参考文献/References:
[1]Li Weimin,Cao Xiaoguang,Liu Fang,et.al. Improving DNS cache to alleviate the impact of DNS DDoS attack [J]. Journal of Networks,2011,6 (2):279-286.
[2]陈玉明,谢斐星,吴克寿,等.基于邻域关系的网络入侵检测特征选择[J].常州大学学报(自然科学版),2014,26(3):1-5.
[3]蔡艳婧,程晓红,程显毅.网络敏感信息动态特征的抽取方法[J].常州大学学报(自然科学版),2014,26(4):80-85.
[4]张永铮,肖军. DDoS攻击检测和控制方法[J].软件学报,2012,23(8):2058-2072.
[5]徐阳.基于概率事件的无线传感网络能耗分析研究[J].常州信息职业技术学院学报,2014,13(3):33-35.
[6]Ye Xi,Ye Yiru. A Practical Mechanism to Counteract DNS Amplification DDoS Attacks [J]. Journal of Computational Information Systems,2013,9 (1):265–272.
[7]Subbulakshmi T,Shalinie S M,Ramamoorthi A. Detection and classification of DDoS attacks using machine learning algorithms [J].European Journal of Scientific Research,2010,47(3):334-346.
[8]Farid D,Rahman S,Rahman C. Adaptive Intrusion Detection based on Boosting and Nave Bayesian Classifier[J]. International Journal of Computer Applications,2011,24(3):12-19.
[9]Wang W,Wu W.Online Detection of Network Traffic Anomalies Using Degree Distributions [J]. International Journal of Communications,Network and System Sciences,2010,3 (2):177-182.
[10] Peng T,Leckie C,Kotagiri R. Proactively detecting distributed denial of service attacks using source IP address monitoring[C]//Proc of the 3rd Int IFIP-TC6 Networking.Berlin:Springer Verlag,2004:771-782.
[11] 孙钦东,张德运,高鹏. 基于时间序列分析的分布式拒绝服务攻击检测[J]. 计算机学报,2005,28(5):767-773.
[12] 顾晓清,王洪元,倪彤光,等. 基于时间序列分析的应用层DDoS攻击检测 [J]. 计算机应用,2013,33(8):2228-2231.
[13]Vapnik V. The Nature of Statistical Learning Theory [M]. NewYork:Springer Verlag,1995.
[14] Marina Throttan. Adaptive Thresholding for Proactive Network Problem Detection[C]//Proc of IEEE Internation Workshop on System Management,Rhode Island.NewYork:Springer Verlag,1998:108-116.
[15]Rastegari S,Saripan M I,Rasid M F. A detection of denial of service attacks against domain name system using neural networks [J].UCSI International Journal of Computer Science,2009,15 (1):23-27.
[16]Nasibov E,Peker S,Time series labeling algorithms based on the K-nearest neighbors′ frequencies[J].Expert Systems with Applications,2011,38 (5):5028-5035.