Author:
QIN Huidong,YANG Jia,LI Xiaonan,MA Hao,LUO Ziyuan,GUO Qiang
Publisher
China Science Publishing & Media Ltd.
Subject
Engineering (miscellaneous),Computer Science (miscellaneous)
Reference19 articles.
1. MOCKAPETRIS P V, DUNLAP K J. Development of the domain name system[C]// Innovations in Internetworking. [S. l.: s. n.], 1988: 367-377..
2. CHANG R K C. Defending against flooding-based distributed denial-of-service attacks: a tutorial. IEEE communications magazine, 2002, 40: 42-51.
3. BISIAUX J Y. DNS threats and mitigation strategies. Network Security, 2014, 2014: 5-9.
4. JI Xing, HUANG Tao, E Xinhua. A DNS Query anomaly detection algorithm based on log information. Journal of Beijing University of Posts and Telecommunications, 2018, 41: 83-89.
5. SCHÖLKOPF B, SMOLA A, MÜLLER K R. Nonlinear component analysis as a kernel eigenvalue problem. Neural Computation, 1998, 10: 1299-1319.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Zombie Hosts Identification Based on DNS Log;2021 7th IEEE International Conference on Network Intelligence and Digital Content (IC-NIDC);2021-11-17
2. Detection DNS Tunneling Botnets;2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS);2021-09-22