메뉴 건너뛰기




Volumn 35, Issue 4, 2005, Pages 217-228

Mining anomalies using traffic feature distributions

Author keywords

Anomaly classification; Anomaly detection; Network wide traffic analysis

Indexed keywords

ANOMALY CLASSIFICATION; ANOMALY DETECTION; DATA SOURCES; NETWORK WIDE TRAFFIC ANALYSIS; ANOMALY DIAGNOSIS; AUTOMATIC CLASSIFICATION; BACK-BONE NETWORK; FEATURE DISTRIBUTION; GENERAL NETWORKS; HIGHLY SENSITIVE DETECTIONS; LARGE-SCALE FLOWS; TRAFFIC ANALYSIS;

EID: 33847290520     PISSN: 01464833     EISSN: 01464833     Source Type: Conference Proceeding    
DOI: 10.1145/1090191.1080118     Document Type: Conference Paper
Times cited : (694)

References (36)
  • 2
    • 33847322184 scopus 로고    scopus 로고
    • At
    • Arbor Networks. At http://www.arbornetworks.com/.
    • Networks
    • Arbor1
  • 4
    • 33749580207 scopus 로고    scopus 로고
    • Aberrant behavior detection in timeseries for network monitoring
    • New Orleans, December
    • J. Brutlag. Aberrant behavior detection in timeseries for network monitoring. In USENIX USA, New Orleans, December 2000.
    • (2000) USENIX USA
    • Brutlag, J.1
  • 5
    • 84871993728 scopus 로고    scopus 로고
    • At
    • Cisco NetFlow. At www.cisco.com/warp/public/732/Tech/netflow/.
    • Cisco NetFlow
  • 8
    • 14944346102 scopus 로고    scopus 로고
    • Automatically Inferring Patterns of Resource Consumption in Network Traffic
    • Karlsruhe, August
    • C. Estan, S. Savage, and G. Varghese. Automatically Inferring Patterns of Resource Consumption in Network Traffic. In ACM SIGCOMM, Karlsruhe, August 2003.
    • (2003) ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 11
    • 14844316210 scopus 로고    scopus 로고
    • A Framework for Classifying Denial of Service Attacks
    • Karlsruhe, August
    • A. Hussain, J. Heidemann, and C. Papadopoulos. A Framework for Classifying Denial of Service Attacks. In ACM SIGCOMM, Karlsruhe, August 2003.
    • (2003) ACM SIGCOMM
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 12
    • 77953077374 scopus 로고    scopus 로고
    • J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In WWW, Hawaii, May 2002.
    • J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In WWW, Hawaii, May 2002.
  • 13
    • 0018503842 scopus 로고
    • Control procedures for residuals associated with Principal Component Analysis
    • J. E. Jackson and G. S. Mudholkar. Control procedures for residuals associated with Principal Component Analysis. Technometrics, pages 331-349, 1979.
    • (1979) Technometrics , pp. 331-349
    • Jackson, J.E.1    Mudholkar, G.S.2
  • 15
    • 84862465944 scopus 로고    scopus 로고
    • At
    • Juniper Traffic Sampling. At www.juniper.net/techpubs/software/junos/ junos60/swconfig60-policy/html/sampling-overview.html.
    • Juniper Traffic Sampling
  • 16
    • 0033646780 scopus 로고    scopus 로고
    • Towards a standardized notation and terminology in multiway analysis
    • H. A. L. Kiers. Towards a standardized notation and terminology in multiway analysis. J. of Chemometrics, pages 105-122, 2000.
    • (2000) J. of Chemometrics , pp. 105-122
    • Kiers, H.A.L.1
  • 17
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward Automated, Distributed Worm Signature Detection
    • San Diego, August
    • H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In Usenix Security Symposium, San Diego, August 2004.
    • (2004) Usenix Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 19
    • 24344452007 scopus 로고    scopus 로고
    • Analyzing Network Traffic as Images in Real-Time
    • S. Kim and A. L. N. Reddy. A Study of Analyzing Network Traffic as Images in Real-Time. In IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Kim, S.1    Reddy, A.L.N.2    Study of, A.3
  • 20
    • 38149128386 scopus 로고    scopus 로고
    • Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
    • S. Kim, A. L. N. Reddy, and M. Vannucci. Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data. In Networking, 2004.
    • (2004) Networking
    • Kim, S.1    Reddy, A.L.N.2    Vannucci, M.3
  • 22
  • 23
    • 11244340240 scopus 로고    scopus 로고
    • Diagnosing Network-Wide Traffic Anomalies
    • Portland, August
    • A. Lakhina, M. Crovella, and C. Diot. Diagnosing Network-Wide Traffic Anomalies. In ACM SIGCOMM, Portland, August 2004.
    • (2004) ACM SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 24
    • 33847264582 scopus 로고    scopus 로고
    • Mining Anomalies Using Traffic Feature Distributions
    • Technical Report BUCS-TR-2005-002, Boston University
    • A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies Using Traffic Feature Distributions. Technical Report BUCS-TR-2005-002, Boston University, 2005.
    • (2005)
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 26
    • 0034836392 scopus 로고    scopus 로고
    • Information-Theoretic Measures for Anomaly Detection
    • Oakland, CA, May
    • W. Lee and D. Xiang. Information-Theoretic Measures for Anomaly Detection. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.
    • (2001) IEEE Symposium on Security and Privacy
    • Lee, W.1    Xiang, D.2
  • 28
    • 33847309961 scopus 로고    scopus 로고
    • Data Mining for Intrusion Detection - Techniques, Applications and Systems
    • J. Pei, S. J. Upadhyaya, F. Farooq, and V. Govindaraju. Data Mining for Intrusion Detection - Techniques, Applications and Systems. In ICDE Tutorial, 2004.
    • (2004) ICDE Tutorial
    • Pei, J.1    Upadhyaya, S.J.2    Farooq, F.3    Govindaraju, V.4
  • 31
    • 8344277171 scopus 로고    scopus 로고
    • Network Traffic Analysis and Modeling at the Connection Level
    • San Francisco, November
    • S. Sarvotham, R. Riedi, and R. Baraniuk. Network Traffic Analysis and Modeling at the Connection Level. In Internet Measurement Workshop, San Francisco, November 2001.
    • (2001) Internet Measurement Workshop
    • Sarvotham, S.1    Riedi, R.2    Baraniuk, R.3
  • 33
    • 33847285122 scopus 로고    scopus 로고
    • SLAC Internet End-to-end Performance Monitoring IEPM-BW project, At
    • SLAC Internet End-to-end Performance Monitoring (IEPM-BW project). At http://www-iepm.slac.stanford.edu/bw/.
  • 35
    • 33750375994 scopus 로고    scopus 로고
    • Profiling Internet Backbone Traffic: Behavior Models and Applications
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya. Profiling Internet Backbone Traffic: Behavior Models and Applications. In ACM SIGCOMM, 2005.
    • (2005) ACM SIGCOMM
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 36
    • 14944356227 scopus 로고    scopus 로고
    • Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications
    • Taormina, Italy, October
    • Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications. In Internet Measurement Conference, Taormina, Italy, October 2004.
    • (2004) Internet Measurement Conference
    • Zhang, Y.1    Singh, S.2    Sen, S.3    Duffield, N.4    Lund, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.