[1] Sperotto A. An Overview of IP Flow-based Intrusion Detection[J]. IEEE Communications Surveys & Tutorials, 2010, 12(3): 343-356.
[2] Yang Yahui, Jiang Dianbo, Xia Min. Using Improved GHSOM for Intrusion Detection[J]. Journal of Information Assurance and Security, 2010, 5(3): 232-239.
[3] Bernaille L, Soule A, Akodjenou I, et al. Blind Application Recognition Through Behavioral Classi?cation[EB/OL]. (2009-02-06). http://www.cl.cam.ac.uk/~awm22/publications/ moore2005discriminators.pdf.
[4] Bernaille L, Teixeira R, Salamatian K. Early Application Iden- ti?cation[C]//Proc. of International Conference on Emerging Networking Experiments and Technologies. Lisboa, Portugal: [s. n.], 2006.
[5] Huang Nen-Fu, Jai Gin-Yuan, Chao Han-Chieh. Early Identi- fying Application Traffic with Application Characteristics[C]// Proc. of IEEE International Conference on Communications. [S. l.]: IEEE Press, 2008.
[6] Kayacik H G, Heywood N Z, Heywood M I. Selecting Features for Intrusion Detection: A Feature Relevance Analysis on KDD99 Intrusion Detection Datasets[C]//Proc. of the 3rd Annual Conference on Privacy, Security and Trust. [S. l.]: Springer, 2005.
[7] Li Zhinchun, Gao Yan, Chen Yan, et al. Towards a High-speed Router-based Anomaly/Intrusion Detection System[C]//Proc. of ACM Sigcomm’05. [S. l.]: ACM Press, 2005.
[8] Gao Yan, Li Zhinchun, Chen Yan. A Dos Resilient Flow-level Intrusion Detection Approach for High-speed Networks[C]// Proc. of the 26th IEEE International Conference on Distributed Computing Systems. [S. l.]: IEEE Press, 2006.
[9] Zhao Qi, Xu Jun, Kumar A. Detection of Super Sources and Destinations in High-speed Networks: Algorithms, Analysis and Evaluation[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(10): 1840-1852.
[10] Kim M S, Kong H J, Hong S C, et al. A Flow-based Method for Abnormal Network Traf?c Detection[C]//Proc. of IEEE/ IFIP Network Operations and Management Symposium. [S. l.]: IEEE Press, 2004: 599-612.
[11] Quittek J. Requirements for IP Flow Information Export (IPFIX)[EB/OL]. (2004-10-07). http://tools.ietf.org/html/rfc 3917#page-3.
[12] 曾文权. DDoS攻击原理及防御方法分析[J]. 计算机技术与发展, 2009, 19(7): 156-158.
[13] 蒋卫华, 李伟华, 杜 君. 缓冲区溢出攻击: 原理, 防御及检测[J]. 计算机工程, 2003, 29(10): 5-7.
[14] 李 凯. 基于统计特性的SYN Flood攻击防御方法研究[D]. 成都: 西南交通大学, 2009.
[15] Merkl R D, Dittenbach M. The Growing Hierarchical Self- organizing Map: Exploratory Analysis of High-dimensional Data[J]. IEEE Trans. on Neural Networks, 2002, 13(6): 1331- 1341.
编辑 顾逸斐 |