[1] ENDSLEY M R. Situation Awareness Global Assessment Technique (SAGAT)[C]//Proceedings of the IEEE 1988 National Aerospace and Electronics Conference. Piscataway, NJ:IEEE, 1988:789-795. [2] BASS T. Intrusion detection systems & multisensor data fusion:creating cyberspace situational awareness[J]. Communications of the ACM, 1999, 43(4):99-105. [3] 陈秀真, 郑庆华, 管晓宏,等. 层次化网络安全威胁态势量化评估方法[J]. 软件学报, 2006, 17(4):885-897.(CHEN X Z, ZHENG Q H, GUANG X H, et al. Quantitative hierarchical threat evaluation model for network security[J]. Journal of Software, 2006, 17(4):885-897.) [4] 李伟生, 王宝树. 基于贝叶斯网络的态势评估[J]. 系统工程与电子技术, 2003, 25(4):480-483.(LI W S, WANG B S. Situation assessment based on Bayesian networks[J]. Systems Engineering and Electronics,2003,25(4):480-483.) [5] RAHNAVARD G, NAJJAR M S A, TAHERIFAR S. A method to evaluate Web services anomaly detection using hidden Markov models[C]//Proceedings of the 2010 International Conference on Computer Applications and Industrial Electronics. Piscataway, NJ:IEEE, 2010:261-265. [6] RNES A, VALEUR F, VIGNA G, et al. Using hidden Markov models to evaluate the risks of intrusions[C]//Proceedings of the 9th International Conference on Recent Advances in Intrusion Detection. Berlin:Springer-Verlag, 2006:145-164. [7] 邓聚龙. 灰预测与灰决策:灰色预测与决策[M]. 武汉:华中科技大学出版社, 2002:173-212.(DENG J L. Gray Prediction and Gray Decision:Gray Prediction and Gray Decision[M]. Wuhan:Huazhong University of Science and Technology Press, 2002:173-212.) [8] BOX G E P, JENKINS G M, REINSEL G C. Time Series Analysis[M]. 4th ed. Hoboken, NJ:John Wiley & Sons, 2013:137-191. [9] DUGAD R, DESAI U B. A tutorial on hidden Markov models[J]. Proceedings of the IEEE:Applications in Speech Recognition, 2000, 77(2):25-286. [10] 周东清, 张海锋, 张绍武,等. 基于HMM的分布式拒绝服务攻击检测方法[J]. Journal of Computer Research & Development, 2005, 42(9):1594-1599.(ZHOU D Q,ZHANG H F,ZHANG S W, et al. A DDoS attack detection method based on hidden Markov model[J]. Journal of Computer Research & Development, 2005, 42(9):1594-1599.) [11] JUANG B H, RABINER L R. A probabilistic distance measure for hidden Markov models[J]. AT&T Technical Journal, 1985, 64(2):391-408. [12] 康立山,谢云,尤矢勇,等. 非数值并行算法-模拟退火算法[M].北京:科学出版社,1994:56-59.(KANG L S,XIE Y,YOU S Y, et al. Numerical Parallel Algorithm-Simulated Annealing Algorithm[M].Beijing:Science Press, 1994:56-59.) [13] ROESCH M, GREEN C. Snort users manual[EB/OL].[2016-05-20].http://manual.snort.org/snort_manual.htlm [14] 李晓芳, 姚远. 入侵检测工具Snort的研究与使用[J]. 计算机应用与软件, 2006, 23(3):123-124.(LI X F,YAO Y. Master and use Snort tools for intrusion detection[J]. Computer Applications and Software, 2006, 23(3):123-124.) |