[1]XIE Y, YU S. A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors [J]. IEEE/ACM Transactions on Networking, 2009, 17(1):54-65.[2]XIE Y, TANG S, HUANG X, et al. Detecting latent attack behavior from aggregated Web traffic [J]. Computer Communications, 2013,36(8): 895-907.[3]OIKONOM G, MIRKOVIE J. Modeling human behavior of defense against flash-crowd attacks [C]// ICC09: Proceedings of the 2009 IEEE International Conference on Communications. Piscataway: IEEE, 2009:14-18.[4]CHEN Y, KU W-S, SAKAI K, et al. A novel DDoS attack defending framework with minimized bilateral damages [C]// Proceedings of the 7th IEEE Conference on Consumer Communications and Networking Conference. Piscataway: IEEE, 2010:1-5.[5]CHOI Y-S, JANG J-T, RYOU J-C. Integrated DDoS attack defense infrastructure for effective attack prevention [C]// Proceedings of 2010 2nd International Information Technology Convergence and Services. Piscataway: IEEE, 2010:71-76.[6]BEITOLLAHI H, DECONINCK G. Analyzing well-known countermeasures against distributed denial of service attacks [J]. Computer Communications, 2012,35(11):1312-1332.[7]BEITOLLAHI H, DECONINCK G. Tackling application-layer DDoS attacks [J]. Procedia Computer Science, 2012,10:432-441.[8]WEN S, JIA W J, ZHOU W, et al. CALD: surviving various application-layer DDoS attacks that mimic flash crowd [C]// NSS10: Proceedings of 2010 Fourth International Conference on Network and System Security. Washington, DC: IEEE Computer Society, 2010: 247-254. [9]孙钦东, 张德运, 高鹏. 基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报, 2005, 28(5):767-773.[10]HAYKLN S. Adaptive filter theory [M]. 3rd ed. Upper Saddle River, New Jersey: Prentlce-Hall, 1995.[11]YAN R Y, ZHENG Q H, LI H F. Combining adaptive filtering and if flows to detect DDoS attacks within a router [J]. KSII Transactions on Internet and Information Systems, 2010, 4(3): 428-449.[12]VIINIKKA J, DEBAR H. Processing intrusion detection alert aggregates with time series modeling [J]. Information Fusion, 2009,10(4):312-324.[13]PLATT J C. Sequential minimal optimization: a fast algorithm for training support vector machines, MSR-TR-98-14 [R/OL]. http://www.bradblock.com/Sequential_Minimal_Optimization_A_Fast_Algorithm_for_Training_Support_Vector_Machine.pdf.[14]ARLITT M, JIN T. 1998 World Cup Web Site Access Logs[EB/OL]. [2012-12-22]. http://www.acm.org/ sigcomm/ITA/. |