MIT Lincoln Laboratory.DARPA intrusion detection datasets[EB/OL].[2000-03-07].http:∥www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/2000data.html.
FARRAPOSO S,OWEZARSKI P,MONTEIO E.A multiscale tomographic algorithm for detecting and classifying traffic anomalies[C]∥IEEE ICC’07.Glasgow:IEEE,2007:363-370.
[8]
陈宁军,倪桂强,罗隽,等.基于正常行为聚类的卫星通信网异常检测方法[J].解放军理工大学学报,2008,9(5):497-501.CHEN Ning-jun,NI Gui-qiang,LUO Jun,et al.Method of detecting the satellite communication network abnormality based on the normal behavior of clustering[J].Journal of PLA University of Science and Technology,2008,9(5):497-501.(in Chinese)
[9]
DENNING D E.An intrusion-detection model[J].IEEE Transactions on Software Engineering,1987,SE-13:222-232.
[10]
AULD T,MOORE A W,GULL S F.Bayesian neural networks for internet traffic classification[J].IEEE Transactions on Neural Networks,2007,18(1):223-239.
[11]
MITCHELL T M,曾华军.机器学习[M].北京:机械工业出版社,2003:39-103.
[12]
MAWI Working Group.Traffic traces[EB/OL].[2006-04-25].http:∥mawi.wide.ad.jp/mawi/.