参考文献
[ 1 ] Mockapetris P. Domain Names-Concepts and Facilities
[EB / OL]. (1987-11-01). http:/ / www. ietf. org / rfc /
rfc1034. txt.
[ 2 ] Mockapetris P. Domain Names-Implementation and
Specification[ EB / OL]. (1987-11-01). http:/ / www.
ietf. org / rfc / rfc1035. txt.
[ 3 ] Arends R,Austein R, Larson M, et al. DNS Security
Introduction and Requirements [ EB / OL ]. ( 2005-03-
15). http:/ / www. ietf. org / rfc / rfc4033. txt.
[ 4 ] Santcroos M,Kolkman O M. DNS Threat Analysis[EB /
OL ]. ( 2009-02-25 ). http:/ / www. nlnetlabs. nl /
downloads / se-consult. pdf.
[ 5 ] ICANN Security, Stablility Advisory Committee.
Domain Name Hijacking:Incidents,Threats,Risks,and
Remedial Actions [ EB / OL ]. ( 2005-07-05 ). http:/ /
archive. icann. org / en / announcements / hijacking-report-
12jul05. pdf.
[ 6 ] Pappas V,Xu Zhiguo,Lu Songwu,et al. Impact of Conguration
Errors on DNS Robustness[C] / / Proc. of ACM
SIGCOMM’04. Portland,USA:[s. n. ],2004:319-330.
[ 7 ] Liu Ziqian. Lessons Learned from May 19 China’s DNS
Collapse[EB / OL]. (2009-11-10). https:/ / www. dnsoarc.
net / files / workshop-200911/ Ziqian_Liu. pdf.
[ 8 ] 王培新,刘颖,陈雨新,等. Web 通信中可疑域名监控
技术的研究[J]. 计算机技术与发展,2012,22(4):
231-234.
[ 9 ] Samaneh R,Saripan M I,Rasid M F A. Defending Denial
of Service Attacks Against Domain Name System with
Machine Learning Techniques[EB / OL]. (2010-11-01).
http:/ / www. researchgate. net / publication / 49586608.
[10] Wu Jun, Wang Xin, Lee Xiaodong, et al. Detecting
DDoS Attack Towards DNS Server Using a Neural
Network Classifier[C] / / Proc. of the 20th International
Conference on Artificial Neural Networks. [ S. l. ]: Springer,2010:118-123.
[11] Kalafut A J, Shue C A, Gupta M. Understanding
Implications of DNS Zone Provisioning [C] / / Proc. of
the 8th Conference on Internet Measurement. [S. l. ]: Springer,2008:211-216.
[12] Osterweil E,Masse D,Zhuang Lixia. Observations from
the DNSSEC Deployment [ C ] / / Proc. of IEEE
Workshop on Secure Network Protocols. [S. l. ]:IEEE
Press,2007:1-6.
[13] Osterweil E,Ryan M,Massey D,et al. Quantifying the
Operational Status of the DNSSEC Deployment [C] / /
Proc. of the 6th ACM/ USENIX Internet Measurement
Conference. Vouliagmeni,Greece:[s. n. ],2008:211-216.
[14] Osterweil E, Massey D, Zhang Lixia. Deploying and
Monitoring DNS Security(DNSSEC)[C] / / Proc. of the
25th Annual Computer Security Applications
Conference. Honolulu,USA:[s. n. ],2009:429-438.
[15] Ma J,Saul L K, Savage S, et al. Learning to Detect
Malicious URLs [J]. ACM Transactions on Intelligent
Systems and Technology,2011,2(3):30.
[16] Gige D. Passive Measurement of Network Quality[D].
Zürich, Switzerland: Swiss Federal Institute of
Technology,2005.
[17] Levenshtein V I. Binary Codes Capable of Correcting
Deletions,Insertions and Substitutions of Symbols [J].
Doklady Academy of Sciences of the USSR,1965,163
(4):845-848.
[18] Daigle L. WHOIS Protocol Specification [ EB / OL ].
(2004-09-12). http:/ / www. ietf. org / rfc / rfc3912. txt.
[19] Quinlan J R. C4. 5: Programs for Machine Learning
[M]. [S. l. ]:Morgan Kaufmann Publishers,1993.
[20] Kohavi R. A Study of Cross-validation and Bootstrap for
Accuracy Estimation and Model Selection[C] / / Proc. of
the 14th International Joint Conference on Artificial
Intelligence. Montreal, Canada: Morgan Kaufmann,
1995:1137-1143.
[21] Boser B E, Guyon I M, Vapnik V N. A Training
Algorithm for Optimal Margin Classifiers[C] / / Proc. of
the 5th Annual ACM Workshop on COLT. Pittsburgh, USA:ACM Press,1992:144-152.
[22] Platt J. Fast Training of Support Vector Machines Using
Sequential Minimal Optimization [ M ]. Cambridge, USA:MIT Press,1999.
编辑 顾逸斐 |