[1] 罗华,胡光岷,姚兴苗.基于网络全局流量异常特征的DDoS攻击检测[J].计算机应用,2007,27(2):314-317.(LUO H, HU G M, YAO X M. DDoS attack detection based on global network properties of network traffic anomaly[J]. Journal of Computer Applications, 2007, 27(2):314-317.) [2] 王风宇,曹首峰,肖军,等.一种基于Web群体外联行为的应用层DDoS检测方法[J].软件学报,2013,24(6):1263-1273.(WANG F Y, CAO S F, XIAO J, et al. Method of detecting application layer DDoS based on the out-linking behavior community[J]. Journal of Software, 2013,24(6):1263-1273.) [3] CHEN X, HEIDEMANN J. Flash crowd mitigation via adaptive admission control based on application-level observations[J]. ACM Transactions on Internet Technology, 2005, 5(3):532-569. [4] 孙未,张亚平.基于用户忠实度的应用层DDoS防御模型[J].计算机工程与设计,2015,36(1):93-97.(SUN W, ZHANG Y P. Application layer DDoS defense model based on user loyalty[J]. Computer Engineering and Design, 2015, 36(1):93-97.) [5] 赵国锋,喻守成,文晟.基于用户行为分析的应用层DDoS攻击检测方法[J].计算机应用研究,2011,28(2):717-719.(ZHAO G F, YU S C, WEN S. Detecting application-layer DDoS attack based on analysis of users' behaviors[J]. Application Research of Computers, 2011,28(2):717-719.) [6] 肖军,云晓春,张永铮.基于会话异常度模型的应用层分布式拒绝服务攻击过滤[J].计算机学报,2010,33(9):1713-1724.(XIAO J, YUN X C, ZHANG Y Z. Defend against application-layer distributed denial-of-service attacks based on session suspicion probability model[J]. Chinese Journal of Computers, 2010, 33(9):1713-1724.) [7] PARK K, PAI V, LEE K, CALO S. Securing Web service by automatic robot detection[C]//Proceedings of the Annual Conference on USENIX' 06 Annual Technical Conference. Berkeley, CA:USENIX Association, 2006:23-28. [8] PAUL V, PRASADH K, SANKARANARAYANAN(无名字). Application:DDoS attacks resistance scheme using polynomial distribution model[C]//Proceedings of the 2013 Third International Conference on Advances in Computing and Communications. Washington, DC:IEEE Computer Society, 2013:304-307. [9] EMMERIK M V. Static single assignment for decompilation[D]. Brisbane:University of Queensland, 2007. [10] RAJESH S. Protection from application layer DDoS attacks for popular Websites[J]. International Journal of Computer & Electrical Engineering, 2013, 5(6):555-558. [11] 田俊峰,韩金娥,杜瑞忠,等.基于软件行为轨迹的可信性评价模型[J].计算机研究与发展,2012,49(7):1514-1524.(TIAN J F, HAN J E, DU R Z, et al. Creditability evaluation model based on software behavior trace[J]. Journal of Computer Research and Development, 2012, 49(7):1514-1524.) [12] Music machines-HTTP[EB/OL].[2016-04-10] . http://www.cs.washington.edu/research/adaptive/download.html. |