[1] 吕慧勤, 张宏, 罗守山, 等. 无缓冲服务的DoS攻击[J]. 北京邮电大学学报, 2003, 26(3): 61-65. Lü Huiqin, Zhang Hong, Luo Shoushan, et al. Denial of service in non-buffer systems[J]. Journal of Beijing University of Posts and Telecommunications, 2003, 26(3): 61-65.
[2] 胡尊美, 王文国. DDoS攻击技术发展研究[J]. 网络安全技术与应用, 2005, 6(54): 25-28. Hu Zunmei, Wang Wenguo. Studies of distributed denial of service attack[J]. Net Security Technology and Application, 2005, 6(54): 25-28.
[3] Leland W, Tagqu M, Willinger W, et al. On the self-similar nature of ethernet traffic//IEEE. IEEE/ACM Transactions on Networking. : IEEE Press, 1994: 1-15.
[4] Crovella M E, Bestavros A. Self-similarity in world wide web traffic: evidence and possible causes// IEEE. IEEE/ACM Transactions on Networking. : IEEE Press, 1997: 835-846.
[5] Ashish Chaurasia. Network packet capturing for Linux. 2004. http://www-128.ibm.com/developerworks/edu/l-dw-linux-packet-i.html.
[6] Li Yongli, Liu Guizhong, Li Hongliang, et al. Wavelet-based analysis of hurst parameter estimation for self-similar traffic//IEEE. Acoustics, Speech, and Signal Processing, Proceedings(ICASSp'02). : IEEE Press, 2002: 2061-2064.
[7] Mallat Stephane G. A theory for multiresolution signal decomposition: the wavelet representation//IEEE. IEEE Transactions on Pattern Analysis and Machine Intelligence. : IEEE Press, 1989: 674-693. |