-
2
-
-
33847322184
-
-
At
-
Arbor Networks. At http://www.arbornetworks.com/.
-
Networks
-
-
Arbor1
-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseille, November
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In Internet Measurement Workshop, Marseille, November 2002.
-
(2002)
Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
33749580207
-
Aberrant behavior detection in timeseries for network monitoring
-
New Orleans, December
-
J. Brutlag. Aberrant behavior detection in timeseries for network monitoring. In USENIX USA, New Orleans, December 2000.
-
(2000)
USENIX USA
-
-
Brutlag, J.1
-
5
-
-
84871993728
-
-
At
-
Cisco NetFlow. At www.cisco.com/warp/public/732/Tech/netflow/.
-
Cisco NetFlow
-
-
-
8
-
-
14944346102
-
Automatically Inferring Patterns of Resource Consumption in Network Traffic
-
Karlsruhe, August
-
C. Estan, S. Savage, and G. Varghese. Automatically Inferring Patterns of Resource Consumption in Network Traffic. In ACM SIGCOMM, Karlsruhe, August 2003.
-
(2003)
ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
9
-
-
84942256107
-
Statistical Approaches to DDoS Attack Detection and Response
-
April
-
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred. Statistical Approaches to DDoS Attack Detection and Response. DARPA Information Survivability Conference and Exposition (DISCEX), pages 303-314, April 2003.
-
(2003)
DARPA Information Survivability Conference and Exposition (DISCEX)
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
10
-
-
0035360814
-
Deriving traffic demands for operational IP networks: Methodology and experience
-
June
-
A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving traffic demands for operational IP networks: Methodology and experience. In IEEE/ACM Transactions on Neworking, pages 265-279, June 2001.
-
(2001)
IEEE/ACM Transactions on Neworking
, pp. 265-279
-
-
Feldmann, A.1
Greenberg, A.2
Lund, C.3
Reingold, N.4
Rexford, J.5
True, F.6
-
11
-
-
14844316210
-
A Framework for Classifying Denial of Service Attacks
-
Karlsruhe, August
-
A. Hussain, J. Heidemann, and C. Papadopoulos. A Framework for Classifying Denial of Service Attacks. In ACM SIGCOMM, Karlsruhe, August 2003.
-
(2003)
ACM SIGCOMM
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
12
-
-
77953077374
-
-
J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In WWW, Hawaii, May 2002.
-
J. Jung and B. Krishnamurthy and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In WWW, Hawaii, May 2002.
-
-
-
-
13
-
-
0018503842
-
Control procedures for residuals associated with Principal Component Analysis
-
J. E. Jackson and G. S. Mudholkar. Control procedures for residuals associated with Principal Component Analysis. Technometrics, pages 331-349, 1979.
-
(1979)
Technometrics
, pp. 331-349
-
-
Jackson, J.E.1
Mudholkar, G.S.2
-
15
-
-
84862465944
-
-
At
-
Juniper Traffic Sampling. At www.juniper.net/techpubs/software/junos/ junos60/swconfig60-policy/html/sampling-overview.html.
-
Juniper Traffic Sampling
-
-
-
16
-
-
0033646780
-
Towards a standardized notation and terminology in multiway analysis
-
H. A. L. Kiers. Towards a standardized notation and terminology in multiway analysis. J. of Chemometrics, pages 105-122, 2000.
-
(2000)
J. of Chemometrics
, pp. 105-122
-
-
Kiers, H.A.L.1
-
17
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
San Diego, August
-
H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In Usenix Security Symposium, San Diego, August 2004.
-
(2004)
Usenix Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
18
-
-
4544268957
-
A Flow-based Method for Abnormal Network Traffic Detection
-
Seoul, April
-
M.-S. Kim, H.-J. Kang, S.-C. Hung, S.-R Chung, and J. W. Hong. A Flow-based Method for Abnormal Network Traffic Detection. In IEEE/IFIP Network Operations and Management Symposium, Seoul, April 2004.
-
(2004)
IEEE/IFIP Network Operations and Management Symposium
-
-
Kim, M.-S.1
Kang, H.-J.2
Hung, S.-C.3
Chung, S.-R.4
Hong, J.W.5
-
20
-
-
38149128386
-
Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data
-
S. Kim, A. L. N. Reddy, and M. Vannucci. Detecting Traffic Anomalies through Aggregate Analysis of Packet Header Data. In Networking, 2004.
-
(2004)
Networking
-
-
Kim, S.1
Reddy, A.L.N.2
Vannucci, M.3
-
21
-
-
0141650502
-
Observed Structure of Addresses in IP Traffic
-
Marseille, November
-
E. Kohler, J. Li, V. Paxson, and S. Shenker. Observed Structure of Addresses in IP Traffic. In Internet Measurement Workshop, Marseille, November 2002.
-
(2002)
Internet Measurement Workshop
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
23
-
-
11244340240
-
Diagnosing Network-Wide Traffic Anomalies
-
Portland, August
-
A. Lakhina, M. Crovella, and C. Diot. Diagnosing Network-Wide Traffic Anomalies. In ACM SIGCOMM, Portland, August 2004.
-
(2004)
ACM SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
24
-
-
33847264582
-
Mining Anomalies Using Traffic Feature Distributions
-
Technical Report BUCS-TR-2005-002, Boston University
-
A. Lakhina, M. Crovella, and C. Diot. Mining Anomalies Using Traffic Feature Distributions. Technical Report BUCS-TR-2005-002, Boston University, 2005.
-
(2005)
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
25
-
-
11244265269
-
Structural Analysis of Network Traffic Flows
-
New York, June
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. Structural Analysis of Network Traffic Flows. In ACM SIGMETRICS, New York, June 2004.
-
(2004)
ACM SIGMETRICS
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
26
-
-
0034836392
-
Information-Theoretic Measures for Anomaly Detection
-
Oakland, CA, May
-
W. Lee and D. Xiang. Information-Theoretic Measures for Anomaly Detection. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2001.
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Lee, W.1
Xiang, D.2
-
28
-
-
33847309961
-
Data Mining for Intrusion Detection - Techniques, Applications and Systems
-
J. Pei, S. J. Upadhyaya, F. Farooq, and V. Govindaraju. Data Mining for Intrusion Detection - Techniques, Applications and Systems. In ICDE Tutorial, 2004.
-
(2004)
ICDE Tutorial
-
-
Pei, J.1
Upadhyaya, S.J.2
Farooq, F.3
Govindaraju, V.4
-
30
-
-
33750304995
-
Combining Routing and Traffic Data for Detection of IP Forwarding Anomalies
-
Portland, August
-
M. Roughan, T. Griffin, Z. M. Mao, A. Greenberg, and B. Freeman. Combining Routing and Traffic Data for Detection of IP Forwarding Anomalies. In ACM SIGCOMM NeTs Workshop, Portland, August 2004.
-
(2004)
ACM SIGCOMM NeTs Workshop
-
-
Roughan, M.1
Griffin, T.2
Mao, Z.M.3
Greenberg, A.4
Freeman, B.5
-
31
-
-
8344277171
-
Network Traffic Analysis and Modeling at the Connection Level
-
San Francisco, November
-
S. Sarvotham, R. Riedi, and R. Baraniuk. Network Traffic Analysis and Modeling at the Connection Level. In Internet Measurement Workshop, San Francisco, November 2001.
-
(2001)
Internet Measurement Workshop
-
-
Sarvotham, S.1
Riedi, R.2
Baraniuk, R.3
-
32
-
-
26844466732
-
Fast Detection of Scanning Worm Infections
-
Sophia Antipolois, France, September
-
S. Schechter, J. Jung, and A. Berger. Fast Detection of Scanning Worm Infections. In Seventh International Symposium on Recent Advances in Intrusion Detection (RAID), Sophia Antipolois, France, September 2004.
-
(2004)
Seventh International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Schechter, S.1
Jung, J.2
Berger, A.3
-
33
-
-
33847285122
-
-
SLAC Internet End-to-end Performance Monitoring IEPM-BW project, At
-
SLAC Internet End-to-end Performance Monitoring (IEPM-BW project). At http://www-iepm.slac.stanford.edu/bw/.
-
-
-
-
35
-
-
33750375994
-
Profiling Internet Backbone Traffic: Behavior Models and Applications
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya. Profiling Internet Backbone Traffic: Behavior Models and Applications. In ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
36
-
-
14944356227
-
Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications
-
Taormina, Italy, October
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online Identification of Hierarchical Heavy Hitters: Algorithms, Evaluation, and Applications. In Internet Measurement Conference, Taormina, Italy, October 2004.
-
(2004)
Internet Measurement Conference
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
|