[1]GUPTA N,GUPTA S,PANDEY M.Evolution of new version of internet protocol(IPv6):replacement of IPv4[J].IITM Journal of Management and Information Technology,2017,8(1):86-89.
[2]BHUYAN M H,BHATTACHAYYYA D K,KALITA J K.A multi-step outlier-based anomaly detection approach to network-wide traffic[J].Information Sciences,2016,348:243-271.
[3]PAJIN D,VULETIC P V.OF2NF:flow monitoring in open flow environment using net flow/IPFIX[C]//Proceedings of the 1st IEEE Conference on Network Softwarization.Washington D.C.,USA:IEEE Press,2015:1-5.
[4]PATHAN A S K.Security of self-organizing networks:MANET,WSN,WMN,VANET[M].[S.1.]:Auerbach Publications,2016.
[5]MISHNE G,COHEN I.Iterative diffusion-based anomaly detection[C]//Proceedings of 2017 IEEE International Conference on Acoustics,Speech and Signal Processing.Washington D.C.,USA:IEEE Press,2017:1682-1686.
[6]YANG J,DENG J,LI S,et al.Improved traffic detection with support vector machine based on restricted Boltzmann machine[J].Soft Computing,2017,21(11):3101-3112.
[7]GOEL J N,MEHTRE B M.Advanced dynamic IPv6 activation-based defence for IPv6 router advertisement flooding attack[J].International Journal of Network Science,2016,1(2):155-166.
[8]屈猛.IPv4与IPv6双栈模式下网络数据监测与协议分析[D].吉林:吉林大学,2010.
[9]穆祥昆,王劲松,薛羽丰,黄玮.基于活跃熵的网络异常流量检测方法[J].通信学报,2013,34(S2):51-57.
[10]AHMED M,MAHMOOD A N,HU J.A survey of network anomaly detection techniques[J].Journal of Network and Computer Applications,2016,60(1):19-31.
[11]HINDEN R.Internet protocol,version 6 (IPv6) specification[EB/OL].[2018-03-21].http://www.smakd.potaroo.net/.
[12]FRECON J,FONTUGEN R,DIDIER G,et al.Non-linear regression for bivariate self-similarity identification——application to anomaly detection in internet traffic based on a joint scaling analysis of packet and byte counts[C]//Proceedings of 016 IEEE International Conference on Acoustics,Speech and Signal Processing.Washington D.C.,USA:IEEE Press,2016:4184-4188.
[13]CUI X,ZHU X,YANG K,et al.Optimized big data K-means clustering using MapReduce[J].The Journal of Supercomputing,2014,70(3):1249-1259.
[14]YUN U,KIM D,RYING H,et al.Mining recent high average utility patterns based on sliding window from stream data[J].Journal of Intelligent & Fuzzy Systems,2016,30(6):3605-3617.
[15]TERZI D S,TERZI R,SAGIROGLU S.Big data analytics for network anomaly detection from netflow data[C]//Proceedings of 2017 International Conference on Computer Science and Engineering.Washington D.C.,USA:IEEE Press,2017:592-597.
[16]BOND G W.An introduction to ECharts:the concise user manual[EB/OL].[2018-04-21].http://echarts.org.
|