[1]AlShareeda M A, Alsadhan A A, Qasim H H, et al. Software defined networking for internet of things: Review, techniques, challenges, and future directions[J]. Bulletin of Electrical Engineering and Informatics, 2024, 13(1): 638647[2]李曼, 车向北, 张宗包, 等. 软件定义网络中基于XGBoost算法的DDoS攻击检测[J]. 信息安全研究, 2021, 7(11): 10311036[3]戴冕, 程光, 周余阳. 软件定义网络的测量方法研究[J]. 软件学报, 2019, 30(6): 18531874[4]乔冠杰, 吕高锋, 王宏, 等. Sketch统计方法研究[J]. 小型微型计算机系统, 2022, 43(2): 393398[5]Huang Q, Jin X, Lee P P C, et al. Sketchvisor: Robust network measurement for software packet processing[C] Proc of the Conf of ACM Special Interest Group on Data Communication. New York: ACM, 2017: 113126[6]Cormode G, Muthukrishnan S. An improved data stream summary: The countmin sketch and its applications[J]. Journal of Algorithms, 2005, 55(1): 5875[7]Tang L, Huang Q, Lee P P C. MVSketch: A fast and compact invertible sketch for heavy flow detection in network data streams[C] Proc of IEEE Conf on Computer Communications (INFOCOM 2019). Piscataway, NJ: IEEE, 2019: 20262034[8]Pagh R, Rodler F F. Cuckoo hashing[J]. Journal of Algorithms, 2004, 51(2): 122144[9]Moustafa N, Slay J. UNSWNB15: A comprehensive data set for network intrusion detection systems (UNSWNB15 network data set)[C] Proc of 2015 Military Communications and Information Systems Conference (MilCIS). Piscataway, NJ: IEEE, 2015: 16[10]Estan C, Keys K, Moore D, et al. Building a better NetFlow[J]. ACM SIGCOMM Computer Communication Review, 2004, 34(4): 245256[11]Phaal P, Panchen S, McKee N. InMon corporation’s sFlow: A method for monitoring traffic in switched and routed networks[ROL]. 2001 [20240318]. https:www.rfceditor.orgrfc3176.html[12]Goyal A, Daumé H. Lossy conservative update (LCU) sketch: Succinct approximate count storage[C] Proc of the AAAI Conf on Artificial Intelligence. 2011, 25(1): 878883[13]Boyer R S, Moore J S. MJRTY—A fast majority vote algorithm[M] Automated Reasoning: Essays in Honor of Woody Bledsoe. Berlin: Springer, 1991: 105117[14]Tang L, Huang Q, Lee P P C. SpreadSketch: Toward invertible and networkwide detection of superspreaders[C] Proc of IEEE Conf on Computer Communications (INFOCOM 2020). Piscataway, NJ: IEEE, 2020: 16081617[15]Flajolet P, Martin G N. Probabilistic counting algorithms for data base applications[J]. Journal of Computer and System Sciences, 1985, 31(2): 182209 |