[1]Bro[CP/OL].[20100316].http://www.broids.org.
[2]Ribeiro B, Towsley D, Ye T, et al. Fisher Information on Sampled Packets: An Application to Flow Size Estimation[C]∥Proc of ACM/SIGCOMM Internet Measurement, 2006:1526.
[3]Paxson V. Bro: a System for Detecting Network Intruders in RealTime[J]. Computer Networks, 1999, 31(2324):24352463.
[4]Mai Jianning, Ashwin S, Chuah ChenNee, et al. Impact of Packet Sampling on Portscan Anomaly Detection[J]. IEEE Journal on Selected Areas of Communications Special Issue on Sampling the Internet, 2006, 24(12):22852298.
[5]Mai Jianning, Chuah ChenNee, Ashwin S, et al. Is Sampled Data Sufficient for Anomaly Detection?[C]∥Proc of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006:165176.
[6]张海, 许勇, 张凌. 随机分组抽样下流大小分布估计[J]. 华南理工大学学报, 2010, 38(4):162166.
[7]Jung J, Paxson V, Berger A, et al. Fast Portscan Detection Using Sequential Hypothesis Testing[C]∥Proc of 2004 IEEE Symposium on Security and Privacy, 2004: 211225.
[8]Network Mapper[CP/OL]. [20100316].http://www.insecure.org/nmap. |