[1] Moore D, Paxson V, Savage S, et al. Inside the slammer worm[J]. IEEE Magazine of Security and Privacy, 2003, 1(4): 33-39. [2] 柴平, 龚向阳, 程时端. 分布式入侵检测技术的研究[J]. 北京邮电大学学报, 2002, 25(2): 68-73. Chai Pingxuan, Gong Xiangyang, Cheng Shiduan. Research on distributed intrusion detection[J]. Journal of Beijing University of Posts and Telecommunications, 2002, 25(2): 68-73. [3] Zou Cliff Changchun, Gong Weibo, Towsley Don, et al. The monitoring and early detection of Internet worms[J]. IEEE/ACM Transactions on Networking, 2005, 13: 961-974. [4] Moore D, Shannon C, Voelker G M, et al. Internet quarantine: requirements for containing self-propagating code//INFOCOM 2003, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies. San Francisco: IEEE Press, 2003:1901-1910. [5] Cheung S, Hoagland J, Levitt K, et al. The design of GrIDS: a graph-based intrusion detection system. Davis: U.C. Davis Computer Science Department, 1999. http://citeseer.nj.nec.com/cheung99design.html. [6] 张宏莉, 方滨兴, 胡铭曾, 等. Internet测量与分析综述[J]. 软件学报, 2003, 14(1): 100-116. Zhang Hongli, Fang Binxing, Hu Mingzeng, et al. A survey on Internet measurement and analysis[J]. Journal of Software, 2003, 14(1): 100-116. |