[1] 方滨兴, 贾焰, 李爱平, 等. 网络空间靶场技术研究[J]. 信息安全学报, 2016, 1(3): 1-9. Fang Binxing, Jia Yan, Li Aiping, et al.Research on Network Space Shooting Range Technology[J]. Journal of Cyber Security, 2016, 1(3): 1-9. [2] Murat K, Arjan D.Quality of Service (QoS) in Software Defined Networking (SDN): A Survey[J]. Journal of Network and Computer Applications (S1084-8045), 2017, 80: 200-218. [3] 李伯虎, 柴旭东, 侯宝存, 等. 一种基于云计算理念的网络化建模与仿真平台—“云仿真平台”[J]. 系统仿真学报, 2009, 21(17): 5292-5299. Li Bohu, Chai Xudong, Hou Baocun, et al.A Networked Modeling and Simulation Platform Based on Cloud Computing Concept-“Cloud Simulation Platform”[J]. Journal of System Simulation, 2009, 21(17): 5292-5299. [4] 张南. 系统链路数据采集技术研究[D]. 沈阳: 沈阳理工大学, 2009. Zhang Nan.Research on System Link Data Acquisition Technology [D]. Shenyang: Shenyang Ligong University, 2009. [5] Chwala C, Keis F, Kunstmann H.Real-time Data Acquisition of Commercial Microwave Link Networks for Hydrometeorological Applications[J]. Atmospheric Measurement Techniques (S1867-1381), 2016, 8(11): 12243-12262. [6] 刘小威, 陈蜀宇, 卢尧, 等. 零拷贝技术在网络分析工具中的应用[J]. 计算机系统应用, 2012, 21(4): 169-173. Liu Xiaowei, Chen Shuyu, Lu Yao, et al.Application of Zero Copy Technology in Network Analysis Tools[J]. Computer Systemsand Applications, 2012, 21(4): 169-173. [7] 支连意. 云环境中集群监控数据采集与分析系统的研究与实现[D]. 南京: 东南大学, 2016. Zhi Lianyi.Research and Implementation of Cluster Monitoring Data Acquisition and Analysis System in Cloud Environment [D]. Nanjing: Southeast University, 2016. [8] 孙福全. 云计算环境中用量信息采集系统的设计与实现[D]. 北京: 北京邮电大学, 2013. Sun Fuquan.Design and Implementation of Consumption Information Collection System in Cloud Computing Environment [D]. Beijing: Beijing University of Posts and Telecommunications, 2013. [9] 张义荣, 鲜明, 王国玉. 一种基于网络熵的计算机网络攻击效果定量评估方法[J]. 通信学报, 2004, 25(11): 158-165. Zhang Yirong, Xian Ming, Wang Guoyu.A Quantitative Evaluation Method of Computer Network Attack Effect Based on Network Entropy[J].Journal on Communications, 2004, 25(11): 158-165. [10] 陈秀真, 郑庆华, 管晓宏, 等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17(4): 885-897. Chen Xiuzhen, Zheng Qinghua, Guan Xiaohong, et al.Quantitative Evaluation Method of Hierarchical Cyber Security Threat Situation[J]. Journal of Software, 2006, 17(4): 885-897. [11] Li L G.Study of Multimedia Teaching Effect Evaluation Based on AHP[J]. Energy Procedia (S1876-6102), 2011, 13: 8371-8375. [12] Mendiola A, Fuentes V, Matias J, et al.An Architecture for Dynamic QoS Management at Layer 2 for DOCSIS Access Networks Using OpenFlow[J]. Computer Networks (S1389-1286), 2016, 94: 112-128. [13] 胡显成, 任新, 向涛. 网络端口镜像获取流量分析数据源[C]. 中国计算机用户协会网络应用分会2013年网络新技术与应用年会. 2013: 212-214. Hu Xiancheng, Ren Xin, Xiang Tao.Port Mirroring for Traffic Analysis Data Sources[C]. China Computer User Association Network Application Branch 2013 Network New Technology and Application Annual Meeting. 2013: 212-214. [14] Rizzo L, Landi M.Netmap[J]. ACM SIGCOMM Computer Communication Review (S0146-4833), 2011, 41(4): 339-350. [15] 张潇晓, 唐勇, 苏金树, 等. 网络流量分析系统的设计与实现[J]. 计算机应用, 2011, 31(增2): 25-28. Zhang Xiaoxiao, Tang Yong, Su Jinshu, et al.Design and Implementation of Network Traffic Analysis System[J]. Journal of Computer Applications, 2011, 31(S2): 25-28. [16] Sapegin A, Uhlig S.On the Extent of Correlation in BGP Updates in the Internet and What It Tells Us About Locality of BGP Routing Events[J]. Computer Communications (S0140-3664), 2013, 36(15/16): 1592-1605. [17] 黎松,诸葛建伟, 李星. BGP安全研究[J]. 软件学报, 2013, 24(1): 121-138. Li Song, Zhuge Jianwei, Li Xing.Research on BGP Security[J]. Journal of Software, 2013, 24(1): 121-138. [18] 郑庆棠. 基于仿真平台的典型动态路由协议攻击技术研究[D]. 北京: 北京邮电大学, 2014. Zheng Qingtang.Research on Typical Dynamic Routing Protocol Attack Technology Based on Simulation Platform[D]. Beijing: Beijing University of Posts and Telecommunications, 2014. |