|
[1] C. Estan, G. Varghese, and M. Fisk. Bitmap algorithms for counting active flows on high speed links. In Proceedings of the ACM Internet Measurement Conference, Oct. 2003.
[2] G. Cormode and S. Muthukrishnan, What's new: finding significant differences in network data streams. In: Proceedings of IEEE INFOCOM (2004).
[3] Lukasz Golab , M. Tamer Özsu, Issues in data stream management, ACM SIGMOD Record, v.32 n.2, p.5-14, June 2003.
[4] B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch-Based Change Detection: Methods, Evaluation, and Applications,” Proc. ACM Internet Measurement Conf., Oct. 2002.
[5] 鄭智記,基於Sketch 演算法之網路流量變異偵測系統之分析與研究,中原大學電機工程研究所,民國96年。
[6] M. Thorup and Y. Zhang. Tabulation based 4-universal hashing with applications to second moment estimation. In Proc. ACM-SIAM SODA, Jan. 2004.
[7] Yan Gao , Zhichun Li , Yan Chen, A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks, Proceedings of the 26th IEEE International Conference on Distributed Computing Systems, p.39, July 04-07, 2006 .
[8] C. Estan and G. Varghese, "Data streaming in computer networking," in Proc. Workshop on Management and Processing of Data Streams (MPDS), San Diego, CA, 2003.
[9] 林俊廷,於NetFPGA實現基於Sketch演算法之網路流量變異偵測系統,中原大學電機工程研究所,民國97年。
[12] http://www.netfpga.org/
[13] Y. Gao, Z. Li, Y. Chen, A dos resilient flow-level intrusion detection approach for high-speed networks, in: The International Conference on Distributed Computing Systems, 2006.
[14] G. Cormode and M. Hadjieleftheriou. Finding the frequent items in streams of data. Communications of the ACM, 52, 2009.
[15] Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Computing Surveys (2009)
[16] LAKHINA, A., CROVELLA, M., AND DIOT, C. Mining Anomalies Using Traffic Feature Distributions. ACM SIGCOMM (Philadelphia, August 2005).
[17] A. Lakhina, M. Crovella, and C. Diot. Diagnosing Network-Wide Traffic Anomalies. In ACM SIGCOMM, Portland, August 2004.
[18] X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. In IMC, pp. 147–152, Oct. 2006.
[19] G. Varghese. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices. Morgan Kaufmann Publishers, Inc., 2004.
[20] Y Hu, DM Chiu and JCS Lui, "Entropy based adaptive flow aggregation", IEEE/ACM Transactions on Networking, Vol 17 Issue 3, June 2009.
[21] Y. Gu, A. McCallum, and D. Towsley, Detecting anomalies in network traffic using maximum entropy estimation., in Proc. Internet Measurement Conference, 2005.
[22] http://netfpga.org/forums/showthread.php?6-Using-SRAM&highlight=bram
|