[1] |
JOE STEWART . Storm Worm DDOS Attack[R]. SecureWorks,Inc,Atlanta GA, 2007.
|
[2] |
GRIZZARD J B , SHARMA V , NUNNERY C . Peer-to-peer botnets:overview and case study[A]. HotBots’07 conference[C]. 2007.
|
[3] |
SARAT S , TERZIS A . Measuring the Storm Worm Network[R]. Technical Report 01-10-2007,HiNRG Johns Hopkins University, 2007.
|
[4] |
HOLZ T , STEINER M , DAHL F . Measurements and mitigation of peer-to-peer-based botnets:a case study on storm worm[A]. 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats[C]. San Francisco, 2008.
|
[5] |
STEGGINK M , IDZIEJCZAK I . Detection of Peer-to-Peer Botnets[R]. University of Amsterdam,Netherlands, 2007.
|
[6] |
PORRAS P , SAIDI H , YEGNESWARAN V . A multi-perspective analysis of the storm (peacomm)worm[A]. Computer Science Laboratory,SRI International[C]. CA, 2007.
|
[7] |
王海龙, 胡宁, 龚正虎 . Bot_CODA:僵尸网络协同检测体系结构[J]. 通信学报, 2009,30(10A): 15-22. WANG H L , HU N , GONG Z H . Bot_CODA:botnet collaborative detection architecture[J]. Journal on Communications, 2009,30(10A): 15-22.
|
[8] |
王劲松, 刘帆, 张健 . 基于组特征过滤器的僵尸主机检测方法的研究[J]. 通信学报, 2010,31(2): 29-35. WANG J S , LIU F , ZHANG J . Botnet detecting method based on group-signature filter[J]. Journal on Communications, 2010,31(2): 29-35.
|
[9] |
臧天宁, 云晓春, 张永铮 . 僵尸网络关系云模型分析算法[J]. 武汉大学学报(信息科学版), 2012,37(2): 247-251. ZANG T N , WANG X CCC , ZHANG Y Z . A botnet relationship analyzer based on cloud model[J]. Geomatics and Information Science of Wuhan University, 2012,37(2): 247-251.
|
[10] |
诸葛建伟, 韩心慧, 周勇林 . 僵尸网络研究[J]. 软件学报, 2008,19(3): 702-715. ZHUGE J W , HAN X H , ZHOU Y L . Research and development of botnets[J]. Journal of Software, 2008,19(3): 702-715.
|
[11] |
江健, 诸葛建伟, 段海新 . 僵尸网络机理与防御技术[J]. 软件学报, 2012,23(1): 82-96. JIANG J , ZHUGE J W , DUAN H X . Research on botnet mechanisms and defenses[J]. Journal of Software, 2012,23(1): 82-96.
|
[12] |
LELAND W E , TAQQU M S , WILLINGER W . On the self-similar nature of Ethernet traffic(extended version)[J]. IEEE/ACM Trans on Networking, 1994,2(1): 1-15.
|
[13] |
BERAN J , SHERMAN R , TRAQQU M S . Long range dependence in variable bit rate video traffic[A]. IEEE Trans on Communication[C]. 1995,43(234): 1566-1579.
|
[14] |
KIM J S , KAHNG B , KIM D . Self-similarity in fractal and non-fractal networks[J]. Journal of the Korean Physical Society, 2008,52: 350-356.
|
[15] |
KARAGIANNIS T , MOLLE M , FALOUTSOS M . Understanding the Limitations of Estimation Methods for Long-range Dependence[R]. University of Califomia,Tech ReP:TRUCR-CS-2006-10245, 2006.
|
[16] |
KARAGIANNIS T , MOLLE M , FALOUTSOS M . Long-range dependence:Ten years of Internet traffic modeling[J]. IEEE Intenet Computing, 2004,8(5): 57-64.
|
[17] |
TARTAKOVSKY A G , ROZOVSKII B , SHAH K . A Nonparametric Multichart CUSUM test for rapid intrusion detection[A]. Proceedings of Joint Statistical Meetings[C]. 2005.
|
[18] |
KASERA S , PINHEIRO J , LOADER C . Fast and robust signaling overload control[A]. Proceedings of Ninth International Conference on Network Protocols[C]. 2001. 323-331.
|
[19] |
SEN S , SPATSCHECK O , WANG D M . Accurate,scalable in-network identification of P2P traffic using application signatures[A]. Proceedings of the 13th international conference on World Wide Web[C]. New York, 2004. 512-521.
|