暂无分享,去创建一个
[1] 홍원기,et al. A Flow-based Method for Abnormal Network Traffic Detection , 2004 .
[2] Philip K. Chan,et al. Learning Rules and Clusters for Anomaly Detection in Network Traffic , 2005 .
[3] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[4] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[5] Kensuke Fukuda,et al. Scaling in Internet Traffic: A 14 Year and 3 Day Longitudinal Study, With Multiscale Analyses and Random Projections , 2017, IEEE/ACM Transactions on Networking.
[6] Abhishek Kumar,et al. Detection of Super Sources and Destinations in High-Speed Networks: Algorithms, Analysis and Evaluation , 2006, IEEE Journal on Selected Areas in Communications.
[7] Tariq Rahim Soomro,et al. Big Data Analysis: Apache Spark Perspective , 2015 .
[8] Kensuke Fukuda,et al. Seven Years and One Day: Sketching the Evolution of Internet Traffic , 2009, IEEE INFOCOM 2009.
[9] Jürgen Quittek,et al. Requirements for IP Flow Information Export (IPFIX) , 2004, RFC.
[10] Kensuke Fukuda,et al. A taxonomy of anomalies in backbone network traffic , 2014, 2014 International Wireless Communications and Mobile Computing Conference (IWCMC).
[11] Vijeta Kumawat,et al. Implementation of Spark Cluster Technique with SCALA , 2012 .