[1] Moore D, Paxson V, Savage S, et al.Inside the slammer worm [J].Security and Privacy Magazine, 2003, 1(4):33-39.
[2] Roesch M.Snort—lightweight intrusion detection for networks [C]//Proceedings of the 13th USENIX Conference on Systems Administration.Berkeley, CA, USA:USENIX Association, 1999:229-238.
[3] Plonka D.Flowscan:a network traffic flow reporting and visualization tool [C]//Proceedings of the 14th USENIX Conference on Systems Administration. Berkeley, CA, USA:USENIX Association, 2000:305-317.
[4] Venkataraman S, Song D, Gibbons P, et al.New streaming algorithms for fast detection of superspreaders [C]//Proceedings of the 12th Annual Network and Distributed System Security Symposium.San Diego, California, USA, 2005.
[5] Zhao Qi, Kumar Abhishek, Xu Jun.Joint data streaming and sampling techniques for detection of super sources and destinations [C]//Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. Berkeley, CA, USA:USENIX Association, 2005:77-90.
[6] Kamiyama Noriaki, Mori Tatsuya, Kawahara Ryoichi.Simple and adaptive identification of superspreaders by flow sampling[C]//Proceeding of the 26th IEEE International Conference on Computer Communications.Anchorage, AK, USA:IEEE INFOCOM, 2007:2481-2485.
[7] Kumar Abhishek, Xu Jun, Li Li, et al.Space-code BF for efficient traffic flow measurement [J].IEEE Journal on Selected Areas in Communications, 2006, 24(12):2327-2339.
[8] Key Laboratory of Computer and Network Technology of Jiangsu Province.IP trace[EB/OL].(2009-02)[2009-03].http://ntds.njnet.edu.cn/home/intro.php.(in Chinese)