메뉴 건너뛰기




Volumn , Issue , 2001, Pages 69-73

Characteristics of Network Traffic Flow Anomalies

Author keywords

[No Author keywords available]

Indexed keywords

CORRELATION METHODS; FOURIER TRANSFORMS; NETWORK PROTOCOLS; ROUTERS; TIME SERIES ANALYSIS; WAVELET TRANSFORMS;

EID: 0041534324     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/505208.505211     Document Type: Conference Paper
Times cited : (161)

References (19)
  • 1
    • 4243179353 scopus 로고
    • Internet traffic flow profiling
    • University of California San Diego, November
    • K. Claffy, G. Polyzos, and H.-W. Braun, "Internet traffic flow profiling," Tech. Rep. TR-CS93-328, University of California San Diego, November 1989.
    • (1989) Tech. Rep. , vol.TR-CS93-328
    • Claffy, K.1    Polyzos, G.2    Braun, H.-W.3
  • 4
    • 1642391302 scopus 로고
    • Measurements of wide-area Internet traffic
    • Computer Science Department, University of California, Berkeley
    • R. Cáceres, "Measurements of wide-area Internet traffic," Tech. Rep. UCB/CSD 89/550, Computer Science Department, University of California, Berkeley, 1989.
    • (1989) Tech. Rep. , vol.UCB-CSD 89-550
    • Cáceres, R.1
  • 6
    • 0029323403 scopus 로고
    • Wide-area traffic: The failure of poisson modeling
    • June
    • V. Paxson and S. Floyd, "Wide-area traffic: The failure of poisson modeling," IEEE/ACM Transactions on Networking, vol. 3(3), pp. 226-244, June 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 7
    • 0031078972 scopus 로고    scopus 로고
    • Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level
    • February
    • W. Willinger, M. Taqqu, R. Sherman, and D. Wilson, "Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level," IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 71-86, February 1997.
    • (1997) IEEE/ACM Transactions on Networking , vol.5 , Issue.1 , pp. 71-86
    • Willinger, W.1    Taqqu, M.2    Sherman, R.3    Wilson, D.4
  • 10
    • 0029516767 scopus 로고
    • Schemes for fault identificaiton in communicaitons networks
    • December
    • I. Katzela and M. Schwartz, "Schemes for fault identificaiton in communicaitons networks," IEEE/ACM Transactions on Networking, vol. 3(6), pp. 753-764, December 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.6 , pp. 753-764
    • Katzela, I.1    Schwartz, M.2
  • 11
    • 84883986894 scopus 로고    scopus 로고
    • Fault detection in an ethernet network using anomaly signature matching
    • San Francisco, CA, September
    • F. Feather, D. Siewiorek, and R. Maxion, "Fault detection in an ethernet network using anomaly signature matching," in Proceedings of ACM SIGCOMM '93, San Francisco, CA, September 2000.
    • (2000) Proceedings of ACM SIGCOMM '93
    • Feather, F.1    Siewiorek, D.2    Maxion, R.3
  • 13
    • 0031351694 scopus 로고    scopus 로고
    • Proactive network fault detection
    • Kobe, Japan, April
    • C. Hood and C. Ji, "Proactive network fault detection," in Proceedings of IEEE INFOCOM '97, Kobe, Japan, April 1997.
    • (1997) Proceedings of IEEE INFOCOM '97
    • Hood, C.1    Ji, C.2
  • 15
    • 0012292276 scopus 로고
    • A neural network approach towards intrusion detection
    • Harris Corporation, July
    • K. Fox, R. Henning, J. Reed, and R. Simonian, "A neural network approach towards intrusion detection," Tech. Rep., Harris Corporation, July 1990.
    • (1990) Tech. Rep.
    • Fox, K.1    Henning, R.2    Reed, J.3    Simonian, R.4
  • 16
    • 0141776045 scopus 로고    scopus 로고
    • A markov chain model of temporal behavior for anomaly detection
    • West Point, NY, June
    • N. Ye, "A markov chain model of temporal behavior for anomaly detection," in Workshop on Information Assurance and Security, West Point, NY, June 2000.
    • (2000) Workshop on Information Assurance and Security
    • Ye, N.1
  • 18
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.