[1]LAKHINA A,CROVELLA M,DIOT C.Mining anomalies using traffic feature distributions[C].Philadelphia,Pennsylvania,USA:Proceedings of ACM SIGCOMM,2005:134-145.
[2]钱叶魁,陈鸣.因特网流量矩阵的流形结构[J].电子与信息学报,2010,32(12):2981-2986.
[3]钱叶魁,陈鸣.面向PCA异常检测器的攻击和防御机制[J].电子学报,2011,39(3):543-548.
[4]钱叶魁,陈鸣.一种基于支持向量回归的多元在线异常检测方法[J].通信学报,2011,32(2):106-113.
[5]魏祥麟,陈鸣,郝强,等.基于多尺度主成分分析的全网络异常检测方法[J].软件学报,2012,23(2):361-377.
[6]LIN Chinjen.Projected gradient methods for non-negative matrix factorization[J].Natural Computation,2007(19):2756-2779.
[7]WENG Zhe,HU Kai.Structural analysis of network traffic matrix via relaxed principal component pursuit[J].SCI,2012,56(7):2049-2067.
[8]XU K,ZHANG Z L,BHATTACHARYYA S.Internet traffic behavior profiling for network security monitoring[J].IEEE/ACM Transactions on Networking,2008,16(6):1241-1252.
[9]TORRES R,HAJJAT M,RAO S G,et al.Inferring undesirable behavior from P2P traffic analysis[C].USA:Proceedings of Sigmetrics'90,2009:231-242.
[10]杨岳湘,王海龙,卢锡城.基于信息熵的大规模网络流量异常分类[J].计算机工程与科学,2007,29(2):40-43.
[11]王兆军,邹长亮,李忠华,等.统计质量控制图理论与方法[M].北京:科学出版社,2013.
[12]LIU Y,ZHANG L,GUAN Y.Sketch-based streaming PCA algorithm for networkwide traffic anomaly detection[C].Genoa,Italy:Proceedings of the 30th IEEE International Conference on Distributed Computing Systems,ICDCS 2010,2010:807-816. |