“…In these methods, the macro features of network traffic, such as self-similarity [1,2],entropy [3,4], probability distribution [5,6,7,8] et al, were extracted, followed by using various pattern recognition techniques, such as neural networks [9], hidden Markov model [10], integrated access control [11], and sensor fusion [12], machine learning [13] ,to detect network anomaly.…”