks, 2018, 2018: 1–8. [doi: 10.1155/2018/9804061]
                 [23]  Lakshminarasimman S, Ruswin S, Sundarakantham K. Detecting DDoS attacks using decision tree algorithm. In: Proc. of the 4th Int’l
                     Conf.  on  Signal  Processing,  Communication  and  Networking  (ICSCN  2017).  Chennai:  IEEE,  2017.  1–6.  [doi: 10.1109/ICSCN.2017.
                     8085703]
                 [24]  Saied A, Overill RE, Radzik T. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing,
                     2016, 172: 385–393. [doi: 10.1016/j.neucom.2015.04.101]
                 [25]  Hou JP, Fu PP, Cao ZG, Xu AL. Machine learning based DDoS detection through NetFlow analysis. In: Proc. of the 2018 IEEE Military
                     Communications Conf. (MILCOM 2018). Angeles: IEEE, 2018. 1–6. [doi: 10.1109/MILCOM.2018.8599738]
                 [26]  McDermott CD, Majdani F, Petrovski AV. Botnet detection in the internet of things using deep learning approaches. In: Proc. of the 2018
                     Int’l Joint Conf. on Neural Networks (IJCNN). Rio de Janeiro: IEEE, 2018. 1–8. [doi: 10.1109/IJCNN.2018.8489489]
                 [27]  Grigoryan G, Liu YQ. LAMP: Prompt layer 7 attack mitigation with programmable data planes. In: Proc. of the 17th IEEE Int’l Symp. on
                     Network Computing and Applications (NCA). Cambridge: IEEE, 2018. 1–4. [doi: 10.1109/NCA.2018.8548136]
                 [28]  Kuka M, Vojanec K, Kučera J, Benáček P. Accelerated DDoS attacks mitigation using programmable data plane. In: Proc. of the 2019
                     ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS). Cambridge: IEEE, 2019. 1–3. [doi: 10.1109/
                     ANCS.2019.8901882]
                 [29]  Mi Y, Wang A. ML-pushback: Machine learning based pushback defense against DDoS. In: Proc. of the 15th Int’l Conf. on Emerging
                     Networking  Experiments  and  Technologies.  Orlando:  Association  for  Computing  Machinery,  2019.  80–81.  [doi:  10.1145/3360468.
                     3368188]
                 [30]  Kokila RT, Thamarai Selvi S, Govindarajan K. DDoS detection and analysis in SDN-based environment using support vector machine
                     classifier. In: Proc. of the 6th Int’l Conf. on Advanced Computing (ICoAC). Chennai: IEEE, 2014. 205–210. [doi: 10.1109/ICoAC.2014.
                     7229711]
   428   429   430   431   432   433   434   435   436   437   438