Citation: | Qu Haipeng, Li Dequan, Su Purui, Feng Dengguo. An IP Traceback Scheme with Packet Marking in Blocks[J]. Journal of Computer Research and Development, 2005, 42(12): 2084-2092. |
[1] | Pan Yuting, Lin Li. A Trust-Based DDoS Discovery Approach for Encrypted Traffic in Cloud Environment[J]. Journal of Computer Research and Development, 2021, 58(4): 822-833. DOI: 10.7544/issn1000-1239.2021.20200183 |
[2] | Zhang Long, Wang Jinsong. DDoS Attack Detection Model Based on Information Entropy and DNN in SDN[J]. Journal of Computer Research and Development, 2019, 56(5): 909-918. DOI: 10.7544/issn1000-1239.2019.20190017 |
[3] | Liu Zihao, Zhang Bin, Zhu Ning, Tang Huilin. Adaptive App-DDoS Detection Method Based on Improved AP Algorithm[J]. Journal of Computer Research and Development, 2018, 55(6): 1236-1246. DOI: 10.7544/issn1000-1239.2018.20170124 |
[4] | Du Haipeng, Zheng Qinghua, Zhang Weizhan, Yan Jifeng. A Packet Loss Differentiation Algorithm for 4G-LTE Network[J]. Journal of Computer Research and Development, 2015, 52(12): 2684-2694. DOI: 10.7544/issn1000-1239.2015.20150726 |
[5] | Li Baohui, Xu Kefu, Zhang Peng, Guo Li. pTrace: A Counter Technology of DDoS Attack Source for Controllable Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(10): 2212-2223. DOI: 10.7544/issn1000-1239.2015.20150577 |
[6] | Wang Yichuan, Ma Jianfeng, Lu Di, Zhang Liumei, Meng Xianjia. Game Optimization for Internal DDoS Attack Detection in Cloud Computing[J]. Journal of Computer Research and Development, 2015, 52(8): 1873-1882. DOI: 10.7544/issn1000-1239.2015.20140608 |
[7] | Huang Liang, Feng Dengguo, Lian Yifeng, Chen Kai. Artificial-Neural-Network-Based DDoS Defense Effectiveness Evaluation[J]. Journal of Computer Research and Development, 2013, 50(10): 2100-2108. |
[8] | Xie Dongqing, Zhou Zaihong, Luo Jiawei. An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its Application in DDoS Defense[J]. Journal of Computer Research and Development, 2011, 48(8): 1517-1523. |
[9] | Liu Tong, Li Huawei, Li Xiaowei, Gong Shuguang. A Sub-Tuple-Partition-Based Fast Two-Dimensional Packet Classification Algorithm[J]. Journal of Computer Research and Development, 2006, 43(10): 1797-1803. |
[10] | Zhou Dongqing, Zhang Haifeng, Zhang Shaowu, Hu Xiangpei. A DDoS Attack Detection Method Based on Hidden Markov Model[J]. Journal of Computer Research and Development, 2005, 42(9): 1594-1599. |