[1] |
第30次中国互联网络发展状况统计报告[R]. 中国互联网络信息中心, 2012.The 30th China Internet Network Development State Statistic Re-port[R]. China Internet Network Information Center, 2012.
|
[2] |
张鹏 . Arbor Pravail APS:专注抵御应用层DDoS攻击[J]. 通信世界 , 2011:41. ZHANG P . Arbor Pravail APS: focus on the application layer DDoS attack[J]. Communications World Weekly, 2011:41.
|
[3] |
2011年中国互联网网络安全态势综述[R]. 国家计算机网络应用技术处理协调中心, 2012.In 2011 China's Internet Network Security Situation Were Re-viewed[R]. National Computer Network Application Technology Proc-essing Coordination Center, 2012.
|
[4] |
龙士工, 赵梦龙 . 基于可信度的App-DDoS攻击的分布式流量控制模型[J]. 信息安全 , 2009,25(3-3): 75-76,302. LONG S G , ZHAO M L . Distributed flow control model of the App -DDoS attacks based on the credibility[J]. Information Security, 2009,25(3-3): 75-76,302.
|
[5] |
魏兵, 徐震 . 基于验证机制的应用层DDoS攻击防御方法[J]. 计算机工程与设计 , 2010,(31)2: 231-234. WEI B , XU Z . Defense approach against application level DDoS at-tacks based on authentication mechanism[J]. Computer Engineering and Design, 2010,(31)2: 231-234.
|
[6] |
张苒 . 基于权重队列的HTTP DDoS防范技术研究[J]. 辽宁师专学报 , 2007,9(4): 40-42. ZHANG R . Based on the weight of queue HTTP DDoS prevention technology research[J]. Journal of Liaoning Teachers College, 2007,9(4): 40-42.
|
[7] |
赵国锋, 喻守成, 文晟 . 基于用户行为分析的应用层 DDoS 攻击检测方法[J]. 计算机应用研究 , 2011,28(2): 717-719. ZHAO G F , YU S C , WEN C . Detecting application-layer DDoS at-tack based on analysis of users'behaviors[J]. Application Research of Computers, 2011,28(2): 717-719.
|
[8] |
郁继锋 . 基于数据挖掘的Web应用入侵异常检测研究[D]. 武汉: 华中科技大学, 2011. YU J F . Research on Anomaly Intrusion Detection of Web Application Based on Data Mining[D]. Wuhan: Huazhong University of Science and Technology, 2011.
|
[9] |
张烜 . 基于应用层的DDoS 攻击检测防御技术研究[D]. 北京: 北京邮电大学, 2009. ZHANG H . Based on Application Layer DDoS Attack Detection De-Fense Technology Research[D]. Beijing: Beijing University of Posts and Telecommunications, 2009.
|
[10] |
毛丽玮 . 基于BP神经网络的产能建设单井效益评价研究[D]. 青岛: 中国石油大学(华东), 2012. MAO L W . Research into the Evaluation of Oil Well Performance in Productivity Construction Based on the BP Neural Network[D]. Qingdao: China university of Petroleum(East China), 2012.
|
[11] |
王秀芳, 王岩 . 优化K均值随机初始中点的改进算法[J]. 化工自动化及仪表 , 2012,39(10): 1302-1304. WANG X F , WANG Y . Optimize K-means random initial midpoint algorithm[J]. Chemical industry automation and instrumentation, 2012,39(10): 1302-1304.
|
[12] |
谢逸, 余顺争 . 基于Web用户浏览行为的统计异常检测[J]. 软件学报 , 2007,18(4): 967-977. XIE Y , YU S Z . A large-scale hidden semi-Markov model for anomaly detection on user browsing behaviors[J]. IEEE/ACM Trans Netw, 2009,17(1): 54-65.
|
[13] |
KHATTAB S , GOBRIEL S , MELHEM R , et al. Live baiting for ser-vice-level DoS attackers[A]. Proc of the Infocom[C]. 2008. 682-690.
|
[14] |
徐鹏 . 通用应用层 DDoS 检测防护模型的研究[D]. 南京: 南京理工大学, 2008. XV P . General Protective Model of Application Layer DDoS Detec-tion[D]. Nanjing: Nanjing University of Science and Technology, 2008.
|
[15] |
谢亚 . 基于模糊综合评判的应用层 DDOS 攻击检测方法研究[D]. 成都: 西南交通大学, 2012. XIE Y . Research on Anomaly Intrusion Detection of Web Application Based on Data Mining[D]. Chengdu: Southwest Jiaotong University, 2009.
|
[16] |
张伟, 范宽, 张梦媛 . 基于D-S证据理论应用层DDOS攻击检测[J]. 江苏科技大学学报(自然科学版), 2012,26(3): 295-299. ZHANG W , FAN K , ZHANG M Y An application layer DDoS attack detection method based on D-S evidence theory[J]. Journal of Jiangsu University of Science and Technology(Natural Science Edition), 2012,26(3): 295-299.
|
[17] |
LEE S , SUNG J , KIM D . Incremental update of linear appearance models and its application to AAM: incremental AAM[A]. Lecture Notes Computer Science[C]. Victoria B C, Canada, 2007. 538-547.
|
[18] |
YATAGAI T , ISOHARA T , SASASE I . Detection of HTTP-GET flood attack based on analysis of page access behavior[A]. Proceedings IEEE Pacific RIM Conference on Communications. Computers and Signal Processing[C]. Victoria B C, Canada, 2007. 232-235.
|
[19] |
XUAN Y , SHIN I , THAIMT E T A L . Detecting application de-nial-of-service attacks: a group-testing-based approach[J]. IEEE Trans on Parallel and Distributed Systems, 2010,21(8): 1203-1216.
|