1Hagiwara T,,Doi H,Tode H,Ikeda H.High2speed calculation method of the Hurst parameter based on real traffic[].Local Computer Networks LCN Proceedingsth Annual IEEE Conference on.2000
2L.R.Rabiner,,B.H.Juang.An introduction to hidden Markovmodels1[].IEEE ASSP Magazine.1986
3Rocky K C Chang.Defending against flooding-based distributed denial of service attacks[].IEEE Communications Magazine.2002
4Mirkovic J,Reiher P.A taxonomy of DDoS attack and DDoS de-fense mechanisms[].ACM SIGCOMM Computer Communica-tion Review.2004
5W E Leland,M S Taqqu,W Willinger,D V Wilson.On theself-similar nature of Ethernet traffic(extended version)[].IEEE ACM Transactions on Networking.1994