4Yaar A, Perrig A, Song D.StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing defense[J].IEEE Journal on Selected Areas in Communi- cations, 2006,24(10) : 1853-1863.
5Durresi A, Paruchufi V, Barolli L.Fast autonomous system traceback[J].Jounal of Network and Computer Applica- tions, 2009,32 (2) : 448-454.
6Jin G,Yang J G.Deterministic packet marking based on redundant decomposition for IP traceback[J].IEEE Com- munications Letters, 2006,10( 3 ) : 204-206.
8Thorat S A,Khandelwal A K,Bruhadeshwar B,et al.Pay- load content based network anomaly detection[C]//First International Conference on the Applications of Digital Information and Web Technologies, 2008.
9Zhang L,White G B.An approach to detect executable content for anomaly based network intrusion detection[C]// IEEE International Parallel and Distributed Processing Symposium, 2007 : 1-8.
10Wang Ke,Stolfo,Salvatore J.Anomalous payload-based net-work intrusion detection[C]//Recent Advances in Intrusion Detection : 7th International Symposium, 2004: 203-222.