[1] |
ZHU Z , LU G , CHEN Y , et al. Botnet research survey[A]. Computer Software and Applications, 32nd Annual IEEE International[C]. 2008.967-972.
|
[2] |
ZHANG Y Z , XIAO JUN , YUN X C , et al. DDoS attack detection and control methods[J]. Journal of Software, 2012,23(8):2058-2072.
|
[3] |
SCHUBA C L , KRSUL I V , KUHN M G , et al. Analysis of a denial of service attack on TCP[A]. 1997 IEEE Symposium on Security and Privacy[C]. 1997.208-223.
|
[4] |
HOUMANSADR A , BORISOV N . The need for flow fingerprints to link correlated network Flows[A]. Privacy Enhancing Technologies[C]. Springer Berlin Heidelberg, 2013.205-224.
|
[5] |
PYUN Y J , PARK Y H , WANG X , et al. Tracing traffic through inter-mediate hosts that repacketize flows[A]. 26th IEEE International Con-ference on Computer Communications[C]. 2007.634-642.
|
[6] |
PYUN Y J , PARK Y , REEVES D S , et al. Interval-based flow water-marking for tracing interactive traffic[J]. Computer Networks, 2012,56(5):1646-1665.
|
[5] |
WANG X , CHEN S , JAJODIA S . Network flow watermarking attack on low-latency anonymous communication systems[A] IEEE Symposium on Security and Privacy[C] 2007.116-130.
|
[8] |
KIYAVASH N , HOUMANSADR A , BORISOV N . Multiflow attacks against network flow watermarking schemes[A]. Proceedings of 17th USENIX Security[C]. San Jose, 2008.307-320.
|
[9] |
YU W , FU X , GRAHAM S , et al. DSSS-based flow marking tech-nique for invisible traceback[A]. IEEE Symposium on Security and Privacy[C]. 2007.18-32.
|
[10] |
JIA W , TSO F P , LING Z , et al. Blind detection of spread spectrum flow watermarks[J]. Security and Communication Networks, 2013,6(3):257-274.
|
[11] |
HUANG J , PAN X , Fu X , et al. Long PN code based DSSS water-marking[A]. 2011 INFOCOM, Proceedings IEEE[C]. 2011.2426-2434.
|
[12] |
HOUMANSADR A , KIYAVASH N , BORISOV N . Multiflow attack resistant watermarks for network flows[A]. Proceedings of IEEE International Conference on Acoustic, Speech, and Processing[C]. 2009.1497-1500.
|
[13] |
王振兴, 张连成, 郭毅 等. 基于水印信息重排序的多流攻击反制方法[J]. 应用科学学报, 2013,31(3):278-284. WANG Z X , ZHANG L C , GUO Y , et al. Multi-flow attack resistance based on reordering of watermark bits[J]. Journal of Applied Sciences, 2013,31(3):278-284.
|
[14] |
HOUMANSADR A , KIYAVASH N , BORISOV N . Rainbow: a robust and invisible non-blind watermark for network flows[A]. Inndss[C]. 2009.
|
[15] |
WANG X , REEVES D S . Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays[A]. Proceedings of the 10th ACM conference on Computer and Communications Security[C].ACM, 2003.20-29.
|
[16] |
CHEN B , WORNELL G W . Quantization index modulation: a class of provably good methods for digital watermarking and information em-bedding[J]. IEEE Transactions on Information Theory, 2001,47(4):1423-1443.
|
[17] |
RABINER L R . A tutorial on hidden Markov models and selected applications in speech recognition[J]. Proceedings of the IEEE, 1989,77(2):257-286.
|
[18] |
EDDY S R . Hidden markov models[J]. Current opinion in structural biology, 1996,6(3):361-365.
|
[19] |
MINTZER F , BRAUDAWAY G W . If one watermark is good, are more better[A]. IEEE International Conference on Acoustics, Speech, and Signal Processing[C]. 1999.2067-2069.
|
[20] |
KIYAVASH N , HOUMANSADR A , BORISOV N . Multi-Flow attacks against network flow watermarks: analysis and countermeasures[J]. arXiv preprint arXiv:1203.1390, 2012.
|
[21] |
MATTHEW C , DAVEY , DAVID et al. Reliable communication over channels with insertions, deletions, and substitutions[J]. IEEE Transactions on Information Theory, 2001,47:687-698.
|
[22] |
BAVIER A C , BOWMAN M , CHUN B N , et al. Operating systems support for planetary-scale network services[A]. NSDI[C]. 2004.19-19.
|
[23] |
ELTOFT T , KIM T , LEE T W , et al. On the multivariate Laplace distribution[J]. Signal Processing Letters,IEEE, 2006,13(5):300-303.
|
[24] |
HAZEWINKEL M . Normal distribution[J]. Encyclopedia of Mathematics, 2001,13(6):337-342.
|
[25] |
GRIMALDI R P . Discrete and Combinatorial Mathematics: An Applied Introduction 5th ed[M]. Massachusetts: Addison Wesley, 2003.
|
[26] |
DONOHO D L , FLESIA A G , SHANKAR U , et al. Multiscale step-ping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay[A]. Recent Advances in Intrusion Detection[C]. Springer Berlin Heidelberg, 2002.17-35.
|
[27] |
MASSEY JR F J . The Kolmogorov-Smirnov test for goodness of fit[J]. Journal of the American statistical Association, 1951,46(253):68-78.
|