共 31 条
- [1] Amiri F., Yousefi M.R., Lucas C., Shakery A., Yazdani N., Mutual information-based feature selection for intrusion detection systems, Journal of Network and Computer Applications, 34, 4, pp. 1184-1199, (2011)
- [2] Andrysiak T., Saganowski L., Choras M., Kozik R., Network traffic prediction and anomaly detection based on ARFIMA model, Proceedings of International Joint Conference SOCO‘14-CISIS‘14-ICEUTE‘14, pp. 545-554, (2014)
- [3] Arshadi L., Jahangir A.H., On the TCP flow inter-arrival times distribution, Proceedings of Fifth UKSim European Symposium on Computer Modeling and Simulation (EMS), pp. 360-365, (2011)
- [4] Brauckhoff D., Tellenbach B., Wagner A., May M., Lakhina A., Impact of packet sampling on anomaly detection metrics, Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, pp. 159-164, (2006)
- [5] Brugner H., Holt-Winter’s traffic prediction on aggregated flow data, Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM) Focal Topic: Advanced Persistent Threats, 25, pp. 25-32, (2017)
- [6] Brutlag J.D., Aberrant behavior detection in time series for network monitoring, Proceedings of LISA, 14, pp. 139-146, (2000)
- [7] Callegari C., Gazzarrini L., Giordano S., Pagano M., Pepe T., A novel PCA-based network anomaly detection, Proceedings of the International Conference on Communications, pp. 1-5, (2011)
- [8] Chang S., Qiu X., Gao Z., Qi F., Liu K., A flow-based anomaly detection method using entropy and multiple traffic features, Proceedings of the 3rd International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp. 223-227, (2010)
- [9] Cottrell R.L., Logg C., Chhaparia M., Grigoriev M., Haro F., Nazir F., Sandford M., Evaluation of techniques to detect significant network performance problems using end-to-end active network measurements, Network Operations and Management Symposium NOMS, pp. 85-94, (2006)
- [10] de Assis M.V., Rodrigues J.J., Proenca M.L., A seven-dimensional flow analysis to help autonomous network management, Information Sciences, 278, pp. 900-913, (2014)