Page 434 - 《软件学报》2025年第8期
P. 434
武文浩 等: 可编程数据平面 DDoS 检测与防御机制 3857
[31] Musumeci F, Ionata V, Paolucci F, Cugini F, Tornatore M. Machine-learning-assisted DDoS attack detection with P4 language. In: Proc.
of the 2020 IEEE Int’l Conf. on Communications (ICC 2020). Dublin: IEEE, 2020: 1–6. [doi: 10.1109/ICC40277.2020.9149043]
[32] Gupta A, Harrison R, Canini M, Feamster N, Rexford J, Willinger W. Sonata: Query-driven streaming network telemetry. In: Proc. of the
2018 Conf. of the ACM Special Interest Group on Data Communication. Budapest: Association for Computing Machinery, 2018.
357–371. [doi: 10.1145/3230543.3230555]
[33] Ding DM, Savi M, Siracusa D. Tracking normalized network traffic entropy to detect DDoS attacks in P4. IEEE Trans. on Dependable
and Secure Computing, 2022, 19(6): 4019–4031. [doi: 10.1109/TDSC.2021.3116345]
[34] Liu XJ, Shang LS, Fang XJ, Lu XB. Distributed denial of service attack detection based on programming protocol-independent packet
processors. Application Research of Computers, 2022, 39(7): 2149–2155 (in Chinese with English abstract). [doi: 10.19734/j.issn.1001-
3695.2021.12.0661]
[35] Hoque N, Bhattacharyya DK, Kalita JK. Botnet in DDoS attacks: Trends and challenges. IEEE Communications Surveys & Tutorials,
2015, 17(4): 2242–2270. [doi: 10.1109/COMST.2015.2457491]
[36] Nooribakhsh M, Mollamotalebi M. A review on statistical approaches for anomaly detection in DDoS attacks. Information Security
Journal: A Global Perspective, 2020, 29(3): 118–133. [doi: 10.1080/19393555.2020.1717019]
[37] Clausius R. Ueber verschiedene für die Anwendung bequeme Formen der Hauptgleichungen der mechanischen Wärmetheorie. Annalen
der Physik, 1865, 201(7): 353–400.
[38] Shannon CE. A mathematical theory of communication. The Bell System Technical Journal, 1948, 27(3): 379–423. [doi: 10.1002/j.1538-
7305.1948.tb01338.x]
[39] Ding DM, Savi M, Pederzolli F, Campanella M, Siracusa D. In-network volumetric DDoS victim identification using programmable
commodity switches. IEEE Trans. on Network and Service Management, 2021, 18(2): 1191–1202. [doi: 10.1109/TNSM.2021.3073597]
附中文参考文献:
[34] 刘向举, 尚林松, 方贤进, 路小宝. 基于可编程协议无关报文处理的分布式拒绝服务攻击检测. 计算机应用研究, 2022, 39(7):
2149–2155. [doi: 10.19734/j.issn.1001-3695.2021.12.0661]
武文浩(2000-), 男, 硕士生, CCF 学生会员, 主 李恩晗(1998-), 女, 硕士, 主要研究领域为网络
要研究领域为网络安全, 可编程网络与系统. 测量, 全网联合测量.
张磊磊(1997-), 男, 硕士, 主要研究领域为网络 周建二(1986-), 男, 博士, 副研究员, 主要研究
测量, 可编程网络. 领域为网络测量, 网络性能优化, 云计算虚拟
网络.
潘恒(1990-), 男, 博士, 副研究员, 主要研究领 李振宇(1980-), 男, 博士, 研究员, 博士生导师,
域为可编程网络与系统. CCF 专业会员, 主要研究领域为网络传输, 网络
测量, 网络人工智能.

