Leland W, Taqqu M, and Willinger W, et al.. On the self-similar nature of Ethernet traffic (Extended Version)[J].IEEE/ACM Trans on Networking.1994, 2(1):1-15[2]Beran J, Sherman R, and Traqqu M S, et al.. Long range dependence in variable bit rate video traffic [J]. IEEE Trans. on Communication, 1995, 43(2/3/4), 1566-1579.[3]Paxson V and Floyd S. Wide area traffic: The failure of Poisson modeling[J].IEEE/ACM Trans on Networking.1995, 3(3):226-244[4]Feldmann A, Gilbert A C, and Willinger W, et al.. The changing nature of network traffic: Scaling phenomenon[J]. Comp. Commun. Rev., 1998, 28(2): 5-29.[5]Xiang Y, Lin Y, Lei W L, et al.. Detecting DDOS attack based on network self-similarity[J].IEE Proc Communications.2004, 151(3):292-295[6]Lan Li and Gyungho Lee. DDoS attack detection and wavelets[C]. Proc IEEE ICCCN (International Conference on Computer Communications and Networks) 2003, Oct. 2003: 421-427.[7]Ritke R, Hong X, and Gerla M. Contradictory relationship between Hurst parameter and queuing performance (extended version) [J]. Telecommunication Systems. 2001, 16 (1-2): 159-175.[8]李永利, 刘贵忠,王海军, 等. 自相似数据流的Hurst指数小波求解分析法[J].电子与信息学报.2003, 25(1):100-105浏览[9]Roghan M, Veitch D, and Abry P. Real-time estimation of the parameters of long-range dependence[J].IEEE/ACM Trans on Networking.2000, 8(4):467-478[10]Ma S and Ji C. Modeling heterogeneous network traffic in wavelet domain[J].IEEE/ACM Trans on Networking.2001, 9 (5):634-649[11]任勋益, 王汝传, 王海艳. 基于自相似检测DDoS攻击的小波分析方法[J]. 通信学报, 2006, 27(5): 6-11. Ren Xun-yi, Wang Ru-chuan, and Wang Hai-yan. Wavelet analysis method for detection of DDoS attack based on self-similar[J]. Journal on Communications, 2006, 27(5): 6-11.[12]Daubechies I. Ten Lectures on Wavelets[M]. Philadelphia, PA: SIAM, 1992.[13]李弻程,罗建书. 小波分析及其应用[M]. 北京: 电子工业出版社,2003. Li Bi-cheng and Luo Jian-shu. Ananlysis and Application of Wavelet[M]. Beijing: Publishing House of Electronics Industry, 2003.
|