[1] 中国互联网络信息中心.第41次中国互联网络发展状况统计报告[R/OL].[2018-04-20].http://www.cac.gov.cn/2018-01/31/c_1122347026.htm. [2] YAN Yida,LIU Zhenyan,ZHONG Junwei,et al.Malicious domain detection based on machine learning[EB/OL].[2018-04-25].http://dpi-proceedings.com/index.php/dtcse/article/view/19866. [3] SHI Yong,CHEN Gong,LI Juntao.Malicious domain name detection based on extreme machine learning[J].Neural Processing Letters,2018,48(3):1347-1357. [4] ALIEYAN K,ALMOMANI A,MANASRAH A,et al.A survey of botnet detection based on DNS[J].Neural Computing and Applications,2017,28(7):1-18. [5] POMOROVA O,SAVENKO O,LYSENKO S,et al.A technique for the botnet detection based on DNS-traffic analysis[C]//Proceedings of International Conference on Computer Networks.Berlin,Germany:Springer,2015:127-138. [6] 马旸,强小辉,蔡冰,等.大规模网络中基于集成学习的恶意域名检测[J].计算机工程,2016,42(11):170-176. [7] SINGH K,GUNTUKU S C,THAKUR A,et al.Big data analytics framework for peer-to-peer botnet detection using random forests[J].Information Sciences,2014,278(19):488-497. [8] ZAHARIA M,CHOWDHURY M,FRANKLIN M J,et al.Spark:cluster computing with working sets[C]//Proceedings of USENIX Conference on Hot Topics in Cloud Computing.San Diego,USA:USENIX Association,2010:2-10. [9] MENG X,BRADLEY J,YAVUZ B,et al.MLlib:machine learning in Apache spark[J].Journal of Machine Learning Research,2016,17(1):1235-1241. [10] VERMA A,MANSURI A H,JAIN N.Big data manage-ment processing with Hadoop MapReduce and spark technology:a comparison[C]//Proceedings of 2016 Symposium on Colossal Data Analysis and Networking.Washington D.C.,USA:IEEE Press,2016:1-4. [11] BAUM L E,PETRIE T,SOULES G,et al.A maximization technique occurring in the statistical analysis of probabilistic functions of Markov chains[J].Annals of Mathematical Statistics,1970,41(1):164-171. [12] 朱明,郭春生.隐马尔可夫模型及其最新应用与发展[J].计算机系统应用,2010,19(7):255-259,216. [13] 苏文胜,王奉涛,朱泓,等.双树复小波域隐Markov树模型降噪及在机械故障诊断中的应用[J].振动与冲击,2011,30(6):47-52. [14] 李航.统计学习方法[M].北京:清华大学出版社,2012. [15] 杨安驹,杨云,周嫒嫒,等.基于隐马尔科夫模型的融合推荐算法[J].计算机与现代化,2015(9):60-65. [16] SMYTH P.Hidden Markov models and neural networks for fault detection in dynamic systems[C]//Proceedings of 1993 IEEE-SP Workshop on Neural Networks for Signal Processing.Washington D.C.,USA:IEEE Press,1993:582-592. [17] VITERBI A J.A personal history of the Viterbi algorithm[J].IEEE Signal Processing Magazine,2006,23(4):120-142. [18] JR G D F.The Viterbi algorithm[J].Proceedings of the IEEE,1973,61(3):268-278. [19] WELCH L R.Hidden Markov models and the Baum-Welch algorithm[J].IEEE Information Theory Society News Letter,2003,53(2):194-211. [20] 张峻飞.Hadoop环境下的恶意域名检测方案研究[D].武汉:华中科技大学,2015. [21] 赵成龙.一种检测恶意域名的增量并行SVM算法研究与实现[D].武汉:华中科技大学,2016. [22] MOLENBERGHS G,KENWARD M G.The expectation-maximization algorithm[M]//MOLENBERGHS G,KENWARD M G.Missing data in clinical studies.[S.l.]:Wiley-Blackwell,2007. [23] 夏丽莎.基于隐马尔可夫模型的故障诊断及相关算法研究[D].武汉:华中科技大学,2014. [24] KANUNGO T,MOUNT D M,NETANYAHU N S,et al.An efficient k-means clustering algorithm:analysis and implementation[J].IEEE Transactions on Pattern Analysis and Machine Intelligence,2002,24(7):881-892. |