參考文獻 |
[1] “Internet of things” Accessed on: June 10, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Internet_of_things
[2] Al-Sarawi, S., Anbar, M., et al. "Internet of things market analysis forecasts, 2020–2030." 2020 Fourth World Conference on smart trends in systems, security and sustainability (WorldS4). IEEE, 2020.
[3] “Botnet” Access on: June 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Botnet
[4] Xiao, Y., Jia, Y., Liu, C., et al. "Edge computing security: State of the art and challenges." Proceedings of the IEEE 107.8 (2019): 1608-1631.
[5] Haji, S. H., Zeebaree, S. R., Saeed, R. H., et al. "Comparison of software defined networking with traditional networking." Asian Journal of Research in Computer Science (2021): 1-18.
[6] Badotra, S., and Surya N. P. "Software-defined networking: A novel approach to networks." Handbook of Computer Networks and Cyber Security. Springer, Cham, 2020. 313-339.
[7] Dabbagh, M., Hamdaoui, B., Guizani, M., et al. "Software-defined networking security: pros and cons." IEEE Communications Magazine 53.6 (2015): 73-79.
[8] Brief, O. S. "OpenFlow-enabled SDN and network functions virtualization." Open Netw. Found 17 (2014): 1-12. 2.2
[9] “Intrusion detection system” Access on: June 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Intrusion_detection_system
[10] “What Is a Host Intrusion Detection System (HIDS) and How It Works” Access on: June 11, 2022. [Online]. Available: https://heimdalsecurity.com/blog/host-intrusion-detection-system-hids/
[11] Raghunath, B. R., and Shivsharan N. M. "Network intrusion detection system (NIDS)." 2008 First International Conference on Emerging Trends in Engineering and Technology. IEEE, 2008.
[12] “About Intrusion Detection Systems in AlienVault USM Appliance” Access on: June 10, 2022. [Online]. Available: https://cybersecurity.att.com/documentation/
usm-appliance/ids-configuration/about-ids.htm
[13] “2021 SonicWall Cyber Threat Report” Access on: June 10, 2022. [Online]. Available: https://f.hubspotusercontent20.net/hubfs/2317774/2021-cyber-threat-report.pdf
[14] “Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization” Access on: June 11, 2022. [Online]. Available: https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/
[15] “The State of Industrial Cybersecurity” Access on: June 11, 2022. [Online]. Available: https://resources.trendmicro.com/rs/945-CXD-062/images/TR00_ICS_OT_Security_Survey_Report_220525US_web.pdf
[16] “New Mirai Variant Targets Enterprise Wireless Presentation & Display Systems” Access on: June 11, 2022. [Online]. Available: https://unit42.paloaltonetworks. com/new-mirai-variant-targets-enterprise-wireless-presentation-display-systems/
[17] “New Mirai Variant Targeting Network Security Devices” Access on: June 11, 2022. [Online]. Available: https://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities/
[18] “Denial-of-service attack” Access on: June 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Denial-of-service_attack
[19] Khader, R., Derar E. "Survey of DoS/DDoS attacks in IoT." Sustainable Engineering and Innovation 3.1 (2021): 23-28.
[20] Eliyan, L. F., Roberto D. P. "DoS and DDoS attacks in Software Defined Networks: A survey of existing solutions and research challenges." Future Generation Computer Systems 122 (2021): 149-171.
[21] “Man-in-the-middle attack” Access on: June 11, 2022. [Online]. Available: https://en.wikipedia.org/wiki/Man-in-the-middle_attack
[22] Conti, M., Dragoni, N., Lesyk, V. "A survey of man in the middle attacks." IEEE Communications Surveys & Tutorials 18.3 (2016): 2027-2051.
[23] Anu, P., Vimala, S. "A survey on sniffing attacks on computer networks." 2017 International Conference on Intelligent Computing and Control (I2C2). IEEE, 2017.
[24] Bosshart, P., Daly, D., Gibb, G., et al. "P4: Programming protocol-independent packet processors." ACM SIGCOMM Computer Communication Review 44.3 (2014): 87-95.
[25] “P4 – Open Network Fundation” Access on: June 11, 2022. [Online]. Available: https://opennetworking.org/p4/
[26] “P4-16 Language Specification” Accessed on: June 10, 2022. [Online]. Available: https://p4.org/p4-spec/docs/P4-16-v1.2.2.html
[27] “P4 Language Tutorial” Accessed on: June 10, 2022. [Online]. Available: https://docs.google.com/presentation/d/1zliBqsS8IOD4nQUboRRmF_19poeLLDLadD5zLzrTkVc/edit
[28] Simsek, G., Bostan, H., Sarica, A. K., et al. "Dropppp: a P4 approach to mitigating dos attacks in SDN." International Workshop on Information Security Applications. Springer, Cham, 2019.
[29] Munther, M. N., Hashim, F., Latiff, N. A. A., et al. "Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic." Egyptian Informatics Journal 23.1 (2022): 113-126.
[30] Abdulkarem, H. S., Dawod, A. "DDoS Attack Detection and Mitigation at SDN Data Plane Layer." 2020 2nd Global Power, Energy and Communication Conference (GPECOM). IEEE, 2020.
[31] Runze, C., Fangming, R., Yidan, L., Lan, Y., et al. "A Simple DDoS Defense Method Based SDN." 2021 IEEE 15th International Conference on Anti-counterfeiting, Security, and Identification (ASID). IEEE, 2021.
[32] Krishnan, S., Oliver, J. J. E. "Mitigating DDoS Attacks in Software Defined Networks." 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2019.
[33] Lapolli, Â. C., Marques, J. A., Gaspary, L. P. "Offloading real-time DDoS attack detection to programmable data planes." 2019 IFIP/IEEE Symposium on Integrated Network and Service Management (IM). IEEE, 2019.
[34] Tul, H. H. Flooding Attack Detection and Defense Mechanism Based on P4 Switches and Intrusion Detection System, Master thesis from Department of Computer Science & Information Engineering, National Central University, Taiwan (2020)
[35] Salvador, S., Chan, P. "Toward accurate dynamic time warping in linear time and space." Intelligent Data Analysis 11.5 (2007): 561-580.
[36] Csillik, O., Belgiu, M., Asner, G. P., et al. "Object-based time-constrained dynamic time warping classification of crops using Sentinel-2." Remote sensing 11.10 (2019): 1257.
[37] “gRPC”, Accessed on: June 10, 2022. [Online]. Available: https://grpc.io/
[38] “Protocol Buffers - Google′s data interchange format”, Accessed on: June 10, 2022. [Online]. Available: https://github.com/protocolbuffers/protobuf
[39] “OSI Model”, Accessed on: June 10, 2022. [Online]. Available: https://en.wikipedia.org/wiki/OSI_model
[40] “IEEE Ethertype – standards ”, Accessed on June 10, 2022. [Online]: Available: https://standards-oui.ieee.org/ethertype/eth.txt
[41] Halpern, J., Carlos P. “Service function chaining (SFC) architecture.” No. rfc7665. 2015.
[42] “BEHAVIORAL MODEL (bmv2)”, Accessed on: June 12, 2022. [Online]. https://github.com/p4lang/behavioral-model
[43] “Snort – Network Intrusion Detection & Prevention System”, Accessed on: June 12, 2022. [Online]. https://www.snort.org/
[44] “Scapy”, Accessed on: June 12, 2022. [Online]. https://github.com/secdev/scapy
[45] “Wireshark Go Deep”, Accessed on: June 12, 2022. [Online]. https://www.wireshark.org/
[46] “Kick Devices Off Your Network”, Accessed on: June 12, 2022. [Online]. Available: https://github.com/k4m4/kickthemout
[47] “hping3(8) - Linux man page”, Accessed on: June 12, 2022. [Online]. Available: https://linux.die.net/man/8/hping3
[48] Muhamad, R. M., On Supporting Large Neural Networks Model Implementation in Programmable Data Plane , Master thesis from Department of Computer Science & Information Engineering, National Central University, Taiwan (2020) |