Page 433 - 《软件学报》2025年第8期
P. 433
3856 软件学报 2025 年第 36 卷第 8 期
Fundamentals, advances, and applied research. Journal of Network and Computer Applications, 2023, 212: 103561. [doi: 10.1016/j.jnca.
2022.103561]
[9] Bosshart P, Daly D, Gibb C, Izzard M, McKeown N, Rexford J, Schlesinger C, Talayco D, Vahdat A, Varghese G, Walker D. P4:
Programming protocol-independent packet processors. ACM SIGCOMM Computer Communication Review, 2014, 44(3): 87–95. [doi:
10.1145/2656877.2656890]
[10] Liu ZX, Namkung H, Nikolaidis G, Lee J, Kim C, Jin X, Braverman V, Yu ML, Sekar V. Jaqen: A high-performance switch-native
approach for detecting and mitigating volumetric DDoS attacks with programmable switches. In: Proc. of the 30th USENIX Security
Symp. (USENIX Security 2021). Vancouver: USENIX Association, 2021. 3829–3846.
[11] da Silveira Ilha A, Lapolli ÂC, Marques JA, Gaspary LP. Euclid: A fully in-network, p4-based approach for real-time DDoS attack
detection and mitigation. IEEE Trans. on Network and Service Management, 2021, 18(3): 3121–3139. [doi: 10.1109/TNSM.2020.
3048265]
[12] GitHub: Behavioral model (BMv2). 2024. https://github.com/p4lang/behavioral-model
[13] Erhan D, Anarım E. Boğaziçi University distributed denial of service dataset. Data in Brief, 2020, 32: 106187. [doi: 10.1016/j.dib.2020.
106187]
[14] McKeown N, Anderson T, Balakrishnan H, Parulkar G, Peterson L, Rexford J, Shenker S, Turner J. OpenFlow: Enabling innovation in
campus networks. ACM SIGCOMM Computer Communication Review, 2008, 38(2): 69–74. [doi: 10.1145/1355734.1355746]
[15] Open Tofino. 2024. https://github.com/barefootnetworks/open-tofino
[16] Cormode G. Count-Min Sketch. In: Kao MY, ed. Encyclopedia of Algorithms. New York: Springer, 2016. 464–468. [doi: 10.1007/978-1-
4939-2864-4_579]
[17] Phaal P, Panchen S, McKee N. InMon corporation’s sFlow: A method for monitoring traffic in switched and routed networks. RFC 3186,
Internet Engineering Task Force, 2001.
[18] Claise B. Cisco systems NetFlow services export version 9. RFC 3954. Internet Engineering Task Force, 2004.
[19] Hoque N, Kashyap H, Bhattacharyya DK. Real-time DDoS attack detection using FPGA. Computer Communications, 2017, 110: 48–58.
[doi: 10.1016/j.comcom.2017.05.015]
[20] Tao Y, Yu S. DDoS attack detection at local area networks using information theoretical metrics. In: Proc. of the 12th IEEE Int’l Conf. on
Trust, Security and Privacy in Computing and Communications. Melbourne: IEEE, 2013. 233–240. [doi: 10.1109/TrustCom.2013.32]
[21] Fortunati S, Gini F, Greco MS, Farina A, Graziano A, Giompapa S. An improvement of the state-of-the-art covariance-based methods for
statistical anomaly detection algorithms. Signal, Image and Video Processing, 2016, 10(4): 687–694. [doi: 10.1007/s11760-015-0796-y]
[22] Ye J, Cheng XY, Zhu J, Feng LT, Song L. A DDoS attack detection method based on SVM in software defined network. Security and
Communication Networks, 2018, 2018: 1–8. [doi: 10.1155/2018/9804061]
[23] Lakshminarasimman S, Ruswin S, Sundarakantham K. Detecting DDoS attacks using decision tree algorithm. In: Proc. of the 4th Int’l
Conf. on Signal Processing, Communication and Networking (ICSCN 2017). Chennai: IEEE, 2017. 1–6. [doi: 10.1109/ICSCN.2017.
8085703]
[24] Saied A, Overill RE, Radzik T. Detection of known and unknown DDoS attacks using Artificial Neural Networks. Neurocomputing,
2016, 172: 385–393. [doi: 10.1016/j.neucom.2015.04.101]
[25] Hou JP, Fu PP, Cao ZG, Xu AL. Machine learning based DDoS detection through NetFlow analysis. In: Proc. of the 2018 IEEE Military
Communications Conf. (MILCOM 2018). Angeles: IEEE, 2018. 1–6. [doi: 10.1109/MILCOM.2018.8599738]
[26] McDermott CD, Majdani F, Petrovski AV. Botnet detection in the internet of things using deep learning approaches. In: Proc. of the 2018
Int’l Joint Conf. on Neural Networks (IJCNN). Rio de Janeiro: IEEE, 2018. 1–8. [doi: 10.1109/IJCNN.2018.8489489]
[27] Grigoryan G, Liu YQ. LAMP: Prompt layer 7 attack mitigation with programmable data planes. In: Proc. of the 17th IEEE Int’l Symp. on
Network Computing and Applications (NCA). Cambridge: IEEE, 2018. 1–4. [doi: 10.1109/NCA.2018.8548136]
[28] Kuka M, Vojanec K, Kučera J, Benáček P. Accelerated DDoS attacks mitigation using programmable data plane. In: Proc. of the 2019
ACM/IEEE Symp. on Architectures for Networking and Communications Systems (ANCS). Cambridge: IEEE, 2019. 1–3. [doi: 10.1109/
ANCS.2019.8901882]
[29] Mi Y, Wang A. ML-pushback: Machine learning based pushback defense against DDoS. In: Proc. of the 15th Int’l Conf. on Emerging
Networking Experiments and Technologies. Orlando: Association for Computing Machinery, 2019. 80–81. [doi: 10.1145/3360468.
3368188]
[30] Kokila RT, Thamarai Selvi S, Govindarajan K. DDoS detection and analysis in SDN-based environment using support vector machine
classifier. In: Proc. of the 6th Int’l Conf. on Advanced Computing (ICoAC). Chennai: IEEE, 2014. 205–210. [doi: 10.1109/ICoAC.2014.
7229711]

