1. Department of Electronic Technology, Engineering University of Chinese Armed Police Force, Xi'an Shaanxi 710086, China
2. Institute of Network and Information Security, Engineering University of Chinese Armed Police Force, Xi'an Shaanxi 710086, China
BAI Qing SU Yang. Design of distributed honeypot system based on clustering and data shunting algorithm[J]. Journal of Computer Applications, 2013, 33(04): 1077-1080.
[1]田俊峰,刘永立. 一种新的蜜网模型——BRHNS[J].计算机工程与应用, 2007, 43(7): 139-143. [2]尚治宇.蜜罐系统的研究与实现[D].北京:北京交通大学,2010.[3]曹付元.面向分类数据的聚类算法研究[D]. 太原:山西大学,2010. [4]KDD99.KDD99 cupdataset[EB/OL].[2005-11-02].http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html. [5]Intrusion detection working group.Intrusion detection message exchange format data model and EXtensible Markup Language (XML)document type definition[R].Internet-Draft,2003:21-26.[6]朱明. 数据挖掘[M]. 合肥:中国科技大学出版社,2002.[7]孙吉贵,刘杰,赵连宇. 聚类算法研究[J].软件学报,2008, 19(1): 45-61.[8]RALAMBONDRAINY H. A conceptual version of the k-means algorithm[J].Pattern Recognition Letters,1995,16(11):1147-1157.[9]肖宇,于剑.基于近邻传播算法的半监督聚类[J].软件学报,2008,19(11):2803-2813.[10]JIANG R, LIU Q,LIU Q,et al. A proposal for the morphological classification and nomenclature of neurons [J]. Neural Regeneration Research, 2011,6(25):1925-1930.[11]XU R, WUNSCH D. Clustering[M]. Hoboken, New Jersey, USA: John Wiley & Sons, 2009.[12]杨博,刘大有,LIU J M, 金弟,等.复杂网络聚类方法[J].软件学报,2009,20(1):54-66.[13]ZHANG S H, WANG R S,ZHANG X S.Identification of overlapping community structure in complex networks using fuzzy c-means clustering[J].Physica A,2007,374(1):483-490.[14]石立宪.网络陷阱的研究与实现[D].大连:大连海事大学,2006.