[1] Chandola V, Banerjee A, Kumar V. Anomaly detection: a survey[J]. ACM Computing Surveys, 2009, 41(3): 1-58.[2] 张晓惠, 林柏钢. 基于特征选择和多分类支持向量机的异常检测[J]. 通信学报, 2009, 30(10A): 68-73. Zhang Xiaohui, Lin Bogang. Anomaly detection based on feature selection and multi-class support vector machines[J]. Journal on Communications, 2009, 30(10A): 68-73.[3] Torres R, Hajjat M, Rao S G, et al. Inferring undesirable behavior from P2P traffic analysis[C]//Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems. Seattle: ACM, 2009: 156-167.[4] 钟尚勤, 徐国胜, 姚文斌, 等. 基于主机安全组划分的网络安全性分析[J]. 北京邮电大学学报, 2012, 35(1): 19-23. Zhong Shangqin, Xu Guosheng, Yao Wenbin, et al. Network security analysis based on host-security-group[J]. Journal of Beijing University of Posts and Telecommunications, 2012, 35(1): 19-23.[5] Chen M Y, Kiciman E, Fratkin E, et al. Pinpoint: problem determination in large, dynamic internet services[C]//Dependable Systems and Networks, 2002(DSN 2002). San Francisco: IEEE, 2002: 595-604.[6] Bahl P, Chandra R, Greenberg A, et al. Towards highly reliable enterprise network services via inference of multi-level dependencies[C]//ACM SIGCOMM Computer Communication Review. Seattle: ACM, 2007: 13-24.[7] Munawar M A, Jiang M, Ward P A S. Monitoring multi-tier clustered systems with invariant metric relationships[C]//The 2008 International Workshop on Software Engineering for Adaptive and Self-managing Systems. Seattle: ACM, 2008: 73-80. |