共 15 条
- [1] The art of port scanning, Phrack Magazine, 7, 51, pp. 11-17, (1997)
- [2] Incident note IN-2001-09
- [3] Huang L., Garoralakis M., Hellerstein J., Et al., Toward sophisticated detection with distributed triggers, Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, pp. 311-316, (2006)
- [4] Huang L., Nguyen X., Garofalakis M., Et al., Communication efficient online detection of network-wide anomalies, 26th IEEE International Conference on Computer Communications, pp. 134-142, (2007)
- [5] Keralapura R., Cormode G., Ramamirtham J., Communication-efficient distributed monitoring of thresholded count, Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, pp. 289-300, (2006)
- [6] Stuart S., Jaeyeon J., Arthur W., Fast detection of scanning worm infections, 7th International Symposium on Recent Advances in Intrusion Detection (RAID), pp. 59-81, (2004)
- [7] Huang L., Garofalakis M., Anthony D.J., Et al., Communication-efficient tracking of distributed cumulative triggers, 27th International Conference on Distributed Computing Systems, pp. 54-64, (2007)
- [8] Kang J., Zhang J., Li Q., Et al., Detecting new P2P botnet with multi-chart CUSUM, Wireless Communications and Trusted Computing, pp. 688-691, (2009)
- [9] Ellis D., Aiken J., Attwood K., Et al., A behavioral approach to worm detection, Proceedings of ACM Workshop on Rapid Malcode (WORM), pp. 43-53, (2004)
- [10] Shanon C., A mathematical theory of communication, Bell System Technical Journal, 27, pp. 379-423, (1948)