參考文獻 |
[1] (2018). Software-defined networking [Online]. Available: https://en.wikipedia.org/wiki/Software-defined_networking.
[2] E. T. S. I. (ETSI). Network Functions Virtualisation (NFV) Architectural Framework [Online]. Available: http://www.etsi.org/deliver/etsi_gs/nfv/001_099/002/01.01.01_60/gs_nfv002v010101p.pdf.
[3] Link Layer Discovery Protocol [Online]. Available: https://en.wikipedia.org/wiki/Link_Layer_Discovery_Protocol.
[4] OpenFlow Discovery Protocol [Online]. Available: https://groups.geni.net/geni/wiki/OpenFlowDiscoveryProtocol.
[5] RYU SDN Controller [Online]. Available: https://osrg.github.io/ryu/.
[6] Floodlight SDN Controller [Online]. Available: http://www.projectfloodlight.org/floodlight/.
[7] OpenDayLight SDN Controller [Online]. Available: https://www.opendaylight.org/.
[8] POX SDN Controller [Online]. Available: https://github.com/brandonheller/riplpox.
[9] S. Hong, L. Xu, H. Wang, and G. Gu, "Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures," in NDSS, 2015, vol. 15, pp. 8-11.
[10] T. Alharbi, M. Portmann, and F. Pakzad, "The (in) security of topology discovery in software defined networks," in 2015 IEEE 40th Conference on Local Computer Networks (LCN), 2015: IEEE, pp. 502-505.
[11] D. Smyth, S. McSweeney, D. O′Shea, and V. Cionca, "Detecting link fabrication attacks in software-defined networks," in 2017 26th International Conference on Computer Communication and Networks (ICCCN), 2017: IEEE, pp. 1-8.
[12] A. Azzouni, N. T. M. Trang, R. Boutaba, and G. Pujolle, "Limitations of openflow topology discovery protocol," in 2017 16th Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2017: IEEE, pp. 1-3.
[13] A. Azzouni, R. Boutaba, N. T. M. Trang, and G. Pujolle, "sOFTDP: Secure and efficient topology discovery protocol for SDN," arXiv preprint arXiv:1705.04527, 2017.
[14] A. Nehra, M. Tripathi, M. S. Gaur, R. B. Battula, and C. Lal, "SLDP: A secure and lightweight link discovery protocol for software defined networking," Computer Networks, vol. 150, pp. 102-116, 2019.
[15] M. J. Allen and W. M. Yen, Introduction to measurement theory. Waveland Press, 2001.
[16] P4 (Programming Protocol-Independent Packet Processors) [Online]. Available: https://p4.org/.
[17] O. N. Foundation. Stratum [Online]. Available: https://www.opennetworking.org/stratum/.
[18] O. N. Foundation. ONOS - A new carrier-grade SDN network operating system designed for high availability, performance, scale-out. [Online]. Available: https://onosproject.org/.
[19] N. McKeown et al., "OpenFlow: enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008.
[20] A. Shalimov, D. Zuikov, D. Zimarina, V. Pashkov, and R. Smeliansky, "Advanced study of SDN/OpenFlow controllers," in Proceedings of the 9th central & eastern european software engineering conference in russia, 2013: ACM, p. 1.
[21] A. Azzouni, O. Braham, T. M. T. Nguyen, G. Pujolle, and R. Boutaba, "Fingerprinting OpenFlow controllers: The first step to attack an SDN control plane," in 2016 IEEE Global Communications Conference (GLOBECOM), 2016: IEEE, pp. 1-6.
[22] H. Zhang, Z. Cai, Q. Liu, Q. Xiao, Y. Li, and C. F. Cheang, "A survey on security-aware measurement in SDN," Security and Communication Networks, vol. 2018, 2018.
[23] H. Zimmermann, "OSI reference model-the ISO model of architecture for open systems interconnection," IEEE Transactions on communications, vol. 28, no. 4, pp. 425-432, 1980.
[24] V. Z. Attar and P. Chandwadkar, "Network discovery protocol lldp and lldp-med," International Journal of Computer Applications, vol. 1, no. 9, pp. 93-97, 2010.
[25] K. Benton, L. J. Camp, and C. Small, "OpenFlow vulnerability assessment," in Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking, 2013: ACM, pp. 151-152.
[26] T.-H. Nguyen and M. Yoo, "Analysis of link discovery service attacks in SDN controller," in 2017 International Conference on Information Networking (ICOIN), 2017: IEEE, pp. 259-261.
[27] O. Network, "Network functions virtualization, an introduction, benefits, enablers, challenges and call for action," SDN OpenFlow SDN OpenFlow World Congr, 2012.
[28] J. Networks, "What is Network Functions Virtualization?."
[29] B. Lantz, B. Heller, and N. McKeown, "A network in a laptop: rapid prototyping for software-defined networks," in Proceedings of the 9th ACM SIGCOMM Workshop on Hot Topics in Networks, 2010: ACM, p. 19.
[30] N. Handigol, B. Heller, V. Jeyakumar, B. Lantz, and N. McKeown, "Reproducible network experiments using container-based emulation," in Proceedings of the 8th international conference on Emerging networking experiments and technologies, 2012: ACM, pp. 253-264.
[31] R. Taylor, "Interpretation of the correlation coefficient: a basic review," Journal of diagnostic medical sonography, vol. 6, no. 1, pp. 35-39, 1990.
[32] J. Benesty, J. Chen, Y. Huang, and I. Cohen, "Pearson correlation coefficient," in Noise reduction in speech processing: Springer, 2009, pp. 1-4.
[33] L. Myers and M. J. Sirois, "Spearman correlation coefficients, differences between," Encyclopedia of statistical sciences, vol. 12, 2004.
[34] J. Laurikkala, M. Juhola, E. Kentala, N. Lavrac, S. Miksch, and B. Kavsek, "Informal identification of outliers in medical data," in Fifth international workshop on intelligent data analysis in medicine and pharmacology, 2000, vol. 1, pp. 20-24.
[35] D. J. Hamad, K. G. Yalda, and I. T. Okumus, "Getting traffic statistics from network devices in an SDN environment using OpenFlow," Information Technology and Systems, pp. 951-956, 2015.
[36] A. Nicolae, L. Gheorghe, M. Carabas, N. Tapus, and C.-L. Duta, "LLDP packet generator," in 2015 14th RoEduNet International Conference-Networking in Education and Research (RoEduNet NER), 2015: IEEE, pp. 7-11.
[37] T. T. Group. The TCPdump Network Dissector [Online]. Available: https://github.com/the-tcpdump-group/tcpdump.
[38] Pcap editing and replay tools for *NIX and Windows [Online]. Available: https://github.com/appneta/tcpreplay.
[39] D. Cousineau and S. Chartier, "Outliers detection and treatment: a review," International Journal of Psychological Research, vol. 3, no. 1, pp. 58-67, 2010. |