메뉴 건너뛰기




Volumn , Issue , 2007, Pages 315-320

Network monitoring using traffic dispersion graphs (TDGs)

Author keywords

Behavioral approach; Hosts' connection graphs; Network monitoring; Network traffic visualization

Indexed keywords

CHALLENGING PROBLEM; GRAPH MODELING; INTERNET MEASUREMENTS; MONITOR (CO); MONITORING NETWORKS; NETWORK MONITORING; NETWORK TRAFFICS; PAYLOAD ENCRYPTION; PORT NUMBERS; SOCIAL BEHAVIORS; TRAFFIC MONITORING; TRAFFIC STATISTICS; TWO TYPES;

EID: 42149143451     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1298306.1298348     Document Type: Conference Paper
Times cited : (126)

References (13)
  • 2
    • 42149186201 scopus 로고    scopus 로고
    • The Design of GrIDS: A Graph-Based Intrusion Detection System
    • S. Cheung et al. The Design of GrIDS: A Graph-Based Intrusion Detection System. UCD TR-CSE-99-2, 1999.
    • (1999) UCD TR-CSE-99-2
    • Cheung, S.1
  • 8
    • 34547320799 scopus 로고    scopus 로고
    • Systematic Topology Analysis and Generation Using Degree Correlations
    • P. Mahadevan, D. Krioukov, K. Fall, and A. Vahdat. Systematic Topology Analysis and Generation Using Degree Correlations . In ACM SIGCOMM, 2006.
    • (2006) ACM SIGCOMM
    • Mahadevan, P.1    Krioukov, D.2    Fall, K.3    Vahdat, A.4
  • 9
    • 14344265818 scopus 로고    scopus 로고
    • Internet Traffic Classification using Bayesian Analysis Techniques
    • A. Moore and D. Zuev. Internet Traffic Classification using Bayesian Analysis Techniques. In ACM SIGMETRICS, 2005.
    • (2005) ACM SIGMETRICS
    • Moore, A.1    Zuev, D.2
  • 11
    • 85077580912 scopus 로고    scopus 로고
    • J. Guttag, and F .Kaashoek. Role Classification of Hosts Within Enterprise Networks based on Connection Patterns
    • G. Tan, M. Poletto, J. Guttag, and F .Kaashoek. Role Classification of Hosts Within Enterprise Networks based on Connection Patterns. In USENIX Annual Technical Conference, 2003.
    • (2003) USENIX Annual Technical Conference
    • Tan, G.1    Poletto, M.2
  • 12
    • 33750375994 scopus 로고    scopus 로고
    • Profiling Internet Backbone Traffic: Behavior Models and Applications
    • K. Xu, Z. Zhang, and S. Bhattacharyya. Profiling Internet Backbone Traffic: Behavior Models and Applications. In ACM SIGCOMM, 2005.
    • (2005) ACM SIGCOMM
    • Xu, K.1    Zhang, Z.2    Bhattacharyya, S.3
  • 13
    • 34547170668 scopus 로고    scopus 로고
    • Sybilguard: Defending Against Sybil Attacks via Social Networks
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: Defending Against Sybil Attacks via Social Networks. In ACM SIGCOMM, 2006.
    • (2006) ACM SIGCOMM
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.