1Patcha A,Park J M. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends[J ].Computer Networks: The International Journal of Computer and Telecommunications Networking,2007,S 1 (12):3448-3470.
2Wang H J,Guo C,Simon D K, et al. Shield:Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits [J]. ACM SIGCOMM Computer Communication Review,2004, 34 (4) :193-204.
3Lazarevic A,Ertoz L,Kumar V,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection [C]//SIAM International Conference on Data Mining. Cathedral Hill Hotel,San Francisco,USA,2003:25-36.
3Binkley J R, Singh S. An Algorithm for Anomaly-based Botnet Detection[C]///SRUTI'06 : 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet. San Jose, USA: 2006 : 43-48
4Villamarin-salomon R, Brustoloni J C. Identifying Botnets Using Anomaly Detection Techniques Applied to DNS Traffic[C]// Fifth IEEE Consumer Communications & Networking Conference. Las Vegas, Nevada, USA, 2008: 476-481
5Pateha A,Park J M. An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends[J]. Computer Networks:The International Journal of Computer and Telecommunications Networking, 2007,51 (12) : 3448-3470
6Wang H J, Guo C, Simon D R, et al. Shield.. Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits [J]. ACM SIGCOMM Computer Communication Review, 2004, 34(4) :193-204
7Lazarevic A, Ertoz L, Kumar V, et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection[C]//SIAM International Conference on Data Mining. Cathedral Hill Hotel, San Francisco, USA, 2003 : 25-36
8Lippmann R, Haines J W, Fried D J, et al. The 1999 DARPA Off-line Intrusion Detection Evaluation [J]. Computer Networks, 2000,34(4): 579-595
9Kr C, Toth T, Kirda E. Service Specific Anomaly Detection for Network Intrusion Detection [C]//Proceedings of the 2002 ACM symposium on Applied Computing. Madrid, Spain, 2002: 201-208
10Kruegel C, Vigna G. Anomaly Detection of Web-based Attacks [C]// Proceedings of the 10th ACM Conference on Computer and Communication Security. Washington, DC, USA, 2003 : 251- 261