Computer Science ›› 2023, Vol. 50 ›› Issue (7): 270-277.doi: 10.11896/jsjkx.220500274
• Computer Network • Previous Articles Next Articles
HAO Bingwei1,2, CUI Yunhe1,2, QIAN Qing3, SHEN Guowei1,2, GUO Chun1,2
CLC Number:
[1]SUH J,KWON T T,DIXON C,et al.Opensa-mple:A Low-latency,Sampling-based Measurement Platform for Commodity Sdn[C]//2014 IEEE 34th International Conference on Distri-buted Computing Systems.IEEE,2014:228-237. [2]KREUTZ D,RAMOS F M V,VERISSIMO P E,et al.Software-defined Networking:A Comprehensive Survey [J].Proceedings of the IEEE,2014,103(1):14-76. [3]TAN L,SU W,ZHANG W,et al.In-band Network Telemetry:A Survey [J].Computer Networks,2021,186:107763. [4]LV H R,LI Q,SHEN G B,et al.In-band Net-work Telemetry Method Research Review [J/OL].Journal of Software,2022.http://www.jos.org.cn/jos/article/abstract/6635?st=search. [5]SUH D,JANG S,HAN S,et al.Flexible Sam-pling-based In-band Network Telemetry in Programmable Data Plane [J].ICT Express,2020,6(1):62-65. [6]PAN T,SONG E,BIAN Z,et al.Intpath:Towards Optimal Path Planning for Inband Net-workwide Telemetry[C]//IEEE INFOCOM 2019-IEEE Conference on Computer Communications.2019:487-495. [7]LIU Z,BI J,ZHOU Y,et al.NetVision:Towards Network Telemetry as A Service[C]//2018 IEEE 26th International Conference on Network Protocols(ICNP).2018:247-248. [8]LIU Z Z,BI J,ZHOU Y,etal.Active Network Telemetry based on P4 [J].Journal of Communications,2018,39(S1):162-169. [9]CASTANHEIRA L,PARIZOTTO R,SCHAEFFERFILHO A E.Flowstalker:Comprehensive Traffic Flow Monitoring on the Data Plane using P4[C]//ICC 2019 IEEE International Confe-rence on Communications(ICC).IEEE,2019. [10]LIN Y,ZHOU Y,LIU Z,et al.Netview:Tow-ards On-demand Networkwide Telemetry in the Data Center[J].Computer Networks,2020,180:107386. [11]SIMSEK G,ERGENÇ D,ONUR E.Efficient Network Monitoring via In-band Telemetry[C]//2021 17th International Conference on the Design of Reliable Communication Networks(DRCN).2021. [12]YUAN X,MAHAPATRA S,NIENABER W,et al.A NewRouting Scheme for Jellyfish and Its Performance with HPC Workloads[C]//Proceedings of the International Conference on High Performance Computing,Networking,Storage and Analysis.2013. [13]CUI Y H,YAN L,LI S,et al.SD-Anti-DDoS:Fast and Efficient DDoS Defense in Software-defined Networks [J].Journal of Network and Computer Applications,2016,68:65-79. [14]PENG J C,CUI Y H,QIAN Q,et al.ADVICE:Towards Adaptive Scheduling for Data Collection and DDoS Detection in SDN [J].Journal of Information Security and Applications,2021,63:103017. [15]KATOCH S,CHAUHAN S S,KUMAR V.A review on genetic algorithm:past,present,and future [J].Multimedia Tools and Applications,2021,80(5):8091-8126. |
[1] | ZHANG Yaofang, LI Peixuan, XIE Ping. Policy Optimization Scheme of Refresh and Duplication Combination Based on LDPC Read Delay [J]. Computer Science, 2023, 50(7): 38-45. |
[2] | LIU Chenwei, SUN Jian, LEI Bingbing, XU Tao, WU Zhuiwei. Task Scheduling Strategy for Energy Consumption Optimization of Cloud Data Center Based on Improved Particle Swarm Algorithm [J]. Computer Science, 2023, 50(7): 246-253. |
[3] | LI Yinghao, GUO Haogong, LIU Panpan, XIANG Yihao, LIU Chengming. Cloud Platform Load Prediction Method Based on Temporal Convolutional Network [J]. Computer Science, 2023, 50(7): 254-260. |
[4] | LI Yuqiang, LI Linfeng, ZHU Hao, HOU Mengshu. Deep Learning-based Algorithm for Active IPv6 Address Prediction [J]. Computer Science, 2023, 50(7): 261-269. |
[5] | CHEN Xuzhan, LIN Bing, CHEN Xing. Stackelberg Model Based Distributed Pricing and Computation Offloading in Mobile Edge Computing [J]. Computer Science, 2023, 50(7): 278-285. |
[6] | WANG Jiaxing, YANG Sijin, ZHUANG Lei, SONG Yu, YANG Xinyu. Multi-objective Online Hybrid Traffic Scheduling Algorithm in Time-sensitive Networks [J]. Computer Science, 2023, 50(7): 286-292. |
[7] | ZENG Qingwei, ZHANG Guomin, XING Changyou, SONG Lihua. Intelligent Attack Path Discovery Based on Hierarchical Reinforcement Learning [J]. Computer Science, 2023, 50(7): 308-316. |
[8] | ZHANG Desheng, CHEN Bo, ZHANG Jianhui, BU Youjun, SUN Chongxin, SUN Jia. Browser Fingerprint Recognition Based on Improved Self-paced Ensemble Algorithm [J]. Computer Science, 2023, 50(7): 317-324. |
[9] | SHI Liang, WEN Liangming, LEI Sheng, LI Jianhui. Virtual Machine Consolidation Algorithm Based on Decision Tree and Improved Q-learning by Uniform Distribution [J]. Computer Science, 2023, 50(6): 36-44. |
[10] | HUANG Hua, JIANG Jun, YANG Yongkang, CAO Bin. Online Service Function Chain Orchestration Method for Profit Maximization [J]. Computer Science, 2023, 50(6): 66-73. |
[11] | WEI Tao, LI Zhihua, WANG Changjie, CHENG Shunhang. Cybersecurity Threat Intelligence Mining Algorithm for Open Source Heterogeneous Data [J]. Computer Science, 2023, 50(6): 330-337. |
[12] | LEI Xuemei, LIU Li, WANG Qian. MEC Offloading Model Based on Linear Programming Relaxation [J]. Computer Science, 2023, 50(6A): 211200229-5. |
[13] | YANG Shaolong, ZHU Guosheng, PANG Xinglong, LI Xiuyuan, PAN Deng. Study on Performance of Wireless Train Communication Network Based on Wi-Fi 6 [J]. Computer Science, 2023, 50(6A): 220600179-5. |
[14] | YANG Shiyu, ZHAO Bing, PENG Yue. Cluster Head Selection Algorithm Based on Improved Butterfly Optimization Algorithm in WSN [J]. Computer Science, 2023, 50(6A): 220100166-5. |
[15] | ZHANG Yuxiang, HAN Jiujiang, LIU Jian, XIAN Ming, ZHANG Hongjiang, CHEN Yu, LI Ziyuan. Network Advanced Threat Detection System Based on Event Sequence Correlation Under ATT&CK Framework [J]. Computer Science, 2023, 50(6A): 220600176-7. |
|