Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 464-468.
• Information Security • Previous Articles Next Articles
ZHAO Bo1, ZHANG Hua-feng1, ZHANG Xun2, ZHAO Jin-xiong2, SUN Bi-ying3, YUAN Hui2
CLC Number:
[1]叶夏明,文福拴,尚金成,等.电力系统中信息物理安全风险传播机制[J].电网技术,2015,39(11):3072-3079. [2]360,全球关键信息基础设施网络安全状况分析报告[EB/OL].https://max.book118.com/html/2018/0528/169235020.Shtm. [3]王轶楠,林彦君,李焕,等.DoS攻击下电力网络控制系统脆弱性分析及防御[J].控制与决策,2017,32(3):411-418. [4]WANG Y N,LIN Z Y,LIANG X,et al.On modeling of electrical cyber- physical systems considering cyber security[J].Frontiers of Information Technology & Electronic Engineering,2016,17(5):465-478. [5]徐久强,周洋洋,王进法,等.基于流时间影响域的网络流量异常检测[J].东北大学学报(自然科学版),2019,40(1):26-31. [6]金伟.基于统计方法的异常数据检测及其修复[D].南京:南京邮电大学,2016. [7]程光,龚俭,丁伟.基于抽样测量的高速网络实时异常检测模型[J].软件学报,2003,14(3):594-599. [8]DAINOTTI A,PESCAPE A,VENTRE G.Wavelet-based De-tection of DoS Attacks[C]∥IEEE Communications Society GLOBECOM.2006. [9]BARFORD P,KLINE J,PLONKA D,et al.A signal analysis ofnetwork traffic anomalies[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment.ACM,2002:71-82. [10]LAKHINA A,CROVELLA M,DIOT C.Diagnosing network-wide trafficanomalies[C]∥ACM SIGCOMM Computer Communication Review.ACM,2004:219-230. [11]李洪成,吴晓平,姜洪海.基于改进聚类分析的网络流量异常检测方法[J].网络与信息安全学报,2015,1(1):66-71. [12]卜国卿.网络流量异常检测技术研究与实现[D].电子科技大学,2018. [13]RINGBERG H,SOULE A,REXFORD J,et al.Sensitivity ofpcafor traffic anomaly detection[C]∥ ACM SIGMETRICS PerformanceEvaluation Review.ACM,2007:109-120. [14]夏守璐.希尔伯特黄变换在网络流量中的研究与应用[D].成都:电子科技大学,2017. [15]苟玲.基于经验模态分解的网络流量检测与分析方法[D].成都:电子科技大学,2018. [16]王海涛,陈晖.网络性能测量评价指标体系研究[J].信息技术与标准化,2012(9):34-37. [17]马云龙,张千里,王继龙.基于IPFIX的网络流量日志系统[J].通信学报,2013,2(4):5-8. [18]BRAUCKHOFF D,SALAMATIAN K,MAY M.ApplyingPCA for traffic anomaly detection:Problems and solutions[C]∥INFOCOM 2009.IEEE,2009:2866-2870. [19]AHMED T,COATES M,LAKHINA A.Multivariate online anomaly detection using kernel recursive least squares[C]∥26th IEEE International Conference on Computer Communications INFOCOM 2007.IEEE,2007:625-633. [20]GAO J,HU G,YAO X,et al.Anomaly detection of network traffic based on wavelet packet[C]∥Asia-Pacific Conference on Communications,2006.APCC’06.IEEE,2006:1-5. [21]BARFORD P,KLINE J,PLONKA D,et al.A signal analysis ofnetwork traffic anomalies[C]∥Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment.ACM,2002:71-82. [22]肖政宏,潘梅森,尹浩.基于网络流量小波分析的异常检测研究[J].计算机应用研究,2007,2(1):299-301. [23]GRABS E,PETERSONS E.Analysis of self-similar traffic parameters for network performance improvement with real-time discrete wavelet transform[C]∥2015 IEEE 3rd Workshop on Advances in Information,Electronic and Electrical Engineering (AIEEE).IEEE,2015:1-6. |
[1] | XU Tian-hui, GUO Qiang, ZHANG Cai-ming. Time Series Data Anomaly Detection Based on Total Variation Ratio Separation Distance [J]. Computer Science, 2022, 49(9): 101-110. |
[2] | WANG Xin-tong, WANG Xuan, SUN Zhi-xin. Network Traffic Anomaly Detection Method Based on Multi-scale Memory Residual Network [J]. Computer Science, 2022, 49(8): 314-322. |
[3] | DU Hang-yuan, LI Duo, WANG Wen-jian. Method for Abnormal Users Detection Oriented to E-commerce Network [J]. Computer Science, 2022, 49(7): 170-178. |
[4] | SHEN Shao-peng, MA Hong-jiang, ZHANG Zhi-heng, ZHOU Xiang-bing, ZHU Chun-man, WEN Zuo-cheng. Three-way Drift Detection for State Transition Pattern on Multivariate Time Series [J]. Computer Science, 2022, 49(4): 144-151. |
[5] | WU Yu-kun, LI Wei, NI Min-ya, XU Zhi-cheng. Anomaly Detection Model Based on One-class Support Vector Machine Fused Deep Auto-encoder [J]. Computer Science, 2022, 49(3): 144-151. |
[6] | LENG Jia-xu, TAN Ming-pi, HU Bo, GAO Xin-bo. Video Anomaly Detection Based on Implicit View Transformation [J]. Computer Science, 2022, 49(2): 142-148. |
[7] | ZHANG Ye, LI Zhi-hua, WANG Chang-jie. Kernel Density Estimation-based Lightweight IoT Anomaly Traffic Detection Method [J]. Computer Science, 2021, 48(9): 337-344. |
[8] | QING Lai-yun, ZHANG Jian-gong, MIAO Jun. Temporal Modeling for Online Anomaly Detection [J]. Computer Science, 2021, 48(7): 206-212. |
[9] | GUO Yi-shan, LIU Man-dan. Anomaly Detection Based on Spatial-temporal Trajectory Data [J]. Computer Science, 2021, 48(6A): 213-219. |
[10] | XING Hong-jie, HAO ZhongHebei. Novelty Detection Method Based on Global and Local Discriminative Adversarial Autoencoder [J]. Computer Science, 2021, 48(6): 202-209. |
[11] | XIANG Chang-sheng, CHEN Zhi-gang. Chaotic Prediction Model of Network Traffic for Massive Data [J]. Computer Science, 2021, 48(5): 289-293. |
[12] | ZOU Cheng-ming, CHEN De. Unsupervised Anomaly Detection Method for High-dimensional Big Data Analysis [J]. Computer Science, 2021, 48(2): 121-127. |
[13] | SHI Lin-shan, MA Chuang, YANG Yun, JIN Min. Anomaly Detection Algorithm Based on SSC-BP Neural Network [J]. Computer Science, 2021, 48(12): 357-363. |
[14] | ZHANG Ning, FANG Jing-wen, ZHAO Yu-xuan. Bitcoin Price Forecast Based on Mixed LSTM Model [J]. Computer Science, 2021, 48(11A): 39-45. |
[15] | YANG Yue-lin, BI Zong-ze. Network Anomaly Detection Based on Deep Learning [J]. Computer Science, 2021, 48(11A): 540-546. |
|