[1] Mckeown N,et al.Openflow:enabling innovation in campus networks[J].ACM SIGCOMM Computer Communication Review,2008,38(2):69-74. [2] Ahmad I,Namal S,Ylianttila M,et al.Security in software defined networks:A survey[J].IEEE Communications Surveys & Tutorials,2015,17(4):2317-2343. [3] Scott S,Natarajan S,et al.A survey of security in software defined networks[J].IEEE Communications Surveys & Tutorials,2016,18(1):623-654. [4] 邬江兴.网络空间拟态防御研究[J].信息安全学报,2016,1(4):1-10. WU Jiang-xing.Research on cyber mimic defense[J].Journal of Cyber Security,2016,1(4):1-10.(in Chinese) [5] 王禛鹏,扈红超,程国振.一种基于拟态安全防御的DNS框架设计[J].电子学报,2017,45(11):2705-2714. WANG Zhen-peng,HU Hong-chao,CHENG Guo-zhen.A DNS architecture based on mimic security defense[J].Acta Electronica Sinica,2017,45(11):2705-2714.(in Chinese) [6] Martello S,Toth P.Lower bounds and reduction procedures for the bin packing problem[J].Discrete Applied Mathematics,1990,28(1):59-70. [7] Xie J,Guo D,Zhu X,et al.Minimal fault-tolerant coverage of controllers in IaaS datacenters[J].IEEE Transactions on Services Computing,2017,36(3):1-14. [8] Wang Z,Hu H,Zhang C.On achieving SDN controller diversity for improved network security using coloring algorithm[A].Proceedings of the IEEE International Conference on Computer and Communications[C].Chengdu:IEEE,2017.1-5. [9] Qi C,Wu J,Chen H,et al.Game-theoretic analysis for security of various software-defined networking (SDN) architectures[A].Proceedings of the IEEE Vehicular Technology Conference[C].Sydney:IEEE,2017.1-5. |