Bellovin S M. A technique for counting NATted hosts//Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurement. New York: ACM, 2002: 267-272.
[2]
Kohno T, Broido A, Claffy K C. Remote physical device fingerprinting[J]. IEEE Trans on Dependable and Secure Computing, 2005, 2(2): 93-108.
[3]
白雪, 钱步仁, 梁华庆. 一种检测NAT后主机数目的方案[J]. 计算机安全, 2009, 8(4): 46-48. Bai Xue, Qian Buren, Liang Huaqing. A scheme for counting NATed hosts[J]. Network and Computer Security, 2009, 8(4): 46-48.
Spitzner L. Know your enemy: passive fingerprinting. Honeynet Project, 2003.
[7]
Beverly R. A robust classifier for passive TCP/IP fingerprinting//PAM 2004. Antibes: , 2004: 158-167.
[8]
Li Zhu, Yuan Ruixi, Guan Xiaohong. Accurate classification of the internet traffic based on the SVM method//ICC 2007. Glasgow: IEEE CS, 2007: 1373-1378.
[9]
Dornhoff L L, Hohn F E. Applied modern algebra[M]. New York: Macmillan Publishing Co, 1978: 201-202.
[10]
Stevens W R. TCP/IP illustrated (vol.1): the protocols[M]. Boston: Addison-Wesley Longman Publishing Co Inc, 1993: 24-27.