Computer Science ›› 2018, Vol. 45 ›› Issue (12): 123-129.doi: 10.11896/j.issn.1002-137X.2018.12.019
• Information Security • Previous Articles Next Articles
YU Xue-shan1, HAN De-zhi1, DU Zheng-xin1,2
CLC Number:
[1]SOPHIA G A,GANDHI M.Stealthy DDoS detecting mecha-nism for cloud resilience system[C]∥2017 International Confe-rence on Information Communication and Embedded Systems (ICICES).IEEE,2017:1-5. [2]MODI C,PATEL D,BORISANIYA B,et al.A survey on security issues and solutions at different layers of Cloud computing[J].The Journal of Supercomputing,2013,63(2):561-592. [3]HAN D Z,BI K,JIN J,et al.A DDoS Attack Detection System Based on Spark Framework[J].Computer Science & Information Systems,2017,14:28. [4]GUELLIL I,AZOUAOU F.Arabic Dialect Identification with an Unsupervised Learning (Based on a Lexicon).Application Case:ALGERIAN Dialect[C]∥Computational Science and Engineering.IEEE,2017:724-731. [5]SAIDA I B,KAMEL N,OMAR B.A New Hybrid Algorithm for Document Clustering Based on Cuckoo Search and K-means[M]∥Recent Advances on Soft Computing and Data Mining.Springer International Publishing,2014:59-68. [6]NIU B,DUAN Q,LIU J,et al.A population-based clusteringtechnique using particle swarm optimization and k-means[J].Natural Computing,2016,16(1):1-15. [7]TEODOROVIC' D,ORCO M D.Advanced OR and AI Methods inTransportation BEE Colony Optimization- A Cooperative Learning Approach to Complex Transportation PRoblems∥Proceedings of the 16th Mini-EURO Conference and 10th Meeting of EWGT.2008. [8]KARABOGA D,BASTURK B.On the performance of artificial bee colony (ABC) algorithm[J].Applied Soft Computing,2008,8(1):687-697. [9]ZHAO W,MA H,HE Q.Parallel k-means clustering based on mapreduce[C]∥IEEE International Conference on Cloud Computing.Springer Berlin Heidelberg,2009:674-679. [10]CUI L,LI G,LIN Q,et al.A novel artificial bee colony algorithm with depth-first search framework and elite-guided search equation.Information Sciences,2016,367-368:1012-1044. [11]PRÍNCIPE J C,MIIKKULAINEN R.Advances in self-organi-zing maps[C]∥Advances in Self-Organizing Maps:7th International Workshop,WSOM 2009.Springer,2009. [12]DU B,SUN Y,CAI S,et al.Object Tracking in Satellite Videos by Fusing the Kernel Correlation Filter and the Three-Frame-Difference Algorithm[J].IEEE Geoscience & Remote Sensing Letters,2017,PP(99):1-5. [13]CAO Y C,CAI Z Q,SHAO Y B.An improved artificial bee colony clustering algorithm based on K-means [J].Journal of Computer Applications,2014,34(1):204-207.(in Chinese) 曹永春,蔡正琦,邵亚斌.基于 K-means的改进人工蜂群聚类算法[J].计算机应用,2014,34(1):204-207. [14]YANG X R,HAN B,SUN Z G,et al.SDN-based DDoS Attack Detection with Cross-Plane Collaboration and Lightweight Flow Monitoring[C]∥Global Communications Conference.2017. [15]YAN Y,ZHANG S,TANG J,et al.Understanding characteristics in multivariate traffic flow time series from complex network structure[J].Physica A:Statistical Mechanics & Its Applications,2017,477. [16]LAKHINA A,CROVELLA M,DIOT C.Mininganomalies using traffic feature distributions∥Conference on Applications,Technologies,Architectures,and Protocols for Computer Communications.ACM,2005:217-228. [17]PENG T,LECKIE C,RAMAMOHANARAO K.Proactivelydetecting distributed denial of service attacks using source IP address monitoring[C]∥International Conference on Research in Networking.Springer Berlin Heidelberg,2004:771-782. [18]SUN Q D,ZHANG D Y,GAO P.Distributed Denial of Service Attack Detection Based on Time Series Analysis.Chinese Journal of Computers,2005,28(5):767-773.(in Chinese) 孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测.计算机学报,2005,28(5):767-773. [19]XU Z,ZHU S,FU B,et al.Motion coherence based abnormalbehavior detection[C]∥Control and Decision Conference.IEEE,2017:214-218. [20]HAN D Z,BI K,XIE B L,et al.An Anomaly Detection on the Application-Layer -Based QoS in the Cloud Storage System[J].Computer Science and Information Systems,2016,13(2):659-676. [21]YUAN Y,WANG D,WANG Q.Anomaly Detection in TrafficScenes via Spatial-Aware Motion Reconstruction[J].IEEE Transactions on Intelligent Transportation Systems,2017,18(5):1198-1209. [22]CHANG R K C.Defending against flooding-based distributeddenial-of-service attacks:a tutorial[J].IEEE Communications Magazine,2002,40(10):42-51. [23]LEMON J.Resisting SYN Flood DoS Attacks with a SYNCache[C]∥Bsdcon Conference.2002. [24]WU J S,ZHANG W P,MA Y.The Data Analysis of KDDCUP99 Data Set [J].Computer Applications and Software,2014 (11):321-325.(in Chinese) 吴建胜,张文鹏,马垣.KDDCUP99数据集的数据分析研究[J].计算机应用与软件,2014(11):321-325. [25]AHMED H,ISMAIL M A,HYDER M F,et al.PerformanceComparison of Spark Clusters Configured Conventionally and a Cloud Service.Procedia Computer Science,2016,82:99-106. [26]ZAHARIA M,DAS T,LI H,et al.Discretized Streams:An Efficient and Fault-Tolerant Model for Stream Processing on Large Clusters[C]∥Usenix Conference on Hot Topics in Cloud Computing.USENIX Association,2012. |
[1] | CHAI Hui-min, ZHANG Yong, FANG Min. Aerial Target Grouping Method Based on Feature Similarity Clustering [J]. Computer Science, 2022, 49(9): 70-75. |
[2] | ZHANG Ya-di, SUN Yue, LIU Feng, ZHU Er-zhou. Study on Density Parameter and Center-Replacement Combined K-means and New Clustering Validity Index [J]. Computer Science, 2022, 49(1): 121-132. |
[3] | LI Na-na, WANG Yong, ZHOU Lin, ZOU Chun-ming, TIAN Ying-jie, GUO Nai-wang. DDoS Attack Random Forest Detection Method Based on Secondary Screening of Feature Importance [J]. Computer Science, 2021, 48(6A): 464-467. |
[4] | LI Shan, XU Xin-zheng. Parallel Pruning from Two Aspects for VGG16 Optimization [J]. Computer Science, 2021, 48(6): 227-233. |
[5] | TANG Xin-yao, ZHANG Zheng-jun, CHU Jie, YAN Tao. Density Peaks Clustering Algorithm Based on Natural Nearest Neighbor [J]. Computer Science, 2021, 48(3): 151-157. |
[6] | WANG Mao-guang, YANG Hang. Risk Control Model and Algorithm Based on AP-Entropy Selection Ensemble [J]. Computer Science, 2021, 48(11A): 71-76. |
[7] | WANG Wei-dong, XU Jin-hui, ZHANG Zhi-feng, YANG Xi-bei. Gaussian Mixture Models Algorithm Based on Density Peaks Clustering [J]. Computer Science, 2021, 48(10): 191-196. |
[8] | ZHANG Yu, LU Yi-hong, HUANG De-cai. Weighted Hesitant Fuzzy Clustering Based on Density Peaks [J]. Computer Science, 2021, 48(1): 145-151. |
[9] | XU Shou-kun, NI Chu-han, JI Chen-chen, LI Ning. Image Caption of Safety Helmets Wearing in Construction Scene Based on YOLOv3 [J]. Computer Science, 2020, 47(8): 233-240. |
[10] | DENG Ding-sheng. Application of Improved DBSCAN Algorithm on Spark Platform [J]. Computer Science, 2020, 47(11A): 425-429. |
[11] | ZHANG Jian-xin, LIU Hong, LI Yan. Efficient Grouping Method for Crowd Evacuation [J]. Computer Science, 2019, 46(6): 231-238. |
[12] | HU Chuang, YANG Geng, BAI Yun-lu. Clustering Algorithm in Differential Privacy Preserving [J]. Computer Science, 2019, 46(2): 120-126. |
[13] | CHEN Zi-hao, LI Qiang. Improved PBFT Consensus Mechanism Based on K-medoids [J]. Computer Science, 2019, 46(12): 101-107. |
[14] | ZHANG Tian-zhu, ZOU Cheng-ming. Study on Image Classification of Capsule Network Using Fuzzy Clustering [J]. Computer Science, 2019, 46(12): 279-285. |
[15] | CHEN Chun-tao, CHEN You-guang. Influence Space Based Robust Fast Search and Density Peak Clustering Algorithm [J]. Computer Science, 2019, 46(11): 216-221. |
|