[1] |
SPRING N , MAHAJAN R , WETHERALL D . Measuring ISP topologies with rocketfuel[J]. ACM Sigcomm Computer Communication Review, 2002,32(4): 133-145.
|
[2] |
DUARTE , FELIPE S L G , SIKANSI ,et al. Nmap:a novel neighborhood preservation space-filling algorithm[J]. IEEE Transactions on Visualization & Computer Graphics, 2014,20(12): 2063-2071.
|
[3] |
NORWAWI N M , GHAZALI O , FAAEQ M ,et al. Detection algorithm for Internet worms scanning that used user datagram protocol[J]. International Journal of Information and Computer Security, 2019,11(1): 17-32.
|
[4] |
TUNG T M , WANG C , WANG J . Understanding the behaviors of BGP-based DDoS protection services[C]// International Conference on Network and System Security. Springer,Cham, 2018: 463-473.
|
[5] |
LAROSE D T , LAROSE C D . Discovering knowledge in data:an introduction to data mining[M]. John Wiley & Sons, 2014.
|
[6] |
POOR H V . An introduction to signal detection and estimation[M]. Springer Science & Business Media, 2013.
|
[7] |
HOWSON C , URBACH P . Scientific reasoning:the Bayesian approach[M]. Open Court Publishing, 2006.
|
[8] |
BENFERHAT S , KENAZA T , MOKHTARI A . A naive bayes approach for detecting coordinated attacks[C]// 32nd Annual IEEE International Computer Software and Applications Conference. IEEE, 2008: 704-709.
|
[9] |
CHANDOLA V , BANERJEE A , KUMAR V . Anomaly detection:a survey[J]. ACM Computing Surveys (CSUR), 2009,41(3):15.
|
[10] |
PATCHA A , PARK J M . An overview of anomaly detection techniques:existing solutions and latest technological trends[J]. Computer Networks, 2007,51(12): 3448-3470.
|
[11] |
TEMPLETON S J . Detection and analysis of cyber attacks using bio-based concepts[D]. Pro Quest Dissertations Publishing, 2018.
|
[12] |
STONE L D , STREIT R L , CORWIN T L ,et al. Bayesian multiple target tracking[M]. Artech House, 2013.
|
[13] |
KALMAN R E . A new approach to linear filtering and prediction problems[J]. Journal of basic Engineering, 1960,82(1): 35-45.
|
[14] |
WITTEN I H , FRANK E , HALL M A ,et al. Data mining:practical machine learning tools and techniques[M]. Morgan Kaufmann, 2016.
|
[15] |
COHEN P , WEST S G , AIKEN L S . Applied multiple regression/correlation analysis for the behavioral sciences[M]. Psychology Press, 2014.
|
[16] |
HO J W , WRIGHT M . Distributed detection of sensor worms using sequential analysis and remote software attestations[J]. IEEE Access, 2017,5: 680-695.
|
[17] |
SUN X , DAI J , LIU P ,et al. Using Bayesian networks for probabilistic identification of zero-day attack paths[J]. IEEE Transactions on Information Forensics and Security, 2018,13(10): 2506-2521.
|
[18] |
JIANG G , CHEN H , UNGUREANU C ,et al. Multiresolution abnormal trace detection using varied-Length $ n $-grams and automata[J]. IEEE Transactions on Systems,Man,and Cybernetics,Part C (Applications and Reviews), 2006,37(1): 86-97.
|