5Kim Y, Lau W C,Chuah M C, et al. Packet score: statistics- based overload control against distributed denial - of - service attaeks[J]. IEEE Transactions Depend able and Secure Computing,2006,3(2) :141 - 155.
6Jian Kang, Yuan Zhang,Jiu Bin Ju. Classifying DDoS attacks by hierarchical clustering based on similarity[C]//Proceeding of Fifth International Conference on Machine Learning and Cybernetics. Dalian, 2006.
7Yaar A,Perrig A, Song D. StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing Defense [J]. IEEE Journal on Selected Areas in Communications, 2006,24(10) :1853 - 1863.
8Khan, Traora. Queue- based analysis of DoS attacks[C]// Proc of IEEE Information Assurance workshop. Japan, 2005 : 266 - 273.
9Sun H, Zhaung Y, Cbao H J. A principal components analysis- based robust DI2bS defense system[ C]//IEEE International Conference Communications. Scotland, 2008: 1663 - 1669.