[1] La Poll M, Martinelli F, Sgandurra D. A survey on security for mobile devices[J]. IEEE Communications Surveys & Tutorials, 2013,15(1):446-471.
[2] 吴楠. 基于行为分析的恶意代码检测系统的研究与实现[D]. 南昌:南昌大学, 2014.
[3] InternetLiveStats.com. Total Number of Websites[DB/OL]. http://www.internetlivestats.com/total-number-of-websites/, 2015-12-01.
[4] Ma J, Saul L K, Savage S, et al. Identifying suspicious URLs: An application of large-scale online learning[C]// Proceedings of the 26th International Conference on Machine Learning. 2009:681-688.
[5] Bilge L, Kirda E, Kruegel C, et al. EXPOSURE: Finding malicious domains using passive DNS analysis[C]// Proceedings of the 18th Network and Distributed System Security Symposium. 2011.
[6] 王素红,宁慧,杨松,等. 基于SVM的抄袭检测方法研究[J]. 应用科技, 2015,42(5):51-54,60.
[7] Symantec Corporation. Internet Security Threat Report, Volume 20 [DB/OL]. https://www.symantec.com/content/en/us/enterprise/other_resources/21347933_GA_RPT-internet-security-threat-〖JP3〗report-volume-20-2015.pdf, 2015-04-10.
[8] 奉国和. SVM分类核函数及参数选择比较[J]. 计算机工程与应用, 2011,47(3):123-124,128.
[9] 李双双. 基于SVM方法的恶意软件加壳分类系统的研究与实现[D]. 济南:山东大学, 2014.
[10]康松林,胡赐元,孙永新. 基于蜜罐在线恶意网页检测系统研究与设计[J]. 计算机系统应用, 2010,19(2):152-154.
[11]Akhunzada A, Ahmed E, Gani A, et al. Securing software defined networks: Taxonomy, requirements, and open issues[J]. IEEE Communications Magazine, 2015,53(4):36-44.
[12]Alsmadi I, Xu Dianxiang. Security of software defined networks: A survey[J]. Computers & Security, 2015,53:79-108.
[13]Kloti R, Kotronis V, Smith P. OpenFlow: A security analysis[C]// Proceedings of the 21st IEEE International Conference on Network Protocols. 2013:1-6.
[14]Braga R, Mota E, Passito A. Lightweight DDoS flooding attack detection using NOX/OpenFlow[C]// Proceedings of the 35th Annual IEEE Conference on Local Computer Networks. 2013:408-415.
[15]Wang Bing, Zheng Yao, Lou Wenjing, et al. DDoS attack protection in the era of cloud computing and software-defined networking[J]. Computer Networks, 2015,81:308-319.
[16]Mousavi S M. Early detection of DDoS attacks in software defined networks controller[D]. Ottawa: Carleton University, 2014.
[18]Hoque N, Bhuyan M H, Baishya R C, et al. Network attacks: Taxonomy,tools and systems[J]. Journal of Network and Computer Applications, 2014,40:307-324.
[19]Raza M H, Sivakumar S C, Nafarieh A, et al. A comparison of software defined network(SDN) implementation strategies[J]. Procedia Computer Science, 2014,32:1050-1055. |