Page 434 - 《软件学报》2025年第8期
P. 434

武文浩 等: 可编程数据平面       DDoS  检测与防御机制                                              3857


                 [31]  Musumeci F, Ionata V, Paolucci F, Cugini F, Tornatore M. Machine-learning-assisted DDoS attack detection with P4 language. In: Proc.
                     of the 2020 IEEE Int’l Conf. on Communications (ICC 2020). Dublin: IEEE, 2020: 1–6. [doi: 10.1109/ICC40277.2020.9149043]
                 [32]  Gupta A, Harrison R, Canini M, Feamster N, Rexford J, Willinger W. Sonata: Query-driven streaming network telemetry. In: Proc. of the
                     2018  Conf.  of  the  ACM  Special  Interest  Group  on  Data  Communication.  Budapest:  Association  for  Computing  Machinery,  2018.
                     357–371. [doi: 10.1145/3230543.3230555]
                 [33]  Ding DM, Savi M, Siracusa D. Tracking normalized network traffic entropy to detect DDoS attacks in P4. IEEE Trans. on Dependable
                     and Secure Computing, 2022, 19(6): 4019–4031. [doi: 10.1109/TDSC.2021.3116345]
                 [34]  Liu XJ, Shang LS, Fang XJ, Lu XB. Distributed denial of service attack detection based on programming protocol-independent packet
                     processors. Application Research of Computers, 2022, 39(7): 2149–2155 (in Chinese with English abstract). [doi: 10.19734/j.issn.1001-
                     3695.2021.12.0661]
                 [35]  Hoque N, Bhattacharyya DK, Kalita JK. Botnet in DDoS attacks: Trends and challenges. IEEE Communications Surveys & Tutorials,
                     2015, 17(4): 2242–2270. [doi: 10.1109/COMST.2015.2457491]
                 [36]  Nooribakhsh  M,  Mollamotalebi  M.  A  review  on  statistical  approaches  for  anomaly  detection  in  DDoS  attacks.  Information  Security
                     Journal: A Global Perspective, 2020, 29(3): 118–133. [doi: 10.1080/19393555.2020.1717019]
                 [37]  Clausius R. Ueber verschiedene für die Anwendung bequeme Formen der Hauptgleichungen der mechanischen Wärmetheorie. Annalen
                     der Physik, 1865, 201(7): 353–400.
                 [38]  Shannon CE. A mathematical theory of communication. The Bell System Technical Journal, 1948, 27(3): 379–423. [doi: 10.1002/j.1538-
                     7305.1948.tb01338.x]
                 [39]  Ding DM, Savi M, Pederzolli F, Campanella M, Siracusa D. In-network volumetric DDoS victim identification using programmable
                     commodity switches. IEEE Trans. on Network and Service Management, 2021, 18(2): 1191–1202. [doi: 10.1109/TNSM.2021.3073597]

                 附中文参考文献:
                 [34]  刘向举, 尚林松, 方贤进, 路小宝. 基于可编程协议无关报文处理的分布式拒绝服务攻击检测. 计算机应用研究, 2022, 39(7):
                     2149–2155. [doi: 10.19734/j.issn.1001-3695.2021.12.0661]


                             武文浩(2000-), 男, 硕士生, CCF  学生会员, 主             李恩晗(1998-), 女, 硕士, 主要研究领域为网络
                            要研究领域为网络安全, 可编程网络与系统.                        测量, 全网联合测量.




                             张磊磊(1997-), 男, 硕士, 主要研究领域为网络                 周建二(1986-), 男, 博士, 副研究员, 主要研究
                            测量, 可编程网络.                                   领域为网络测量, 网络性能优化, 云计算虚拟
                                                                         网络.



                             潘恒(1990-), 男, 博士, 副研究员, 主要研究领                李振宇(1980-), 男, 博士, 研究员, 博士生导师,
                            域为可编程网络与系统.                                  CCF  专业会员, 主要研究领域为网络传输, 网络
                                                                         测量, 网络人工智能.
   429   430   431   432   433   434   435   436   437   438   439