1 |
정현철, 변대용, '트래픽 분석을 통한 서비스거부공격 추적', http://www.certcc.or.kr, 2003.1.
|
2 |
Bor-Sen Chen. Sen-Chueh Peng, Ku-Chen Wang, Traffic Modeling. Prediction, and Congestion Control for High-Speed Networks: A Fuzzy AR Approach, IEEE Transactions on Fuzzy Systems. Vol. 8, No. 5. Oct.2000
|
3 |
Cisco Inc., Cisco:s IOS Netflow Feature, http://www.cisco.com/warp/public/732/netflow
|
4 |
Hong Fei, Wu Zhimei, A Novel Traffic Model Based on Wavelet Analysis, Proceedings of ICCT2003
|
5 |
Yantai Shu, Yu Liu. et. al. Wireless Traffic Modeling and Prediction Using Seasonal ARIMA Models
|
6 |
David Moore, Gffrey M. Voelker and Stefan Savage, Inferring Internet Denial-of-Service Activity, http://www.dante.net/pubs/dip/42/42.html
|
7 |
Sheng Ma, Chuanayi Ji, Modeling Heterogeneous Network Traffic in Wavelet Domain, IEEE/ACM Transactions on Networking, Vol. 9. No5, Oct. 2001
|
8 |
Joao B. D. Cabrera, Lundy Lewis, et. al., Proactive Intrusion Detectionand Distributed of Denial of Service. Journal of Network and System Management, Vol. 10, No. 2, June 2002
|
9 |
Internet Performance Measurementand Analysis Project Home Page, http://www.merit.edu/ipma
|
10 |
Paul Barford, Jeffery Kline, et. al. A signal analysis of network traffic anomalies - Proceedings of ACMIMW02
|
11 |
Denial of Service and Emerging Backbone Threats, Arbor Networks, June 12, 2002
|