[1]ASHFAQ A. A comparative evaluation of anomaly detectors under portscan attacks [C]// Proceedings of the 11th International Symposium on Recent Advances in Intrusion Detection. Berlin: Springer-Verlag, 2008: 351-371.[2]FEI R. ADIC: an anomaly detection algorithm using incremental clustering[J]. Journal of Information and Computational Science, 2009, 6(2): 1051-1057.[3]PASCHALIDIS L, CHEN Y. Anomaly detection in sensor networks based on large deviations of Markov chain model[C]// Proceedings of the 47th IEEE Conference on Decision and Control. Piscataway, NJ: IEEE Press, 2008: 2338-2343.[4]PATCHA A, PARK J. An overview of anomaly detection tech-niques: existing solutions and latest technological trends[J]. Computer Networks, 2007, 51(12): 3448-3470.[5]侯重远,江汉红,芮万智,等. 工业网络流量异常检测的概率主成分分析法[J]. 西安交通大学学报, 2012, 46(2): 70-75.[6]ZAI Z, HAKAMI S, MOORS T, et al. Detection and identification of anomalies in wireless mesh networks using principal component analysis[J]. Journal of Interconnection Networks, 2009, 10(4): 517-534.[7]张文铸,刘佳,袁坚,等. 基于PCA的对等网络流量时空特性监测[J]. 清华大学学报:自然科学版, 2010, 50(4): 561-564.[8]熊伟,胡汉平,王祖喜,等. 基于突变级数的网络流量异常检测[J]. 华中科技大学学报:自然科学版, 2011, 39(1): 28-31.[9]肖海军,王小非,洪帆,等. 基于特征选择和支持向量机的异常检测[J]. 华中科技大学学报:自然科学版, 2008, 36(4): 99-102.[10]PASCHALIDIS I, SMARAGDAKIS G. Spatio-temporal network anomaly detection by assessing deviations of empirical measures[J]. IEEE/ACM Transactions on Networking, 2009, 17(3): 685-697.[11]SEONG S, REDDY A. Statistical techniques for detecting traffic anomalies through packet header data[J]. IEEE Transactions on Networking, 2008, 16(3): 562-575.[12]SCHWELLER R, LI Z C, CHEN Y, et al. Reversible sketches: enabling monitoring and analysis over high-speed data streams[J]. Transactions on Networking, 2007,15(5):1059-1072.[13]杨柳静,秦涛,王晨旭. 应用交互式网络流模型的高速网络异常行为检测与控制方法[J]. 西安交通大学学报, 2012, 46(6): 1-7.[14]雷秀娟,黄旭,吴爽,等. 基于连接强度的PPI网络蚁群优化聚类算法[J]. 电子学报, 2012, 40(4): 695-702.[15]田建芳,雷秀娟.基于蜂群和广度优先遍历的PPI网络聚类[J]. 模式识别与人工智能, 2012, 25(3): 481-490. |