[1]ADAS A. Traffic models in broadband networks [J].IEEE Communications Magazine, 1997,35(7): 82-89.
[2]SANG A, LI S-Q. A predictability analysis of network traffic [J].Computer Networks,2002,39(4): 329-345.
[3]ZHANG Y, LEE W. Intrusion detection in wireless Ad-Hoc networks [C]// MobiCom '00: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. New York: ACM, 2000: 275-283.
[4]BARFORD P, KLINE J, PLONKA D, et al. A signal analysis of network traffic anomalies [C]// IMW '02: Proceedings of the ACM SIGCOMM Workshop on Internet Measurement. New York: ACM, 2002: 71-82.
[5]QIAO Y, XIN X W, BIN Y, et al. Anomaly intrusion detection method based on HMM [J].Electronics Letters,2002,38(13): 663-664.
[6]PASCHALIDIS I C, SMARAGDAKIS G. Spatio-temporal network anomaly detection by assessing deviations of empirical measures [J].IEEE/ACM Transactions on Networking, 2009,17(3): 685-697.
[7]刘运,蔡志平,钟平,等.基于条件随机场的DDoS 攻击检测方法[J].软件学报, 2011,22(8): 1897-1910.
[8]任勋益,王汝传,王海艳.基于自相似检测DDoS攻击的小波分析方法[J].通信学报, 2006,27(5): 6-11.
[9]袁坚, 任勇, 刘锋,等.复杂计算机网络中的相变和整体关联行为[J].物理学报, 2001,50(7): 1220-1225.
[10]LU JINJUN, WANG ZHIQUAN. Internet traffic data flow forecast by RFB neural network based on phase space reconstruction [J].Transactions of Nanjing University of Aeronautics and Astronautics, 2006,23(4): 316-322.
[11]DAUBECHIES I. Ten lectures on wavelets [M]. Philadelphia: Society for Industrial and Applied Mathematics,2006.
[12]HAKEN H. Synergetic computers and cognition: a top-down approach to neural nets [M]. Berlin: Springer-Verlag,2004.
[13]YANG YUE, HU HAN-PING, XIONG WEI, et al. Network traffic anomaly detection method based on a feature of catastrophe theory [J].Chinese Physics Letters, 2010,27(6): 060501-0605014.
[14]熊伟,胡汉平,王祖喜,等.基于突变级数的网络流量异常检测[J].华中科技大学学报:自然科学版,2011,39(1): 28-31. |