[1] 付钰,李洪成,吴晓平,等.基于大数据分析的APT攻击检测研究综述[J].通信学报,2015,36(11):1-14.(FU Y,LI H C,WU X P,et al.Detecting APT attacks:a survey from the perspective of big data analysis[J].Journal on Communications,2015,36(11):1-14.) [2] CHEN P,DESMET L,HUYGENS C.A study on advanced persistent threats[C]//CMS 2014:Proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security,LNCS 8735.Berlin:Springer-Verlag,2014:63-72. [3] VIRVILIS N,GRITZALIS D A.The big four-what we did wrong in advanced persistent threat detection?[C]//ARES'13:Proceedings of the 2013 International Conference on Availability,Reliability and Security.Washington,DC:IEEE Computer Society,2013:248-254. [4] YANG G,TIAN Z,DUAN W.The prevent of advanced persistent threat[J].Journal of Chemical and Pharmaceutical Research,2014,6(7):572-576. [5] XIA Q.Log-based network security audit system research and design[J].Advanced Materials Research,2010,129-131:1426-1431. [6] LV T,LIU P.Multi-Agent network security audit system based on information entropy[C]//SWS 2010:Proceedings of the 2010 IEEE 2nd Symposium on Web Society.Piscataway:IEEE,2010:367-371 [7] HUANG X,HUENG X,QUAN P.Research on firewall system for confidential network[J].Advanced Materials Research,2012,434-440:4279-4283. [8] 张树壮,罗浩,方滨兴.面向网络安全的正则表达式匹配技术[J].软件学报,2011,22(8):1838-1854.(ZHANG S Z,LUO H,FANG B X.Regular expressions matching for network security[J].Journal of Software,2011,22(8):1838-1854.) [9] 邵妍.正则表达式匹配算法并行化技术研究[D].北京:北京邮电大学,2013:15-18.(SHAO Y.Parallelization technology of regular expression matching algorithms[D].Beijing:Beijing University of Posts and Telecommunications,2013:15-18.) [10] YU F,CHEN Z F,DIAO Y L,et al.Fast and memory-efficient regular expression matching for deep packet inspection[C]//ANCS'06:Proceedings of the 2006 IEEE/ACM Symposium on Architectures for Networking and Communications Systems.New York:ACM,2006:93-102. [11] 蔡良伟,程璐,李军,等.基于遗传算法的正则表达式规则分组优化[J].深圳大学学报(理工版),2015,32(3):281-289.(CAI L W,CHENG L,LI J,et al.Regular expression grouping optimization based on genetic algorithm[J].Journal of Shenzhen University (Science and Engineering),2015,32(3):281-289.) [12] 张运明.协议行为审计关键技术研究与实现[D].长沙:国防科学技术大学,2010:11-13.(ZHANG Y M.The research and implementation of the key technology of protocol behavior audit[D].Changsha:National University of Defense Technology,2010:11-13.) [13] 陈曙晖,苏金树.基于内容分析的协议识别研究[J].国防科技大学学报,2008,30(4):82-87.(CHEN S H,SU J S.Protocol identification research based on content analysis[J].Journal of National University of Defense Technology,2008,30(4):82-87.) |