[1]朱应武,杨家海,张金祥.基于流量信息结构的异常检测[J].软件学报,2010,21(10):2573-2583.
[2]王苏南.高速复杂网络环境下异常流量检测技术研究[D].郑州:解放军信息工程大学,2012.
[3]程发新,程栋.基于相对熵的残缺语言判断矩阵群排序方法[J].控制与决策,2015(3):479-484.
[4]NYCHIS G,SEKAR V,ANDERSEN D G,et al.An empirical evaluation of entropy-based traffic anomaly detection[C]//Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement.New York,USA:ACM Press,2008:151-156.
[5]BEREZINSKI P,PAWELEC J,MALOWIDZKI M,et al.Entropy-based internet traffic anomaly detection:a case study[C]//Proceedings of International Conference on Dependability and Complex Systems Depcos-relcomex.Berlin,Germany:Springer,2014:47-58.
[6]SANTIAGO-PAZ J,TORRES-ROMAN D,VELARDE-ALVARADO P.Detecting anomalies in network traffic using entropy and Mahalanobis distance[C]//Proceedings of International Conference on Electrical Communications and Computers.Washington D.C.,USA:IEEE Press,2012:86-91.
[7]XIE M,HU J,GUO S,et al.Distributed segment-based anomaly detection with Kullback-Leibler divergence in wireless sensor networks[J].IEEE Transactions on Information Forensics and Security,2017,12(1):101-110.
[8]张亚玲,韩照国.基于相对熵理论的多测度网络异常检测方法[J].计算机应用,2010,30(7):1771-1774.
[9]WANG H.Anomaly detection of network traffic based on prediction and self-adaptive threshold[J].International Journal of Future Generation Communication and Networking,2015,8(6):205-214.
[10]GAN F F.EWMA control chart under linear drift[J].Journal of Statistical Computationand Simulation,2012,38(1/2/3/4):181-200.
[11]冯兴杰,焦文欢.基于动态阈值的网络异常检测[J].计算机工程与设计,2012,33(6):2182-2186.
(下转第118页)
(上接第113页)
[12]TANG D,CHEN K,CHEN X S,et al.Adaptive EWMA method based on abnormal network traffic for LDoS attacks[J].Mathematical Problems in Engineering,2014(3):166-183.
[13]曹敏,程东年,张建辉,等.基于自适应阈值的网络流量异常检测算法[J].计算机工程,2009,35(19):164-166.
[14]罗娜,李爱平,吴泉源,等.基于概要数据结构可溯源的异常检测方法[J].软件学报,2009,20(10):2899-2906.
[15]HETTICH S,BAY S D.KDD CUP 1999 data [EB/OL].[2018-01-17].http://kdd.ics.uci.edu/databases/kddcu p99/kddcup99.html.
[16]张新有,曾华燊,贾磊.入侵检测数据集KDD CUP99研究[J].计算机工程与设计,2010,31(22):4809-4812.
[17]赵新星,姜青山,陈路莹,等.一种面向网络入侵检测的特征选择方法[J].计算机研究与发展,2009,46(s2):852-857.
[18]陈庄,罗告成.一种改进的K-means算法在异常检测中的应用[J].重庆理工大学学报,2015,29(5):66-70. |