[1] Leland W E, Taqqu M S, Willinger W, et al. On the Self-similar Nature of Ethernet Traffic[J]. IEEE/ACM Trans. on Networking, 1994, 2(1): 1-15. [2] Chonka A, Singh J, Zhou Wanlei. Chaos Theory Based Detection Against Network Mimicking DDoS Attacks[J]. IEEE Commu- nications Letters, 2009, 13(9): 717-719. [3] Rawat S, Sastry C S. Network Intrusion Detection Using Wavelet Analysis[C]//Proc. of CIT’04. Hyderabad, India: [s. n.], 2004: 224-232. [4] Benetazzo L, Giorgi G, Narduzzi C, et al. On the Analysis of Communication and Computer Networks by Traffic Flow Measurements[J]. IEEE Trans. on Instrumentation and Measure- ment, 2007, 56(4): 1157-1164. [5] Giorgi G, Narduzzi C. Detection of Anomalous Behaviors in Networks From Traffic Measurements[J]. IEEE Trans. on Instrumentation and Measurement, 2008, 57(12): 2782-2791. [6] Li Zonglin, Hu Guangming, Zhou Ruqiang, et al. Traffic Model Analysis for Anomaly Detection[C]//Proc. of the International Conference on Information Computing and Automation. [S. l.]: IEEE Press, 2008: 1434-1437. [7] 吕良福, 张加万, 张 丹. 基于改进小波分析的DDoS攻击检测方法[J]. 计算机工程, 2010, 36(6): 29-31, 44. [8] Cheng Xiaorong, Xie Kun, Wang Dong. Network Traffic Anomaly Detection Based on Self-similarity Using HHT and Wavelet Transform[C]//Proc. of the 15th International Conference on Information Assurance and Security. [S. l.]: IEEE Press, 2009: 710-713. [9] 张 宾, 杨家海, 吴建平. Internet流量模型分析与评述[J]. 软件学报, 2011, 22(1): 115-131. [10] Oetiker T. MRTG[EB/OL]. (2010-05-17). http://www.mrtg.org/ rrdtool/. [11] Huang N E, Shen Zhen, Long R S. A New View of Nonlinear Water Waves——The Hilbert Spectrum[J]. Annual Reviews of Fluid Mechanics, 1999, 31(1): 417-457.
|