[1] 蒋文保,郝双,戴一奇,等.高速网络入侵检测系统负载均衡策略与算法分析[J].清华大学学报(自然科学版),2006,46(1):106-110.(JIANG W B, HAO S, DAI Y Q, et al. Load balancing algorithm for high-speed network intrusion detection systems[J]. Journal of Tsinghua University (Science and Technology), 2006, 46(1):106-110.) [2] 蔡志平,刘书昊,王晗,等.高性能并行入侵检测算法与框架[J].计算机科学与探索,2013,7(4):289-303.(CAI Z P, LIU S H, WANG H, et al. High performance parallel intrusion detection algorithms and framework[J]. Journal of Frontiers of Computer Science and Technology, 2013, 7(4):289-303.) [3] KUMAR M. Distributed intrusion detection system scalability enhancement using cloud computing[J]. Computer Science and Telecommunications, 2014, 41(1):16-29. [4] 张文兴,樊捷杰.基于KKT和超球结构的增量SVM算法的云架构入侵检测系统[J].计算机应用,2015,35(10):2886-2890.(ZHANG W X, FAN J J. Cloud architecture intrusion detection system based on KKT condition and hyper-sphere incremental SVM algorithm[J]. Journal of Computer Applications, 2015, 35(10):2886-2890.) [5] 程建,张明清,刘小虎,等.基于人工免疫的分布式入侵检测模型[J].计算机应用,2014,34(1):86-89.(CHENG J, ZHANG M Q, LIU X H, et al. Distributed intrusion detection model based on artificial immune[J]. Journal of Computer Applications, 2014, 34(1):86-89.) [6] 王明定,赵国鸿,陆华彪.基于网络流量特性分析的高速入侵检测分流算法[J].计算机应用研究,2010,27(9):3484-3486.(WANG M D, ZHAO G H, LU H B. Load balancing algorithm for high-speed IDS based on analysis of network traffic[J]. Application Research of Computers, 2010, 27(9):3484-3486.) [7] 王明定.高速网络入侵检测负载均衡算法研究与实现[D].长沙:国防科技大学,2010:4.(WANG M D. The research and implementation on load balancing algorithm in high-speed network for intrusion detection[D]. Changsha:National University of Defense Technology, 2010:4.) [8] SHI W, MACGREGOR M H, GBURZYNSKI P, et al. A novel load balancer for multiprocessor routers[EB/OL].[2016-01-08]. http://www.cs.ualberta.ca/macg/Pubs/2005/SPECTS-LOAD/FlowBal_I.pdf. [9] 张亚玲.高速网络入侵检测系统动态负载均衡策略的研究与实现[D].长沙:湖南大学,2010:7.(ZHANG Y L. Research and implementation on dynamic load-balancing strategy in high-speed network for intrusion detection system[D]. Changsha:Hunan University, 2010:7.) [10] 左晓军,董立勉,曲武.基于Spark框架的分布式入侵检测方法[J].计算机工程与设计,2015,36(7):1720-1726.(ZUO X J, DONG L M, QU W. Distributed intrusion detection approach based on the Spark framework[J]. Computer Engineering and Design, 2015, 36(7):1720-1726.) [11] 易发胜,龚海刚,汪海鹰.采用CBF技术的分布式入侵检测系统设计与实现[J].计算机工程与设计,2014,35(7):2339-2343.(YI F S, GONG H G, WANG H Y. Design and implementation of distributed intrusion detection systems based on counting bloom filter[J]. Computer Engineering and Design, 2014, 35(7):2339-2343.) [12] 陈一骄,卢锡城,时向泉,等.一种面向会话的自适应负载均衡算法[J].软件学报,2008,19(7):1828-1836.(CHEN Y J, LU X C, SHI X Q, et al. A session-oriented adaptive load balancing algorithm[J]. Journal of Software, 2008, 19(7):1828-1836.) [13] 陆华彪,赵国鸿,陈一骄,等.基于较大流调整的安全分流算法[J].计算机工程,2009,35(13):117-119.(LU H B, ZHAO G H, CHEN Y J, et al. Secure load balance algorithm based on moderate flow adjust[J]. Computer Engineering, 2009, 35(13):117-119.) [14] 王正霞,刘晓洁,梁刚.基于B+树快速调优的反馈式负载平衡算法[J].计算机应用,2011,31(3):609-612.(WANG Z X, LIU X J, LIANG G. Feedback pad balancing algorithm based on B+ tree fast tuning[J]. Journal of Computer Applications, 2011, 31(3):609-612.) [15] DAS A, NGUYEN D, ZAMBRENO J, et al. An FPGA-based network intrusion detection architecture[J]. IEEE Transactions on Information Forensics and Security, 2008, 3(1):118-132. |