[1] JIANG P, WEN Q, LI W, et al. An anonymous and efficient remote biometrics user authentication scheme in a multi server environment[J]. Frontiers of Computer Science, 2015, 9(1):142-156. [2] 王英,向碧群.基于用户行为的入侵检测系统[J].计算机工程,2008,34(9):167-169. (WANG Y, XIANG B Q. Intrusion detection system based on user behavior[J]. Computer Engineering, 2009, 34(9):167-169.) [3] 王平,汪定,黄欣沂.口令安全研究进展[J].计算机研究与发展,2016,53(10):2173-2188. (WANG P, WANG D, HUANG X Y. Advances in password security[J]. Journal of Computer Research and Development, 2008, 34(9):167-169.) [4] HE D, WANG D. Robust biometric-based authentication scheme for multiserver environment[J]. IEEE Systems Journal, 2015, 9(3):816-823. [5] WANG D, WANG P. Two birds with one stone:two-factor authentication with security beyond conventional bound[J]. IEEE Transactions on Dependable and Secure Computing, 2016(99):1-22. [6] KENT A D, LIEBROCK L M. Differentiating user authentication graphs[C]//SPW'13:Proceedings of the 2013 IEEE Security and Privacy Workshops. Washington, DC:IEEE Computer Society, 2013:72-75. [7] JOHNSON A, DEMPSEY K, ROSS R, et al. Guide for security configuration management of information systems[EB/OL].[2017-03-06]. http://www.gocs.eu/pages/fachberichte/archiv/045-draft_sp800-128-ipd.pdf. [8] AGARWAL N, SACHS E, KONG G, et al. Central account manager:US, US8789147[P]. 2014-07-22. [9] 赛迪网.2016网络安全大事件[R/OL].[2018-08-01]. http://www.ccidnet.com/2016/0801/10162993.shtml. (CCIDNET. Network security big event of 2016.[R/OL].[2016-08-01]. http://www.ccidnet.com/2016/0801/10162993.shtml.) [10] 启明星辰yepeng.八大典型APT攻击过程详解[R/OL]. (2013-08-27)[2017-01-15]. http://netsecurity.51cto.com/art/201308/408470.htm. (YE P. 8 typical APT attack process analysis in detail[R/OL]. (2013-08-27)[2017-01-15]. http://netsecurity.51cto.com/art/201308/408470.htm.) [11] KENT A D, LIEBROCK L M, NEIL J C. Authentication graphs:analyzing user behavior within an enterprise network[J]. Computers & Security, 2015, 48:150-166. [12] JAVED M. Detecting credential compromise in enterprise networks[D]. Berkeley:University of California, Electrical Engineering and Computer Sciences, 2016. [13] 饶鲜,董春曦,杨绍全.基于支持向量机的入侵检测系统[J].软件学报,2003,14(4):798-803. (RAO X, DONG C X, YANG S Q. An intrusion detection system based on support vector machine[J]. Journal of Software, 2003, 14(4):798-803.) [14] CHITRAKAR R, HUANG C. Selection of candidate support vectors in incremental SVM for network intrusion detection[J]. Computers & Security, 2014, 45:231-241. [15] 何大韧,刘宗华,汪秉宏,等.复杂网络与系统[M].北京:高等教育出版社,2009:148. (HE D R, LIU Z H, WANG B H, et al. Complex Networks and Systems[M].Beijing:Higher Education Press, 2009:148.) [16] KENT A D. Cyber security data sources for dynamic network research[M]//Networks and Cyber-Security. River Edge, NJ:World Scientific Publishing Company, 2016:37-65. [17] 周志华,杨强.机器学习及其应用[M].北京:清华大学出版社,2011:95. (ZHOU Z H, YANG Q. Statistical Learning Method[M]. Beijing:Tsinghua University Press, 2011:95.) |