[1] |
USSATH M, JAEGER D, CHENG Feng, et al.Advanced Persistent Threats: Behind the Scenes[C]//IEEE. Annual Conference on Information Science and Systems, March 16-18, 2016, Princeton, NJ, USA. NJ: IEEE, 2016: 181-186.
|
[2] |
GUAN Lei, HU Guangjun, WANG Zhuan.Research on Network Security Situational Awareness Technology Based on Big Data[J]. Netinfo Security, 2016, 16(9): 45-50.
|
|
管磊,胡光俊,王专.基于大数据的网络安全态势感知技术研究[J].信息网络安全,2016,16(9):45-50.
|
[3] |
NIU Weina.Research on Exfiltration Complex Network Attack Modeling and Identification Method[D]. Chengdu: University of Electronic Science and Technology in China, 2018.
|
|
牛伟纳. 窃密型复杂网络攻击建模与识别方法研究[D].成都:电子科技大学,2018.
|
[4] |
NING Zhuo, GONG Jian, GU Wenjie.Sampling Method for IDS in High Bandwidth Network[J]. Journal on Communications, 2009, 30(11): 27-36.
|
|
宁卓,龚俭,顾文杰. 高速网络中入侵检测的抽样方法[J]. 通信学报,2009,30(11):27-36.
|
[5] |
ZHAI Jinfeng, SUN Libo, LU Kai, et al.Research on Flow Sampling Algorithm Based on Counting Bloom Filter[J]. Computer Engineering, 2018, 44(8): 279-284.
|
|
翟金凤,孙立博,鲁凯,等. 基于Counting Bloom Filter的流抽样算法研究[J]. 计算机工程,2018,44(8):279-284.
|
[6] |
LUO Ling.Anomaly Detection of Backbone Network Based on Dimensionality Reduction[D]. Hefei: University of Science and Technology of China, 2015.
|
|
罗玲. 基于降维的骨干网流量异常检测研究[D].合肥:中国科学技术大学,2015.
|
[7] |
LIU Wei, LIU Shang, BAI Runcai, et al.Reducing Training Times in Neural Network Classifiers by Using Dynamic Data Reduction[J]. CAAI Transactions on Intelligent Systems, 2017, 12( 2): 258-265.
|
|
刘威,刘尚,白润才,等. 动态数据约简的神经网络分类器训练方法研究[J]. 智能系统学报,2017,12(2):258-265.
|
[8] |
SU Liya, YAO Yepeng, LI Ning, et al.Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow Detection[C]//IEEE. 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), August 1-3, 2018, New York, NY, USA. NJ: IEEE, 2018: 744-753.
|
[9] |
MA Xuejun.Research on the Method of Traffic Anomaly Detection for Large-scale Network[D]. Changchun: Jilin University. 2018
|
|
马雪君. 大规模网络流量异常检测方法研究[D].长春:吉林大学. 2018.
|
[10] |
AHN S H, KIM N U, CHUNG T M.Big Data Analysis System Concept for Detecting Unknown Attacks[C]//IEEE. The 16th International Conference on Advanced Communication Technology, February 16-19, 2014, Pyeongchang, South Korea. NJ: IEEE, 2014: 269-272.
|
[11] |
GUO Chun.Research on Key Technologies of Network Intrusion Detection Based on Data Mining[D]. Beijing: Beijing University of Posts and Telecommunications, 2014.
|
|
郭春. 基于数据挖掘的网络入侵检测关键技术研究[D].北京:北京邮电大学,2014
|
[12] |
WANG Sunan, LI Yinhai, LUO Xingguo.Anomalous Attack Traffic Detection Based on Stratified Sampling Algorithm[J]. Computer Engineering, 2012, 38(12): 105-109.
|
|
王苏南,李印海,罗兴国. 基于分层抽样算法的异常攻击流量检测[J]. 计算机工程,2012,38(12):105-109.
|
[13] |
CLAFFY K C, POLYZOS G C, BRAUN H W.Application of Sampling Methodologies to Network Traffic Characterization[J]. ACM SIGCOMM Computer Communication Review, 1993, 23(4): 194-203.
|
[14] |
ZHU Yu, WANG Tian.Construction and Application of Dynamic Sampling Frame in Network Data Environment[J]. Statistics & Decision, 2019(2): 5-8.
|
|
朱钰,王恬. 网络数据环境下动态抽样框的构建及其应用[J]. 统计与决策,2019(2):5-8.
|
[15] |
ZHANG Zhonglin.Research The Detection Applications of Network Quality[D]. Beijing: Beijing University of Posts and Telecommunications, 2015.
|
|
张忠琳. 网络质量探测应用的研究[D]. 北京:北京邮电大学,2015.
|
[16] |
ZHANG Linlin.Research on Sampling Algorithms in Network Traffic Measuremen[D]. Qufu: Qufu Normal University, 2015.
|
|
张淋淋. 网络流量测量中的抽样算法研究[D].曲阜:曲阜师范大学,2015.
|
[17] |
WANG Chunlong.Research on Network Heavy Flow Measurement[D]. Wuxi: Jiangnan University, 2014.
|
|
王春龙. 网络大流测量技术研究[D].无锡:江南大学,2014.
|
[18] |
CAO Jie.Research of Feature Reduction and Traffic Classification Method based on SVM[D]. Changchun: Jilin University. 2017.
|
|
曹杰. 基于SVM的网络流量特征降维与分类方法研究[D]. 长春:吉林大学,2017.
|
[19] |
CHENG Guang.Sampling Measurement and Behavior Analysis of Large-scale High-speed IP Network Traffic[D]. Nanjing: Southeast University, 2003.
|
|
程光. 大规模高速IP网络流量抽样测量及行为分析研究[D].南京:东南大学,2003.
|
[20] |
TATSUYA M, MASATO U, RYOICHI K.Identifying Elephant Flows through Periodically Sampled Packets[J]. Ieice Technical Report Information Networks, 2004, 104: 115-120.
|
[21] |
CHEN Song, WANG Shan, ZHOU Mingtian.Network Data Measurement and Statistics Model Based on Real-Time Analysis[J]. Acta Electronica Sinica, 2010, 38(5): 1177-1180.
|
|
陈松,王珊,周明天. 基于实时分析的网络测量抽样统计模型[J]. 电子学报,2010,38(5):1177-1180.
|
[22] |
DUFFIELD N, GROSSGLAUSER M.Trajectory Sampling With Unreliable Reporting[J]. ACM Transactions on Networking, 2008, 16(1): 37-50.
|
[23] |
ZHANG Jin, WU Jiangxing, NIU Xiaona.Space-Efficient Fair Packet Sampling Algorithm[J]. Journal of Software, 2010, 21(10): 2642-2655.
|
|
张进,邬江兴,钮晓娜.空间高效的数据包公平抽样算法[J].软件学报,2010,21(10):2642-2655.
|
[24] |
SALAMA A, SAATCHI R, BURKE D.Adaptive Sampling Technique Using Regression Modelling and Fuzzy Inference System for Network Traffic[J]. Studies in Health Technology & Informatics, 2017, 242: 592.
|
[25] |
SUN Yu.Research on Anomaly Detection Techniques of Network Traffic Based on Sampling Flow[D]. Beijing: Beijing Jiaotong University, 2018
|
|
孙宇. 基于抽样流的网络流量异常检测技术研究[D].北京:北京交通大学,2018.
|
[26] |
XIE Dongqing, ZHOU Zaihong, LUO Jiawei.An Algorithm Based on LRU and SCBF for Elephant Flows Identification and Its application in DDos Defense[J]. Journal of Comuter Research and Development, 2011, 48(8): 1517-1523.
|
|
谢冬青,周再红,骆嘉伟. 基于LRU和SCBF的大象流提取及其在DDoS防御中的应用[J]. 计算机研究与发展,2011,48(8):1517-1523.
|
[27] |
LI Heng, SHEN Huawei, CHENG Xueqi, et al.Review of Network High Flow Distributed Denial of Service Attack and Defense Mechanisms[J]. Netinfo Security, 2017, 17(5): 37-43.
|
|
李恒,沈华伟,程学旗,等.网络高流量分布式拒绝服务攻击防御机制研究综述[J].信息网络安全,2017,17(5):37-43.
|
[28] |
MAI J, CHUAH C N, SRIDHARAN A, et al.Is Sampled Data Sufficient for Anomaly Detection?[C]//ACM. The 6th ACM SIGCOMM Conference on Internet Measurement, October 25-27, Rio de Janeriro, Brazil. New York: ACM, 2006: 165-176.
|
[29] |
CHEN Liangchen, GAO Shu, LIU Baoxu, et al.Research Status and Development Trends on Network Encrypted Traffic Identification[J]. Netinfo Security, 2019, 19(3): 67-73.
|
|
陈良臣,高曙,刘宝旭,等. 网络加密流量识别研究进展及发展趋势[J].信息网络安全,2019,19(3):67-73.
|