Citation: | QIN Hua, ZHANG Shu-jie. Network Traffic Behavior Pattern and Flow Classification[J]. Journal of Beijing University of Technology, 2007, 33(11): 1222-1226. |
[1] |
TOMAS D,WAGNER A,HOSSMANN T,et al.Flow-Level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone[C]//Proceedings of DIMVA 2005(LNCS 3548).Berlin:Springer Verlag,2005:103-122.
|
[2] |
TOMAS D.PLATTNER B.Host behaviour based early detection of worm outbreaks in internet backbones[C]//Proceed- ings of 14th IEEE International Workshops on Enabling Technologies:Infrastructures for Collaborative Enterprises.Wash- ington DC:IEEE Computer Society,2005:166-171.
|
[3] |
KIM S S,REDDY A L N,VANNUCCI M.Detecting traffic anomalies through aggregate analysis of packet header data[C] //Proceedings of Networking 2004(LNCS 3042).Berlin:Springer Verlag,2004:1047-1059.
|
[4] |
LAKHINA A,PAPAGIANNAKI K,CROVELLA M,et al.Structural analysis of network traffic flows[C]//Proceedings of ACM SIGMETRICS/Performance'04.New York:ACM Press,2004:61-72.
|
[5] |
GUPTA P,MCKEOWN N.Packet classification on multiple fields[C]//Proceedings of ACM SIGCOMM'99.New York: ACM Press,1999:146-160.
|
[6] |
CISCO SYSTEM.Cisco IOS NetFlow white pape[DB/OL].[2006-06-30]http://www.cisco.com/en/US/products/ ps6601/prod_white_papers_list.html.
|
[7] |
OLBRANTZ J.Inside moPaQ[DB/OL].[2006-01-01]http://www.campaigncreations,org/starcraft/inside_mopaq.
|
[8] |
VAN LUNTEREN J,ENGBERSEN J.Fast and sealable packet classification[J].IEEE Selected Areas in Communica-tions, 2003,21(4):560-571.
|
[9] |
Al-SHAER,E S,HAMED H H.Firewall policy advisor for anomaly discovery and rule editing[C]//IFIP/IEEE Eighth In- ternational Symposium on Integrated Network Management.Washington DC:IEEE Computer Society,2003:17-30.
|