[14] Oikonomou G, Mirkovic J, Reiher P, Robinson M. A Framework for a Collaborative DDoS Defense[C]. Proceedings-Annual Computer Security Applications Conference. ACSAC, 2006, 33-42
[15] Rajesh Sharma, Krishan Kumar, Kuldip Singh, Joshi R C. Shared Based Rate Limiting: An ISP level Solution to Deal DDoS Attacks[C]. 2006 Annual IEEE India Conference (IEEE Cat. No. 06EX1372). New Delhi, India:IEEE,2006. 6-6
[16] Mirkovic J, Reiher P. D-WARD: Source-End Defense AgainstDistributed Denial-of-Service Attacks[J]. IEEE Transactions on Dependable and Secure Computing, 2005, 2(3):216-232
[17] El Defrawy K, Markopoulou A, Argyraki K. Optimal Allocation of Filters against DDoS Attacks[C]. 2007 Information Theory and Applications Workshop, Conference Proceedings, San Diego, CA, United state: Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States, 2007. 140-149
[18] Nagamalai Dhinaharan, Dhinakaran Cynthia, Lee Jae Kwang. Multi Layer Approach to Defend DDoS Attacks Caused by Spam[C]. Proceedings - 2007 International Conference on Multimedia and Ubiquitous Engineering, MUE 2007, Seoul, Korea, Republic of: Inst. of Elec. and Elec. Eng. Computer Society, 445 Hoes Lane - P.O.Box 1331, Piscataway, NJ 08855-1331, United States, 2007. 97-102
[19] Mark-aided distributed filtering by using neural network for DDoS defense[C]. GLOBECOM - IEEE Global Telecommunications Conference, St. Louis, MO, United states:Institute of Electrical and Electronics Engineers Inc., 3 Park Avenue, 17th Floor, New York, NY 10016-5997, United States,2005. 1701-1705
[20] Trostle J. Protecting Against Distributed Denial of Service (DDoS) Attacks Using Distributed Filtering[C]. 2006 SecureComm and Workshops [Second International Conference on Security and Privacy in Communication Networks and Workshops, Piscataway, NJ, USA:IEEE,2006. 201-211
[21] Yan J, Early S, Anderson R. The XenoService A Distributed Defeat for Distributed Denial of Service[C]. ISW 2000. Information Survivability Workshop. Third Information Survivability Workshop - ISW-2000. `Research Directions and Research Collaborations to Protect the Global Information Society, Piscataway, NJ, USA:IEEE,2000. 195-200
[22] Wang Xun, Chellappan Sriram, Boyer Phillip, Xuan Dong. On the effectiveness of secure overlay forwarding systems under intelligent distributed DoS attacks[J]. IEEE Transactions on Parallel and Distributed Systems, 2006,17(7):619-632
[23] Lin, Y T, et al. Design and implement of new object-oriented rule base management system[J]. Expert Systems with Applications, 2003,25:369–385.
[24] 黄洪宇, 林甲祥, 陈崇成, 樊明辉. 离群数据挖掘综述[J]. 计算机应用, 2006,8:8-13
[25] Ucla. Sanitized UCLA CSD traffic traces[OL],http://lever.cs.ucla.edu/ddos/traces/, 2006/2009
[26] MIT. 2000 DARPA Intrusion Detection Evaluation Data Set[OL], http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html, 2000/2009
[27]Wang Dongqi, Chang Guiran, Feng Xiaoshuo. Research on the Detection of Distributed Denial of Service Attacks Based on the Characteristics of IP Flow[C]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Network and Parallel Computing - IFIP International Conference, NPC 2008, Proceedings, 2008,5245 LNCS:86-93
[28] Knorr E M, Ng R T, Tucakov V. Distance-based outliers: algorithms and applications[J]. VLDB Journal, 2000,8(3,4):237-253
(责任编辑:adminadmin2008)