[1] |
KUZMANOVIC A , KNIGHTLY E W . Low-rate TCP-targeted denial of service attacks and counter strategies[J]. IEEE/ACM Transactions on Networking, 2006,14(4): 683-696.
|
[2] |
KUZMANOVIC A , KNIGHTLY E W.Low-rate TCP-targeted denial of service attacks:the shrew vs . the mice and elephants[C]// ACM SIGCOMM 2003 Conference on Applications,Technologies,Architectures,and Protocols for Computer Communication. 2003: 75-86.
|
[3] |
文坤, 杨家海, 张宾 . 低速率拒绝服务攻击研究与进展综述[J]. 软件学报, 2014,25(3): 591-605.
|
|
WEN K , YANG J H , ZHANG B . Survey on research and progress of low-rate denial of service attacks[J]. Journal of Software, 2014,25(3): 591-605.
|
[4] |
何炎祥, 刘陶, 曹强 ,等. 低速率拒绝服务攻击研究综述[J]. 计算机科学与探索, 2008,2(1): 1-19.
|
|
HE Y X , LIU T , CAO Q ,et al. A survey of low-rate denial-of-service attacks[J]. Journal of Frontiers of Computer Science and Technology, 2008,2(1): 1-19.
|
[5] |
KWOK Y K , TRIPATHI R , CHEN Y ,et al. HAWK:halting anomalies with weighted choking to rescue well-behaved TCP sessions from shrew DDoS attacks[C]// International Conference on NETWORKING and Mobile Computing. 2005: 423-432.
|
[6] |
XIANG Y , LI K , ZHOU W . Low-rate DDoS attacks detection and trace back by using new information metrics[J]. IEEE Transactions Information Forensics and Security, 2011,6(2): 426-437.
|
[7] |
YUHEI H , JIA Y Z.SATOSHI N . Method for detecting low-rate attacks on basis of burst-state duration using quick packet-matching function[C]// IEEE International Symposium on Local and Metropolitan Area Networks. 2017: 1-2.
|
[8] |
CHENG C M , KUNG H , TAN K S . Use of spectral analysis in defense against DoS attacks[C]// IEEE Global Telecommunications. 2002: 2143-2148.
|
[9] |
何炎祥, 曹强, 刘陶 ,等. 一种基于小波特征提取的低速率DoS检测方法[J]. 软件学报, 2009,20(4): 930-941.
|
|
HE Y X , CAO Q , LIU T ,et al. A low-rate Dos detection method based on feature extraction using wavelet transform[J]. Journal of Software, 2009,20(4): 930-941.
|
[10] |
PAUL C , MYONG K , ALEXANDER V . Spectral analysis of low rate of denial of service attacks detection based on fisher and Siegel tests[C]// IEEE International Conference on Communications(ICC). 2016: 1-6.
|
[11] |
WEI W , FENG C , XIA Y ,et al. A rank correlation based detection against distributed reflection DoS attacks[J]. IEEE Communications Letters, 2013,17(1): 173-175.
|
[12] |
BHUYAN M H , KALWAR A , GOSWAMI A ,et al. Low-rate and high-rate distributed DoS attack detection using partial rank correlation[C]// Fifth International Conference on Communication Systems and Network Technologies. 2015: 706-710.
|
[13] |
CHEN K , LIU H Y , CHEN X S . Detecting LDoS attacks based on abnormal network traffic[J]. KSII Transactions on Internet and Information Systems, 2012,6(7): 1831-1853.
|
[14] |
FALL K R , RICHARD S W . TCP/IP详解卷1:协议[M]. 北京: 机械工业出版社, 2016.
|
|
FALL K R , RICHARD S W . TCP/IP illustrated volume 1:the protocols[M]. Beijing: China Machine PressPress, 2016.
|
[15] |
FENG F Z , RAO G Q , WEI S A . Application and development of permutation entropy algorithm[J]. Journal of Academy of Armored Force Engineering, 2012,26(2): 34-38.
|
[16] |
饶国强, 冯辅周, 司爱威 . 排列熵算法参数的优化确定方法研究[J]. 振动与冲击, 2014,33(1): 188-193.
|
|
RAO G Q , FENG F Z , SI A W . Method for optimal determination of parameters in permutation entropy algorithm[J]. Journal of Vibration and Shock, 2014,33(1): 188-193.
|
[17] |
王海燕, 盛昭瀚 . 混沌时间序列相空间重构参数的选取方法[J]. 东南大学学报(自然科学版), 2000,30(5): 113-117.
|
|
WANA H Y , CHENG Z H . Choice of the parameters for the phase space reconstruction of Chaotic time series[D]. Journal of Southeast University(Natural Science Edition), 2000,30(5): 113-117.
|
[18] |
刘永斌 . 基于非线性信号分析的滚动轴承状态监测诊断研究[D]. 合肥:中国科学技术大学, 2011.
|
|
LIU Y B . Nonlinear signal analysis for rolling bearing condition monitoring and fault diagnosis[D]. Hefei:University of Science and Technology, 2011.
|