[1] BOUKHYOUTA A,MOKHOV S A,LAKHDARI N E,et al.Network malware classification comparison using DPI and flow packet headers[J].Journal of Computer Virology and Hacking Techniques,2016,12(2):69-100. [2] BARFORD P,KLINE J,PLONKA D,et al.A signal analysis of network traffic anomalies[C]//Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment.New York,USA:ACM Press,2002:71-82. [3] ZHOU Yingjie,HU Guangming.GNAED:a data mining framework for network-wide abnormal event detection in backbone networks[C]//Proceedings of IPCCC'11.Washington D.C.,USA:IEEE Press,2011:1-2. [4] NGUYEN T T T,ARMITAGE G.A survey of techniques for internet traffic classification using machine learning[J].IEEE Communications Surveys and Tutorials,2008,10(4):56-76. [5] AKOGLU L,TONG H,KOUTRA D.Graph based anomaly detection and description:a survey[J].Data Mining and Knowledge Discovery,2015,29(3):626-688. [6] KARAGIANNIS T,PAPAGIANNAKI K,FALOUTSOS M.BLINC:multilevel traffic classification in the dark[J].Computer Communications,2005,35(4):229-240. [7] ILIOFOYOU M,PAPPU P,FALOUTSOS M.et al.Network monitoring using traffic dispersion graphs[C]//Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement.New York,USA:ACM Press,2007:315-320. [8] ILIOFOYOU M,PAPPU P,FALOUTSOS M,et al.Network traffic analysis using traffic dispersion graphs:techniques and hardware implementation[EB/OL].[2018-08-10].https://www.docin.com/p-1647584729. [9] ILIOFOYOU M,KIM H C,FALOUTSOS M,et al.Graph-based p2p traffic classification at the internet backbone[C]//Proceedings of IEEE INFOCOM Workshops.Washington D.C.,USA:IEEE Press,2009:1-6. [10] JIN Yu,SHARAFUDDIN E,ZHANG Zhili.Unveiling core network-wide communication patterns through application traffic activity graph decomposition[C]//Proceedings of the 11th International Joint Conference on Measurement and Modeling of Computer Systems.New York,USA:ACM Press,2015:49-60. [11] JIANG N,CAO J,JIN Y,et al.Identifying suspicious activities through DNS failure graph analysis[C]//Proceedings of the 18th IEEE International Conference on Network Protocols.Kyoto,Japan:[s.n.],2010:5-8. [12] XU Kuai,WANG Feng.Behavioral craph analysis of internet applications[C]//Proceedings of IEEE GLOBECOM'11.Houston,USA:[s.n.],2011:123-135. [13] XU Kuai,WANG Feng,GU Lin.Network-aware behavior clustering of internet end hosts[C]//Proceedings of INFOCOM'11.Shanghai,China:[s.n.],2011:257-268. [14] XU Kuai,WANG Feng,GU Lin.Behavior analysis of internet traffic via bipartite graphs and one-mode projections[J].IEEE/ACM Transactions on Networking,2014,22(3):236-245. [15] 张震,汪斌强,陈鸿昶,等.互联网中基于用户连接图的流量分类机制[J].电子与信息学报,2013,35(4):958-964. [16] LIU L,SAHA S,TORRES R,et al.Detecting malicious clients in ISP networks using http connectivity graph and flow information[C]//Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining.Washington D.C.,USA:IEEE Press,2014:150-157. [17] 刘峤,李杨,段宏,等.知识图谱构建技术综述[J].计算机研究与发展,2016,53(3):582-600. [18] 程学旗,靳小龙,王元卓,等.大数据系统和分析技术综述[J].软件学报,2014,25(9):1889-1908. [19] 汪小帆,李翔,陈关荣.网络科学导论[M].北京:高等教育出版社.2012. |