[1] Yang Minghui, Wang Ruchuan. DDoS detection based on wavelet kernel support vector machine [J]. The Journal of China Universities of Posts and Telecommunications, 2008, 15(3): 59-63. [2] Li M, Jiang X. DDoS attacks detection model and its application [J]. WSEAS Transactions on Computers, 2008, 7(8): 1159-1168. [3] Li Muhai, Li Ming. A new approach for detecting DDoS attacks based on wavelet analysis//Proceedings of the 2nd International Congress on Image and Signal Processing (CISP ’09). 2009. [4] Li Muhai, Li Ming. An adaptive approach for defending against DDoS attacks[J]. Mathematical Problems in Engineering, 2010, Article ID 570940, doi: 10.1155/2010/570940. [5] 何慧, 张宏莉, 张伟哲, 等. 一种基于相似度的 DDoS 攻击检测方法[J]. 通信学报, 2004, 25(7): 176-184. He Hui, Zhang Hongli, Zhang Weizhe, et al. A DDoS intrusion detection method based on likeness [J]. Journal of China Institute of Communications, 2004, 25(7) : 176-184. [6] Xiang Y, Lin Y, Lei W L, et al. Detecting DDOS attack based on network self-similarity [J]. IEE Proceedings Communications, 2004: 292-295. [7] Xia Zhengmin, Lu Songnian, Tang Junhua. Note on studying change point of LRD traffic based on Li’s detection of DDoS flood attacking[J]. Mathematical Problems in Engineering, 2010, Article ID 962435, doi: 10.1155/2010/962435. [8] 王欣, 方滨兴. Hurst参数变化在网络流量异常检测中的应用[J]. 哈尔滨工业大学学报, 2005, 37(9): 1046-1049. Wang Xin, Fang Binxing. An exploratory development on the Hurst parameter variety of network traffic abnormity signal [J]. Journal of Harbin Institute of Technology, 2005, 37(9): 1046-1049. [9] 雷剑刚, 吴洲. 网络性能测量技术的研究[J]. 福建电脑, 2006, 5: 59-60. Lei Jiangang, Wu Zhou. Research on measuring technology of network performance[J]. Fujian Computer, 2006, 5: 59-60. [10] 于德介, 程军圣, 杨宇. 机械故障诊断的Hilbert-Huang变换方法[M]. 北京: 科学出版社, 2006: 24-46. [11] 史美林, 钱俊, 许超. 入侵检测系统数据集评测研究[J]. 计算机科学, 2006, 33(8): 1-8. Shi Meilin, Qian Jun, Xu Chao. Research of intrusion detection system dataset evaluation[J]. Computer Science, 2006, 33( 8): 1-8. |