參考文獻 |
[1] Wikipedia, Denial of Service attack [Online]. Available: https://en.wikipedia.org/wiki/Denial_of_Service_attack.
[2] Wikipedia, Intrusion detection system [Online]. Available: https://en.wikipedia.org/wiki/Intrusion_detection_system.
[3] Botnet - Definition - Trend Micro USA [Online]. Available: https://www.trendmicro.com/vinfo/us/security/definition/botnet.
[4] Introduction DDoS Attacks [Online]. Available: http://www.cc.ntu.edu.tw/chinese/epaper/0026/20130920_2606.html.
[5] GitHub survived the biggest DDoS attack ever recorded [Online]. Available: https://www.wired.com/story/github-ddos-memcached/.
[6] R. Zhuang, S. Zhang, A. Bardas, S. A. DeLoach, X. Ou, and A. Singhal, "Investigating the application of moving target defenses to network security," in 2013 6th International Symposium on Resilient Control Systems (ISRCS), 2013: IEEE, pp. 162-169.
[7] R. Zhuang, A. G. Bardas, S. A. DeLoach, and X. Ou, "A theory of cyber attacks: A step towards analyzing MTD systems," in Proceedings of the Second ACM Workshop on Moving Target Defense, 2015: ACM, pp. 11-20.
[8] C. Guilin, W. Baosheng, W. Tianzuo, L. Yuebin, W. Xiaofeng, and C. Xinwu, "Research and development of moving target defense technology," Journal of Computer Research and Development, vol. 53, no. 5, pp. 968-987, 2016.
[9] S. Jajodia, A. K. Ghosh, V. Swarup, C. Wang, and X. S. Wang, Moving target defense: creating asymmetric uncertainty for cyber threats. Springer Science & Business Media, 2011.
[10] M. Azab, R. Hassan, and M. Eltoweissy, "ChameleonSoft: a moving target defense system," in 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2011: IEEE, pp. 241-250.
[11] Address space layout randomization [Online]. Available: https://en.wikipedia.org/wiki/Address_space_layout_randomization.
[12] A. K. Bangalore and A. K. Sood, "Securing web servers using self cleansing intrusion tolerance (scit)," in 2009 Second International Conference on Dependability, 2009: IEEE, pp. 60-65.
[13] H. Okhravi, A. Comella, E. Robinson, and J. Haines, "Creating a cyber moving target for critical infrastructure applications using platform diversity," International Journal of Critical Infrastructure Protection, vol. 5, no. 1, pp. 30-39, 2012.
[14] P. Wood, C. Gutierrez, and S. Bagchi, "Denial of service elusion (DoSE): Keeping clients connected for less," in 2015 IEEE 34th Symposium on Reliable Distributed Systems (SRDS), 2015: IEEE, pp. 94-103.
[15] Wikipedia, Content Delivery Network [Online]. Available: https://en.wikipedia.org/wiki/Content_delivery_network.
[16] Wikipedia, Internet Engineering Task Force [Online]. Available: https://en.wikipedia.org/wiki/Internet_Engineering_Task_Force.
[17] Wikipedia, Software-defined networking [Online]. Available: https://en.wikipedia.org/wiki/Software-defined_networking.
[18] Wikipedia, Open Networking Foundation [Online]. Available: https://en.wikipedia.org/wiki/Open_Networking_Foundation.
[19] N. McKeown et al., "OpenFlow: enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.
[20] Ryu component-based software defined networking framework [Online]. Available: https://github.com/osrg/ryu.
[21] J. H. Jafarian, E. Al-Shaer, and Q. Duan, "Openflow random host mutation: transparent moving target defense using software defined networking," in Proceedings of the first workshop on Hot topics in software defined networks, 2012: ACM, pp. 127-132.
[22] 黃柏勝, "基於SDN、NFV與移動目標防禦之分散式阻斷服務攻擊防禦機制," 碩士, 資訊工程學系, 國立中央大學, 桃園縣, 2017.
[23] Wikipedia, NetFlow [Online]. Available: https://en.wikipedia.org/wiki/NetFlow.
[24] H. BENADDI, K. IBRAHIMI, and A. BENSLIMANE, "Improving the Intrusion Detection System for NSL-KDD Dataset based on PCA-Fuzzy Clustering-KNN," in 2018 6th International Conference on Wireless Networks and Mobile Communications (WINCOM), 2018: IEEE, pp. 1-6.
[25] M. Ring, S. Wunderlich, D. Grüdl, D. Landes, and A. Hotho, "Flow-based benchmark data sets for intrusion detection," in Proceedings of the 16th European Conference on Cyber Warfare and Security. ACPI, 2017, pp. 361-369.
[26] OpenStack [Online]. Available: https://www.openstack.org/.
[27] KDD Cup 1999 Dataset [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/.
[28] NSL-KDD dataset [Online]. Available: https://www.unb.ca/cic/datasets/nsl.html.
[29] The CTU-13 Dataset. A Labeled Dataset with Botnet, Normal and Background traffic [Online]. Available: https://www.stratosphereips.org/datasets-ctu13.
[30] V. Jyothi, X. Wang, S. K. Addepalli, and R. Karri, "Brain: Behavior based adaptive intrusion detection in networks: Using hardware performance counters to detect ddos attacks," in 2016 29th International Conference on VLSI Design and 2016 15th International Conference on Embedded Systems (VLSID), 2016: IEEE, pp. 587-588.
[31] M. Zekri, S. El Kafhali, N. Aboutabit, and Y. Saadi, "DDoS attack detection using machine learning techniques in cloud computing environments," in 2017 3rd International Conference of Cloud Computing Technologies and Applications (CloudTech), 2017: IEEE, pp. 1-7.
[32] Snort - Network Intrusion Detection & Prevention System [Online]. Available: https://www.snort.org.
[33] Technical Report CIDDS-001 data set [Online]. Available: https://www.hs-coburg.de/fileadmin/hscoburg/Forschung/WISENT_cidds_Technical_Report.pdf.
[34] Wikipedia, Activation function [Online]. Available: https://en.wikipedia.org/wiki/Activation_function.
[35] Ryu SDN Framework [Online]. Available: https://osrg.github.io/ryu/.
[36] Open vSwitch [Online]. Available: https://www.openvswitch.org/.
[37] Docker: Enterprise Application Container Platform [Online]. Available: https://www.docker.com/.
[38] NGINX | High Performance Load Balancer, Web Server, & Reverse Proxy [Online]. Available: https://www.nginx.com/.
[39] Bmon: bandwidth monitor and rate estimator [Online]. Available: https://github.com/tgraf/bmon.
[40] Softflowd: A flow-based network traffic analyser capable of Cisco NetFlow data export software [Online]. Available: https://github.com/irino/softflowd.
[41] iPerf - Download iPerf3 and original iPerf pre-compiled binaries [Online]. Available: https://iperf.fr/iperf-download.php.
[42] hping3 | Penetration Testing Tools [Online]. Available: https://tools.kali.org/information-gathering/hping3.
[43] cURL [Online]. Available: https://en.wikipedia.org/wiki/CURL.
[44] Tcpreplay - Pcap editing and replaying utilities [Online]. Available: https://tcpreplay.appneta.com/.
[45] Hydra: Penetration testing tool [Online]. Available: https://github.com/vanhauser-thc/thc-hydra. |