Computer Science ›› 2025, Vol. 52 ›› Issue (1): 374-382.doi: 10.11896/jsjkx.231200080
• Information Security • Previous Articles Next Articles
WANG Jiayu1, YU Junqing1,2, LI Dong2, ZHAO Junyang1
CLC Number:
[1]ZHANG Q,LIU V,ZENG H,et al.High-resolution measure-ment of data center microbursts[C]//Proceedings of the 2017 Internet Measurement Conference.New York:Association for Computing Machinery,2017:78-85. [2]DUTT D G.Cloud Native Data Center Networking:Architecture,Protocols,and Tools[M].O’Reilly Media,2019:23-32. [3]FIRESTONE D,PUTNAM A,MUNDKUR S,et al.Azure Accelerated Networking:SmartNICs in the Public Cloud[C]//15th USENIX Sym-posium on Networked Systems Design and Implementation(NSDI 18).BERKELEY:USENIX Association,2018:51-66. [4]SHAN D F,REN F Y,CHENG P,et al.Micro-burst in datacenters:Observations,analysis,and mitigations[C]//2018 IEEE 26th International Conference on Network Protocols(ICNP).Los Alamitos:IEEE Computer Society,2018:88-98. [5]YASEEN N,SONCHACK J,LIU V.Synchronized networksnap-shots[C]//Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication.New York:Association for Computing Machinery,2018:402-416. [6]BOSSHART P,DALY D,GIBB G,et al.P4:Programming protocol-independent packet processors[J].ACM SIGCOMM Computer Communication Review,2014,44(3):87-95. [7]ALCOZ A G,STROHMEIER M,LENDERS V,et al.Aggre-gate-based congestion control for pulse-wave DDoS defense[C]//Proceedings of the ACM SIGCOMM 2022 Conference.New York:Association for Computing Machinery,2022:693-706. [8]Monitor Microbursts on Cisco Nexus 5600 Platform and Cisco Nexus 6000 Series Switches[DB/OL].https://goo.gl/5Xxhpm,2022-5. [9]What Is a Microburst? How to Detect a Microburst?.Huawei[DB/OL].https://www.support.huawei.com/enterprise/en/doc/EDOC1100086962,2020-11. [10]KIM C,SIVARAMAN A,KATTA N,et al.In-band networktelemetry via programmable dataplanes[C]//ACM SIGCOMM.New York:Association for Computing Machinery,2015. [11]JOSHI R,QU T,CHAN M C,et al.BurstRadar:Practical real-time microburst monitoring for datacenter networks[C]//Proceedings of the 9th Asia-Pacific Workshop on Systems.New York:Association for Computing Machinery,2018:1-8. [12]TAFFET P,MELLOR-CRUMMEY J.Lightweight,Packet-Centric Monitoring of Network Traffic and Congestion Implemented in P4[C]//2019 IEEE Symposium on High-Perfor-mance Interconnects(HOTI).LOS ALAMITOS:IEEE Compu-ter Society,IEEE,2019:54-58. [13]BUCCAPATNAM S,CHEN X Q,DUELL K,et al.Fine-grained P4 measurement toolkit for buffer sizing in carrier grade net-works[C]//BS’19:2019 Workshop on Buffer Sizing.New York:Association for Computing Machinery,2019. [14]CHEN X Q,FEIBISH S L,KORAL Y,et al.Fine-grained queue measurement in the data plane[C]//Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies.New York:Association for Computing Machinery,2019:15-29. [15]ZHOU Y,SUN C,LIU H H,et al.Flow event telemetry on program-mable data plane[C]//Proceedings of the Annual Confe-rence of the ACM Special Interest Group on Data Communication on the Applications,Technologies,Architectures,and Protocols for Computer Communication.New York:Association for Computing Machinery,2020:76-89. [16]FEIBISH S L,LIU Z,IVKIN N,et al.Flow-level loss detection with Δ-sketches[C]//Proceedings of the Symposium on SDN Research.New York:Association for Computing Machinery,2022:25-32. [17]BRUM H B,DOS SANTOS C R P,FERRETO T C.Providing Fine-grained Network Metrics for Monitoring Applications using In-band Telemetry[C]//2023 IEEE 9th International Conference on Network Softwarization(NetSoft).New York:IEEE,2023:116-124. [18]MAZLOUM A,GOMEZ J,KFOURY E,et al.Enhancing perfSONAR Measurement Capabilities using P4 Programmable Data Planes[C]//Proceedings of the SC'23 Workshops of The International Conference on High Performance Computing,Network,Storage,and Analysis.New York:Association for Computing Machinery,2023:819-829. [19]CORMODE G,MUTHUKRISHNAN S.An improved datastream summary:the count-min sketch and its applications[J].Journal of Algorithms,2005,55(1):58-75. [20]ESTAN C,VARGHESE G.New directions in traffic measurement and accounting[C]//Proceedings of the 2002 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.New York:Association for Computing Machinery,2002:323-336. [21]CHARIKAR M,CHEN K,FARACH-COLTON M.Finding frequent items in data streams[C]//International Colloquium on Automata,Languages,and Programming.AMSTERDAM:ELSEVIER,2002:693-703. [22]GOODRICH M T,MITZENMACHER M.Invertible bloomlookup tables[C]//2011 49th Annual Allerton Conference on Communication,Control,and Computing(Allerton).New York:IEEE,2011:792-799. [23]BENSON T,AKELLA A,MALTZ D A.Network traffic cha-racteristics of data centers in the wild[C]//Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement.New York:Association for Computing Machinery,2010:267-280. |
[1] | DUN Jingbo, LI Zhuo. Survey on Transmission Optimization Technologies for Federated Large Language Model Training [J]. Computer Science, 2025, 52(1): 42-55. |
[2] | LIU Haohan, CHEN Zemao. Study on Malicious Access Detection in Industrial Control Networks Based on Dynamic BayesianGames [J]. Computer Science, 2025, 52(1): 383-392. |
[3] | WANG Wentong, ZHANG Zhijun, ZHANG Mingyang. Review of Key Technologies,Research Progress and Applications of Metaverse [J]. Computer Science, 2024, 51(12): 2-11. |
[4] | SUN Yunhe, WANG Yu, ZHAO Liang, YANG Dongsheng, GUAN Yunchong. Review of Digital Twin Based Satellite Network Mobile Edge Computing [J]. Computer Science, 2024, 51(12): 12-19. |
[5] | WANG Kewen, ZHANG Weiting, LIAO Peixi. Deterministic Transmission Scheduling Mechanism for Mixed Traffic Flows Towards Digital Twin Networks [J]. Computer Science, 2024, 51(12): 37-45. |
[6] | CHENG Lianghua, HUANG Ruixue, SHEN Xin. Urban Illegal On-road Parking Detection Algorithm for High Dynamic Video Scenarios [J]. Computer Science, 2024, 51(12): 190-198. |
[7] | WANG Bo, ZHAO Jincheng, XU Bingfeng, HE Gaofeng. Zero Day Attack Detection Method for Internet of Vehicles [J]. Computer Science, 2024, 51(12): 334-342. |
[8] | ZHANG Hao, GUO Oufan, ZHOU Feifei, MA Tao, HE Yingli, YAO Subin. Study on Dynamic Redundancy Mechanism of Time Sensitive Networks Based on Segmented Frame Copy and Elimination [J]. Computer Science, 2024, 51(11A): 240300085-7. |
[9] | HU Hongchao, SUI Jiaqi, ZHANG Shuai, TONG Yu. Proactive Defense Technology in Cyber Security:Strategies,Methods and Challenges [J]. Computer Science, 2024, 51(11A): 231100132-13. |
[10] | CAO Weikang, LIN Honggang. IoT Devices Identification Method Based on Weighted Feature Fusion [J]. Computer Science, 2024, 51(11A): 240100137-9. |
[11] | WANG Chundong, LEI Jiebin. Intrusion Detection Model Based on Combinatorial Optimization of Improved Pigeon SwarmAlgorithm [J]. Computer Science, 2024, 51(11A): 231100054-7. |
[12] | WANG Chundong, ZHANG Jiakai. Study on Open Set Based Intrusion Detection Method [J]. Computer Science, 2024, 51(11A): 231000033-6. |
[13] | GU Zhaojun, YANG Wen, SUI He, LI Zhiping. Threat Assessment of Air Traffic Control Information System Based on Knowledge Graph [J]. Computer Science, 2024, 51(11A): 240200052-11. |
[14] | HUANG Jianhui, ZHANG Jiangjiang, SHEN Changxiang, ZHANG Jianbiao, WANG liang. Study on Trust Evaluation System Based on Trusted Platform Control Module [J]. Computer Science, 2024, 51(11A): 240200109-6. |
[15] | LI Chunjiang, YIN Shaoping, CHI Haotian, YANG Jing, GENG Haijun. DDoS Attack Detection Model Based on Statistics and Ensemble Autoencoders in SDN [J]. Computer Science, 2024, 51(11): 389-399. |
|