메뉴 건너뛰기




Volumn , Issue , 2003, Pages 234-247

Sketch-based change detection: Methods, evaluation, and applications

Author keywords

Change Detection; Data Stream Computation; Forecasting; Network Anomaly Detection; Sketch; Time Series Analysis

Indexed keywords

AUTOMATION; COMPUTER NETWORKS; COMPUTER SCIENCE; COST EFFECTIVENESS; DATA FLOW ANALYSIS; FORECASTING; SIGNAL DETECTION; SOFTWARE ENGINEERING; TELECOMMUNICATION TRAFFIC; TIME SERIES ANALYSIS;

EID: 14944367082     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (468)

References (40)
  • 9
    • 33749580207 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • New Orleans, LA, December
    • J. Brutlag. Aberrant behavior detection in time series for network monitoring. In Proc. USENIX LISA XIV, New Orleans, LA, December 2000. http://www.usenix.org/events/lisa2000/full_papers/brutlag/brutlag_html/index. html.
    • (2000) Proc. USENIX LISA XIV
    • Brutlag, J.1
  • 11
    • 84869158135 scopus 로고    scopus 로고
    • Finding frequent items in data streams
    • M. Charikar, K. Chen, and M. Farach-Colton. Finding frequent items in data streams. In Proc. of ICALP 2002, pages 693-703, 2002. http://www.cs.princeton.edu/~moses/papers/frequent.ps.
    • (2002) Proc. of ICALP 2002 , pp. 693-703
    • Charikar, M.1    Chen, K.2    Farach-Colton, M.3
  • 12
    • 0003108131 scopus 로고
    • Forecasting time series with outliers
    • C. Chen and L.-M. Liu. Forecasting time series with outliers. Journal of Forecasting, 12:13-35, 1993.
    • (1993) Journal of Forecasting , vol.12 , pp. 13-35
    • Chen, C.1    Liu, L.-M.2
  • 13
    • 21144473917 scopus 로고
    • Joint estimation of model parameters and outlier effects in time series
    • C. Chen and L.-M. Liu. Joint estimation of model parameters and outlier effects in time series. Journal of the American Statistical Association, 88:284-297, 1993.
    • (1993) Journal of the American Statistical Association , vol.88 , pp. 284-297
    • Chen, C.1    Liu, L.-M.2
  • 14
    • 24644517133 scopus 로고    scopus 로고
    • What's hot and what's not: Tracking most frequent items dynamically
    • July
    • G. Cormode and S. Muthukrishnan. What's hot and what's not: Tracking most frequent items dynamically. In Proc. ACM PODC '2003, July 2003.
    • (2003) Proc. ACM PODC '2003
    • Cormode, G.1    Muthukrishnan, S.2
  • 15
    • 14944363876 scopus 로고    scopus 로고
    • Estimating rarity and similarity over data stream windows
    • DIMACS Technical Report, November
    • M. Datar and S. Muthukrishnan. Estimating rarity and similarity over data stream windows. Technical Report 2001-21, DIMACS Technical Report, November 2001.
    • (2001) Technical Report , vol.2001 , Issue.21
    • Datar, M.1    Muthukrishnan, S.2
  • 17
    • 0141440878 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting
    • Pittsburgh, PA, August
    • C. Estan and G. Varghese. New directions in traffic measurement and accounting. In Proc. ACM SIGCOMM '2002, Pittsburgh, PA, August 2002.
    • (2002) Proc. ACM SIGCOMM '2002
    • Estan, C.1    Varghese, G.2
  • 18
    • 84883986894 scopus 로고
    • Fault detection in an ethernet network using anomaly signature matching
    • F. Feather, D. Siewiorek, and R. Maxion. Fault detection in an ethernet network using anomaly signature matching. In Proc. ACM SIGCOMM '93, 1993.
    • (1993) Proc. ACM SIGCOMM '93
    • Feather, F.1    Siewiorek, D.2    Maxion, R.3
  • 20
    • 0012292276 scopus 로고
    • A neural network approach towards intrusion detection
    • Technical Report, Harris Corporation, July
    • K. Fox, R. Henning, J. Reed, and R. Simonian. A neural network approach towards intrusion detection. Technical report, Technical Report, Harris Corporation, July 1990.
    • (1990) Technical Report
    • Fox, K.1    Henning, R.2    Reed, J.3    Simonian, R.4
  • 21
    • 0004317693 scopus 로고    scopus 로고
    • Quicksand: Quick summary and analysis of network data
    • DIMACS Technical Report, November
    • A. C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, and M. J. Strauss. Quicksand: Quick summary and analysis of network data. Technical Report 2001-43, DIMACS Technical Report, November 2001.
    • (2001) Technical Report , vol.2001 , Issue.43
    • Gilbert, A.C.1    Guha, S.2    Indyk, P.3    Muthukrishnan, S.4    Strauss, M.J.5
  • 22
    • 0031351694 scopus 로고    scopus 로고
    • Proactive network fault detection
    • Kobe, Japan, April
    • C. Hood and C. Ji. Proactive network fault detection. In Proc. IEEE INFOCOM '97, Kobe, Japan, April 1997.
    • (1997) Proc. IEEE INFOCOM '97
    • Hood, C.1    Ji, C.2
  • 25
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
    • Honolulu, Hawaii, May
    • J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In Proceedings of the World Wide Web Conference, Honolulu, Hawaii, May 2002. http://www.research.att.com/~bala/papers/www02-fc.html.
    • (2002) Proceedings of the World Wide Web Conference
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 26
    • 0029516767 scopus 로고
    • Schemes for fault identification in communication networks
    • December
    • I. Katzela and M. Schwartz. Schemes for fault identification in communication networks. IEEE/ACM Transactions on Networking, 3(6):753-764, December 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.6 , pp. 753-764
    • Katzela, I.1    Schwartz, M.2
  • 27
    • 0037281711 scopus 로고    scopus 로고
    • Foreign policy behavior and fractional integration
    • February
    • M. J. Lebo and W. H. Moore. Foreign policy behavior and fractional integration. Journal of Conflict Resolution, 1(47):13-32, February 2003. http://garnet.acns.fsu.edu/~whmoore/research/Lebo&Moore2003.pdf.
    • (2003) Journal of Conflict Resolution , vol.1 , Issue.47 , pp. 13-32
    • Lebo, M.J.1    Moore, W.H.2
  • 29
    • 85084161486 scopus 로고    scopus 로고
    • Inferring internet denial of service activity
    • Washington D.C., August
    • D. Moore, G. Voelker, and S. Savage. Inferring Internet Denial of Service Activity. In Proc. of the USENIX Security Symposium, Washington D.C., August 2001. http://www.cs.ucsd.edu/~savage/papers/UsenixSec01.pdf.
    • (2001) Proc. of the USENIX Security Symposium
    • Moore, D.1    Voelker, G.2    Savage, S.3
  • 30
    • 28444435635 scopus 로고    scopus 로고
    • Data streams: Algorithms and applications
    • Manuscript based on invited talk
    • S. Muthukrishnan. Data streams: Algorithms and applications, 2003. Manuscript based on invited talk from 14th SODA. Available from http://www.cs.rutgers.edu/~muthu/stream-l-l.ps.
    • (2003) 14th SODA
    • Muthukrishnan, S.1
  • 31
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • December
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, December 1999. ftp://ftp.ee.lbl.gov/papers/bro-CN99.ps.gz.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1
  • 32
    • 0003539116 scopus 로고    scopus 로고
    • Snort - Lightweight intrusion detection for networks
    • Seattle, WA, November
    • M. Roesch. Snort - Lightweight Intrusion Detection for Networks. In Proc. USENIX Lisa '99, Seattle, WA, November 1999.
    • (1999) Proc. USENIX Lisa '99
    • Roesch, M.1
  • 34
    • 77958468530 scopus 로고    scopus 로고
    • Supporting intrusion detection by graph clustering and graph drawing
    • Toulouse, France, October
    • J. Toelle and O. Niggemann. Supporting intrusion detection by graph clustering and graph drawing. In Proc. RAID '2000, Toulouse, France, October 2000.
    • (2000) Proc. RAID '2000
    • Toelle, J.1    Niggemann, O.2
  • 35
    • 0000875323 scopus 로고
    • Time series model specification in the presence of outliers
    • R. S. Tsay. Time series model specification in the presence of outliers. Journal of the American Statistical Association, 81:132-141, 1986.
    • (1986) Journal of the American Statistical Association , vol.81 , pp. 132-141
    • Tsay, R.S.1
  • 36
    • 84944452417 scopus 로고
    • Outliers, level shifts, and variance changes in time series
    • R. S. Tsay. Outliers, level shifts, and variance changes in time series. Journal of Forecasting, 7:1-20, 1988.
    • (1988) Journal of Forecasting , vol.7 , pp. 1-20
    • Tsay, R.S.1
  • 39
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • M. Wegman and J. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981.
    • (1981) Journal of Computer and System Sciences , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, J.2
  • 40
    • 0141776045 scopus 로고    scopus 로고
    • A markov chain model of temporal behavior for anomaly detection
    • West Point, NY, June
    • N. Ye. A markov chain model of temporal behavior for anomaly detection. In Workshop on Information Assurance and Security, West Point, NY, June 2000.
    • (2000) Workshop on Information Assurance and Security
    • Ye, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.