[1] 田家瑞, 张文政, 周颖杰, 等. 骨干通信网络流量告警信息关联分析[J]. 计算机应用研究, 2011, 28(1): 287-297. [2] Barakat C, Thiran P, Iannaccone G, et al. Modeling Internet Backbone Traffic at the Flow Level[J]. IEEE Transactions on Signal Processing Special Issue on Networking, 2003, 51(8): 2111-2124. [3] Estan C, Savage S, Varghese G. Automatically Inferring Pattern of Resource Consumption in Network Traffic[C]//Proceedings of SIGCOMM’03. Karlsruhe, Germany: ACM Press, 2003: 137-148. [4] Brauckhoff D, Dimitropoulos X, Wagner A. Anomaly Extraction in Backbone Networks Using Association Rules[C]//Proceedings of IMC’09. Chicago, Illinois, USA: [s. n.], 2009. [5] Zhang Yin, Singh S, Sen S, et al. Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications[C]//Proceedings of the 4th ACM Conference on Internet Measurement. [S. l.]: ACM Press, 2004. [6] Cormode G, Korn F, Muthukrishnan S, et al. Diamond in the Rough: Finding Hierarchical Heavy Hitters in Multi-dimensional Data[C]//Proceedings of SIGMOD’04. Paris, France: [s. n.], 2004: 155-166. [7] Silveira F, Diot C, Taft N, et al. ASTUTE: Detecting a Different Class of Traffic Anomalies[C]//Proceedings of SIGCOMM’10. New Delhi, India: ACM Press, 2010. [8] 钱叶魁, 陈 鸣, 郝 强, 等. ODC——在线检测和分类全网络流量异常的方法[J]. 通信学报, 2011, 32(1): 111-120. [9] Bakos G, Berk V. Early Detection of Internet Worm Activity by Metering ICMP Destination Unreachable Activity[C]//Proceedings of SPIE Conference on Sensors, and Command, Control, Communications and Intelligence. Orlando, USA: [s. n.], 2002: 33-42. [10] 颜若愚, 郑庆华. 使用交叉熵检测和分类网络异常流量[J]. 西安交通大学学报, 2010, 44(6): 10-15. [11] Lakhina A, Crovella M, Diot C. Mining Anomalies Using Traffic Feature Distributions[C]//Proceedings of SIGCOMM’05. [S. l.]: ACM Press, 2005: 217-228. [12] Thottan M, Ji C. Anomaly Detection in IP Networks[J]. IEEE Trans. on Signal Processing, 2003, 51(8): 2191-2204. [13] Kim M S, Kang H J, Hung S C, et al. A Flow-based Method for Abnormal Network Traffic Detection[C]//Proceedings of IEEE/IFIP Network Operations and Management Symposium. [S. l.]: IEEE Press, 2004. [14] 朱应武, 杨家海, 张金祥. 基于流量信息结构的异常检测[J]. 软件学报, 2010, 21(10): 2573-2583. [15] Zhao Xiaoliang, Pei Dan, Wang Lan, et al. Analysis of BGP Multiple Origin AS(MOAS) Con?icts[C]//Proceedings of IMW’01. [S. l.]: ACM Press, 2001. [16] Silverira F, Diot C. URCA: Pulling out Anomalies by Their Root Causes[C]//Proceedings of IEEE INFOCOM’10. San Diego, USA: IEEE Press, 2010. [17] Jain A K, Murty M N, Flynn P J. Data Clustering: A Review[J]. ACM Computing Surveys, 1999, 31(3): 264-323.
|