|
[1] Siti Hajar Aminah Ali, Seiichi Ozawa, Tao Ban, Junji Nakazato and Jumpei Shimamura,"A neural network model for detecting DDoS attacks using darknet traffic features," 2016 International Joint Conference on Neural Networks (IJCNN), pp.2979-2985, Vancouver, Canada, July 2016. [2] Walter Fuertes, Miguel Morales, Hernán Aules and Theofilos Toulkeridis," Software-based computing platform as an experimental topology assembled to detect and mitigate DDoS attacks using virtual environments," 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp.1-8, Montreal, Quebe, Canada, July 2016. [3] D. Mcdysan, "Software defined networking opportunities for transport," IEEE Communications Magazine 51.3 (2013): 28-31. [4] Wikipedia, "Network Function Virtualization",2017.[Online].Aailable: https://en.wikipedia.org/wiki/Network_function_virtualization .[Accessed: 19- Jul- 2017] [5] Jin B. Hong and Dong Seong Kim,"Assessing the Effectiveness of Moving Target Defenses Using Security Models," IEEE Transactions on Dependable and Secure Computing, Volume 13, Issue 2, pp.163-177, 2016. [6] Sachin Kailas Bhop and Nilima M. Dongre,"Study of Dynamic Defense technique to overcome drawbacks of movingtarget defense," 2015 International Conference on Information Processing (ICIP), pp.637-641, Quebec city, Canada, Dec. 2015. [7] Wikipedia, “2016 Dyn cyberattack", 2017. [Online]. Aailable: https://en.wikipedia.org/wiki/2016_Dyn_cyberattack .[Accessed: 19- Jul- 2017] [8] Cisco, "Cisco DDos Protection Solution-Delivering “Clean Pipes” Capabilities for Service Providers and Their Customers", Cisco Systems White Paper, pp.4-16, 2016. [9] Cai Guilin, Wang Baosheng, Wang Tianzuo, Luo Yuebin, Wang Xiaofeng and Cui Xinwu, "Research and Development of Moving Target Defense Technology",Journal of Computer Research and Development, volume 53, Issue (5) pp.1,China, 2016. [10] Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang. "Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" (1st ed.). Springer Publishing Company, Incorporated,Berlin, 2011. [11] Rui Zhuang, Su Zhang, Alexandru G. Bardas, Scott A. DeLoach, Xinming Ou, and Anoop Singhal." Investigating the application of moving target defenses to network security," 6th International Symposium on Resilient Control Systems (ISRCS), San Francisco, CA, August, 2013. [12] Rui Zhuang, Alexandru G. Bardas, Scott A. Deloach, and Xinming Ou."A Theory of Cyber Attacks -- A Step Towards Analyzing MTD Systems," In CCS 2015 MTD Workshop, Denver, CO, US, October, 2015. [13] Mohamed Azab, Riham Hassan and Mohamed Eltoweissy, "ChameleonSoft: A moving target defense system", Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011 7th International Conference on, Orlando, USA, 2012. [14] Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, and X. Sean Wang. "Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats" (1st ed.).pp.77-98 Springer Publishing Company, Incorporated, Berlin, 2011. [15] Wikipedia, “Address space layout randomization", 2017. [Online]. Aailable: https://en.wikipedia.org/wiki/Address_space_layout_randomization.[Accessed: 19- Jul- 2017] [16] S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. "Defending against hitlist worms using network address space randomization". In Proceedings of the 2005 ACM workshop on Rapid malcode (WORM '05). ACM, New York, NY, USA, 30-40. 2005. [17] H.C.J. Lee, V.L.L. Thing, "Port hopping for resilient networks", Vehicular Technology Conference, 2004. VTC2004-Fall. 2004 IEEE 60th, Los Angeles, USA,2005. [18] Quan Jia, Kun Sun and Angelos Stavrou. "MOTAG: Moving Target Defense against Internet Denial of Service Attacks", Computer Communications and Networks (ICCCN), 2013 22nd International Conference on, Nassau, Bahamas,2013. [19] Paul Wood, Christopher Gutierrez and Saurabh Bagchi, "Denial of Service Elusion (DoSE): Keeping Clients Connected for Less",Reliable Distributed Systems (SRDS), 2015 IEEE 34th Symposium on, Montreal, Canada.2015. [20] D. M. Gabbay, Classical vs Non-classical Logics -- The Universality of Classical Logic, 2 ed.: Oxford University Press, Inc. New York, NY, USA, 1993. [21] L. A. Zadeh, "Fuzzy sets.," Information and Control, vol. 8, pp. 338-535. [22] R. Seising, E. Trillas, C. Moraga, and S. Termini, On fuzziness : a homage to Lotfi A. Zadeh. Heidelberg ; New York: Springer, 2013. [23] J. T. Tou, "Pattern Recognition Principles," in Classification Methods for Remotely Sensed Data, 2 ed: CRC Press, 2009, pp. 41-75. [24] 蘇木春 and 張孝德, 機器學習:類神經網路、模糊系統以及基因演算法則: 全華圖書股份有限公司, 2012. [25] N.Ch.S.N. Iyengar, Arindam Banerjee and Gopinath Ganapathy , "A Fuzzy Logic Based Defense Mechanism against Distributed Denial of Services Attack in Cloud Environment", International Journal Of Communication Networks And Information Security, vol 6, No 3,India,2014. [26] Phan Van Trung, Truong Thu Huong, Dang Van Tuyen, Duong Minh Duc, Nguyen Huu Thanh and Alan Marshall, "A multi-criteria-based DDoS-attack prevention solution using software defined networking", Advanced Technologies for Communications (ATC), 2015 International Conference on, Ho Chi Minh City, Vietnam,2015. [27] IETF, "The Internet Engineering Task Force (IETF®)", 2017. [Online]. Aailable:,https://www.ietf.org/.[Accessed: 19- Jul- 2017] [28] ONF,"OpenNetworkFoundation",2017.[Online].Aailable:https://www.opennetworking.org/ .[Accessed: 19- Jul- 2017] [29] N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: enabling innovation in campus networks,” SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69–74, Mar. 2008. [30] Ryu."Ryu SDN Framework",2017.[Online].Aailable: https://osrg.github.io/ryu/. [Accessed: 19- Jul- 2017] [31] Margaret Chiosi, Don Clarke, Peter Willis, Andy Reid et al., "Network Functions Virtualisation – Introductory White Paper", SDN and OpenFlow World Congress, Darmstadt, Germany, 2012. [32] Wikipedia,”Censorship of GitHub”, 2017. [Online]. Aailable: https://en.wikipedia.org/wiki/Censorship_of_GitHub#DDoS_attack. [Accessed: 19- Jul- 2017] [33] ArsTechnica,” GitHub battles “largest DDoS” in site’s history, targeted at anti-censorship tools”, 2017. [Online]. https://arstechnica.com/information-technology/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/[Accessed: 19- Jul- 2017] [34] S. Yadav and S. Subramanian, “Detection of Application Layer DDoS attack by feature learning using Stacked AutoEncoder”, Computational Science and Engineering (CSE) and Embedded and Ubiquitous Computing (EUC), Guangzhou, China, 2017.
|