WEI S G, MIRKOVIC J.A realistic simulation of Internet?scale events[J].Proceedings of the 1st International Conference on Performance Evaluation Methodologies and Tools (Valuetools), Italy,2006.
[5]
Wu Naiqi,Qian Yanming,Chen Guiqing.A novel approach to trojan horse detection by process tracing[J].Proceedings of 2006 IEEE International Conference,2006:721-726.
[6]
Beyah R A,Holloway M C,Copeland J A.Invisible Trojan:an architecture,implementation and detection method[J].The 2002 45th Midwest Symposium on Circuits and Systems,2002(3):500-504.
[7]
Liu Ting, Guan Xiaohong, Zheng Qinghua, et al.Prototype demonstration:Trojan detection and defense system[J].Consumer Communications and Networking Conference,2009:1-2.
[8]
Moffie M,Cheng W,Kaeli D,et al.Hunting Trojan Horses[J].Proceedings of the 1st Workshop.Architectural and System Support for Improving Software Dependability,2006:12-17.
[9]
C Kruegel, T Toth, E Kirda. Service specific anomaly detection for intrusion detection[R]. Technical report, TU-1841-2002-28, 2002.
[10]
G Granger, G Economou, S Bielski. Self?securing network interfaces: What, why and how[R]. Technical report, Carnegie Mellon University, CMUCS-02-144, May 2002.
[11]
J Jung, V Paxson, A Berger, et al. Fast portscan detection using sequential hypothesis testing[J]. IEEE Symposium on Security and Privacy, 2004.
[12]
N Weaver, S Staniford, V Paxson. Very fast containment of scanning worms[J]. Proceedings of the 13th USENIX Security Symposium, 2004.
[13]
Schultz M, Eskin E, Zadok E, Stolfo.Data mining methods for detection of new malicious executable[J]. Proceedings of the IEEE Symposium on Security and privacy, Los Alamitos, CA, IEEE press,2001:38-49.
[14]
Cai M, Hwang K, Kwod YK, et al.Collaborative internet worm containment[J].IEEE Security & Privacy,2005,3(3):25-33.
[15]
AHO A V, CORASICK M J.Efficient string matching: an aid to bibliographic search[A]// Communications of the ACM 18[C].1975:333-340.
[16]
BOYER R S,MOORE J S.A fast string searching algorithm[A]// Communications of the ACM 20[C].1977:762-772.
YANG D H,XU K,CUI Y.An improved wu?manber multiple patterns matching algorithm[A].Performance,Computing,and Communications Conference, 2006.
[20]
Jeffrey E F Friedl.Mastering regular expressions[M].Sebastopol ,CA : O''Reilly Media, Inc, 2006.
[21]
Yu Fang, Chen Zhifeng, Diao Yanlei.Fast and memory?efficient regular expression matching for deep packet inspection[C].EECS Department, University of California, Berkeley, Tech Rep: UCB/EECS-2006-76, 2006.
[22]
K Thompson.Regular expression search algorithm[J].Communications of the ACM, 1968,11(6):410-422.