-
1
-
-
17644366974
-
Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution
-
A. Kuman, M. Sung, J. Xu, and J. Wang, "Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution," Proc. ACM SIGMETRICS, 2004.
-
(2004)
Proc. ACM SIGMETRICS
-
-
Kuman, A.1
Sung, M.2
Xu, J.3
Wang, J.4
-
2
-
-
21844462874
-
Structural Analysis of Network Traffic Flows
-
June
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. Kolaczyk, and N. Taft, "Structural Analysis of Network Traffic Flows," Proc. ACM SIGMETRICS '04, June 2004.
-
(2004)
Proc. ACM SIGMETRICS '04
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.5
Taft, N.6
-
3
-
-
14944364840
-
Characterization of Network-Wide Anomalies in Traffic Flows,
-
Technical Report BUCS-2004-020, Boston Univ
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of Network-Wide Anomalies in Traffic Flows," Technical Report BUCS-2004-020, Boston Univ., 2004.
-
(2004)
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
4
-
-
34547456713
-
A Two-Step Statistical Approach for Inferring Network Traffic Demands,
-
BUCS-TR-2003-003, Mar. 2004
-
A. Medina, K. Salamatian, N. Taft, I. Matta, and C. Diot, "A Two-Step Statistical Approach for Inferring Network Traffic Demands," revision of Technical Report BUCS-TR-2003-003, Mar. 2004.
-
revision of Technical Report
-
-
Medina, A.1
Salamatian, K.2
Taft, N.3
Matta, I.4
Diot, C.5
-
5
-
-
0345568556
-
Traffic Matrix Estimation: Existing Techniques and New Directions
-
Aug
-
A. Medina, N. Taft, K. Salamatian, S. Bhattacharyya, and C. Diot, "Traffic Matrix Estimation: Existing Techniques and New Directions," Proc. ACM SIGCOMM '02, Aug. 2002.
-
(2002)
Proc. ACM SIGCOMM '02
-
-
Medina, A.1
Taft, N.2
Salamatian, K.3
Bhattacharyya, S.4
Diot, C.5
-
6
-
-
42949098315
-
A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links
-
B. Roh and S. Yoo, "A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links," Proc. Telecomm. and Networking, 2004.
-
(2004)
Proc. Telecomm. and Networking
-
-
Roh, B.1
Yoo, S.2
-
8
-
-
14944346102
-
Automatically Inferring Patterns of Resource Consumption in Network Traffic Problem
-
C. Estan, S. Savage, and G. Varghese, "Automatically Inferring Patterns of Resource Consumption in Network Traffic Problem," Proc. ACM SIGCOMM, 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
9
-
-
0032369672
-
Bayesian Inference of Network Traffic Using Link Count Data
-
June
-
C. Tebaldi and M. West, "Bayesian Inference of Network Traffic Using Link Count Data," J. Am. Statistical Assoc., pp. 557-573, June 1998.
-
(1998)
J. Am. Statistical Assoc
, pp. 557-573
-
-
Tebaldi, C.1
West, M.2
-
11
-
-
3142735161
-
Diamond in the Rough: Finding Hierarchical Heavy Hitters in Multi-Dimensional Data
-
June
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Diamond in the Rough: Finding Hierarchical Heavy Hitters in Multi-Dimensional Data," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 155-166, June 2004.
-
(2004)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 155-166
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
12
-
-
85012186650
-
Finding Hierarchical Heavy Hitters in Data Streams
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Finding Hierarchical Heavy Hitters in Data Streams," Proc. 29th Int'l Conf. Very Large Data Bases (VLDB '03), pp. 464-475, 2003.
-
(2003)
Proc. 29th Int'l Conf. Very Large Data Bases (VLDB '03)
, pp. 464-475
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
13
-
-
42949089679
-
-
Network Visualization Tools, http://www.caida.org/fundin/ internetatlas/viz/viztools.html, 2007.
-
(2007)
Network Visualization Tools
-
-
-
14
-
-
42949101890
-
-
AutoFocus, http://www.caida.org/tools/measurement/autofocus, 2007.
-
(2007)
AutoFocus
-
-
-
15
-
-
42949154578
-
-
cflowd: Traffic Flow Analysis Tool, http://www.caida.org/tools/ measurement/cflowd/, 2007.
-
cflowd: Traffic Flow Analysis Tool, http://www.caida.org/tools/ measurement/cflowd/, 2007.
-
-
-
-
16
-
-
42949095788
-
-
MIT Lincoln Laboratory-1998 DARPA Intrusion Detection Evaluation Data Set
-
MIT Lincoln Laboratory-1998 DARPA Intrusion Detection Evaluation Data Set, http://www.ll.mit.edu/IST/ideval/data/1998/ 1998_data_index.htm, 1998.
-
(1998)
-
-
-
17
-
-
42949174976
-
-
Network Monitoring Tools, http://www.slac.stanford.edu/xorg/ nmtf/nmtf-tools.html, 2007.
-
(2007)
Network Monitoring Tools
-
-
-
18
-
-
55249087732
-
-
Flow-Tools, http://www.splintered.net/sw/flow-tools/, 2007.
-
(2007)
Flow-Tools
-
-
-
19
-
-
84974756244
-
Characterizing End-to-End Packet Delay and Loss in the Internet
-
J. Bolot, "Characterizing End-to-End Packet Delay and Loss in the Internet," J. High Speed Networks, vol. 2, no. 3, pp. 289-298, 1993.
-
(1993)
J. High Speed Networks
, vol.2
, Issue.3
, pp. 289-298
-
-
Bolot, J.1
-
20
-
-
0442309490
-
Time-Varying Network Tomography
-
J. Cao, D. Davis, S. Vander Weil, and B. Yu, "Time-Varying Network Tomography," J. Am. Statistical Assoc., 2000.
-
(2000)
J. Am. Statistical Assoc
-
-
Cao, J.1
Davis, D.2
Vander Weil, S.3
Yu, B.4
-
21
-
-
84890503292
-
Applications of Sampling Methodologies to Network Traffic Characterization
-
K. Claffy, G.C. Pluyzos, and H.W. Braun, "Applications of Sampling Methodologies to Network Traffic Characterization," Proc ACM SIGCOMM, 1993.
-
(1993)
Proc ACM SIGCOMM
-
-
Claffy, K.1
Pluyzos, G.C.2
Braun, H.W.3
-
22
-
-
17644384166
-
On the Correlation of Internet Flow Characteristics,
-
Technical Report ISI-TR-574, USC/Information Sciences Inst, July
-
K. Lan and J. Heidemann, "On the Correlation of Internet Flow Characteristics," Technical Report ISI-TR-574, USC/Information Sciences Inst., July 2003.
-
(2003)
-
-
Lan, K.1
Heidemann, J.2
-
23
-
-
42949136797
-
Traffic Anomaly Detection and Characterization in the Tunisian National University Network
-
K. Ramah, H. Ayari, and F. Kamoun, "Traffic Anomaly Detection and Characterization in the Tunisian National University Network," Proc. Networking, 2006.
-
(2006)
Proc. Networking
-
-
Ramah, K.1
Ayari, H.2
Kamoun, F.3
-
25
-
-
84885827067
-
Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting
-
Aug
-
M. Cai, J. Pan, Y. Kwok, and K. Hwang, "Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting," Proc. SIGCOMM Workshops '05, Aug. 2005.
-
(2005)
Proc. SIGCOMM Workshops '05
-
-
Cai, M.1
Pan, J.2
Kwok, Y.3
Hwang, K.4
-
26
-
-
0004135984
-
IDIOT-Users Guide
-
The COAST Project, Technical Report TR-96-050, Dept. Computer Science, Purdue Univ, Sept
-
M. Crosbie, B. Dole, T. Ellis, I. Krsul, and E. Spafford, "IDIOT-Users Guide. The COAST Project," Technical Report TR-96-050, Dept. Computer Science, Purdue Univ., Sept. 1996.
-
(1996)
-
-
Crosbie, M.1
Dole, B.2
Ellis, T.3
Krsul, I.4
Spafford, E.5
-
27
-
-
0037661195
-
Network Traffic Anomaly Detection Based on Packet Bytes
-
M. Mahoney, "Network Traffic Anomaly Detection Based on Packet Bytes," Proc ACM Symp. Applied Computing, 2003.
-
(2003)
Proc ACM Symp. Applied Computing
-
-
Mahoney, M.1
-
28
-
-
4544268957
-
A Flow-Based Method for Abnormal Network Traffic Detection
-
Apr
-
M.S. Kim, H.J. Kang, S.C. Hung, S.H. Chung, and J.W. Hong, "A Flow-Based Method for Abnormal Network Traffic Detection," Proc IEEE/IFIP Network Operations and Management Symp., Apr. 2004.
-
(2004)
Proc IEEE/IFIP Network Operations and Management Symp
-
-
Kim, M.S.1
Kang, H.J.2
Hung, S.C.3
Chung, S.H.4
Hong, J.W.5
-
30
-
-
27144518261
-
A Novel Anomaly Detection Scheme Based on Principal Component Classifier
-
M. Shyu, S. Chen, K. Sarinnapakorn, and L. Chang, "A Novel Anomaly Detection Scheme Based on Principal Component Classifier," Proc IEEE Foundations and New Directions of Data Mining Workshop, pp. 172-179, 2003.
-
(2003)
Proc IEEE Foundations and New Directions of Data Mining Workshop
, pp. 172-179
-
-
Shyu, M.1
Chen, S.2
Sarinnapakorn, K.3
Chang, L.4
-
31
-
-
0029719644
-
The Space Complexity of Approximating the Frequency Moments
-
N. Alon, Y. Matias, and M. Szegedy, "The Space Complexity of Approximating the Frequency Moments," Proc. ACM Symp. Theory of Computing, pp. 20-29, 1996.
-
(1996)
Proc. ACM Symp. Theory of Computing
, pp. 20-29
-
-
Alon, N.1
Matias, Y.2
Szegedy, M.3
-
32
-
-
1542330197
-
Charging From Sampled Network Usage
-
N. Duffield, C. Lund, and M. Thorup, "Charging From Sampled Network Usage," Internet Measurement Workshop, pp. 245-256, 2001.
-
(2001)
Internet Measurement Workshop
, pp. 245-256
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
34
-
-
0141427794
-
A Signal Analysis of Network Traffic Anomalies
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A Signal Analysis of Network Traffic Anomalies," Proc Internet Measurement Workshop, 2002.
-
(2002)
Proc Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
35
-
-
24944473612
-
PISA: Automatic Extraction of Traffic Signatures
-
P. Chhabra, A. John, and H. Saran, "PISA: Automatic Extraction of Traffic Signatures," Proc. Networking, pp. 730-742, 2005.
-
(2005)
Proc. Networking
, pp. 730-742
-
-
Chhabra, P.1
John, A.2
Saran, H.3
-
36
-
-
0003254064
-
A Non-Instrusive, Wavelet-Based Approach to Detecting Network Performance Problems
-
P. Huang, A. Feldmann, and W. Willinger, "A Non-Instrusive, Wavelet-Based Approach to Detecting Network Performance Problems," Proc. Internet Measurement Workshop, pp. 213-227, 2001.
-
(2001)
Proc. Internet Measurement Workshop
, pp. 213-227
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
38
-
-
0032136445
-
Broadband Traffic Modeling: Simple Solutions to Hard Problems
-
R. Addie, M. Zukerman, and T. Neame, "Broadband Traffic Modeling: Simple Solutions to Hard Problems," IEEE Comm. Magazine, vol. 36, pp. 2-9, 1998.
-
(1998)
IEEE Comm. Magazine
, vol.36
, pp. 2-9
-
-
Addie, R.1
Zukerman, M.2
Neame, T.3
-
42
-
-
38149128386
-
Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data
-
S. Kim, A. Reddy, and M. Vannucci, "Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data," Proc Networking, 2004.
-
(2004)
Proc Networking
-
-
Kim, S.1
Reddy, A.2
Vannucci, M.3
-
43
-
-
0030157145
-
Birch: An Efficient Data Clustering Method for Very Large Databases
-
T. Zhang, R. Ramakrishnan, and M. Livny, "Birch: An Efficient Data Clustering Method for Very Large Databases," Proc. ACM SIGMOD Int'l Conf Management of Data, pp. 103-114, 1996.
-
(1996)
Proc. ACM SIGMOD Int'l Conf Management of Data
, pp. 103-114
-
-
Zhang, T.1
Ramakrishnan, R.2
Livny, M.3
-
44
-
-
0003239489
-
Bro: A System for Detecting Network Intruders in Real-Time
-
Jan
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. Seventh Usenix Security Symp., Jan. 1988.
-
(1988)
Proc. Seventh Usenix Security Symp
-
-
Paxson, V.1
-
45
-
-
0002989559
-
End-to-End Internet Packet Dynamics
-
V. Paxson, "End-to-End Internet Packet Dynamics," Proc ACM SIGCOMM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm., 1997.
-
(1997)
Proc ACM SIGCOMM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm
-
-
Paxson, V.1
-
46
-
-
0000690179
-
Where Mathematics Meets the Internet
-
W. Willinger and V. Paxson, "Where Mathematics Meets the Internet," Notices of the Am. Math. Soc., vol. 45, no. 8, pp. 961-970, 1998.
-
(1998)
Notices of the Am. Math. Soc
, vol.45
, Issue.8
, pp. 961-970
-
-
Willinger, W.1
Paxson, V.2
-
47
-
-
0001073106
-
Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data
-
Y. Vardi, "Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data," J. Am. Statistical Assoc., pp. 365-377, 1996.
-
(1996)
J. Am. Statistical Assoc
, pp. 365-377
-
-
Vardi, Y.1
-
49
-
-
42949092187
-
-
MIT Lincoln Laboratory-DARPA Intrusion Detection Evaluation
-
1998 Training Data Attack Schedule, MIT Lincoln Laboratory-DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/ IST/ideval/docs/1998/ attacks.html, 1998.
-
(1998)
1998 Training Data Attack Schedule
-
-
-
50
-
-
0004204715
-
A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,
-
master's thesis, Dept. Electrical Eng. and Computer Science, MIT, pp, June
-
K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," master's thesis, Dept. Electrical Eng. and Computer Science, MIT, pp. 51-53, June 1999.
-
(1999)
, pp. 51-53
-
-
Kendall, K.1
-
52
-
-
1842650939
-
Exploiting Hierarchical Domain Structure to Compute Similarity
-
P. Ganesan, H. Garcia-Molina, and J. Widom, "Exploiting Hierarchical Domain Structure to Compute Similarity," ACM Trans. Information Systems, vol. 21, no. 1, pp. 64-93, 2003.
-
(2003)
ACM Trans. Information Systems
, vol.21
, Issue.1
, pp. 64-93
-
-
Ganesan, P.1
Garcia-Molina, H.2
Widom, J.3
-
55
-
-
0442289065
-
Survey of Clustering Data Mining Techniques,
-
Technical Report 10: 92-1460, Accrue Software
-
P. Berkhin, "Survey of Clustering Data Mining Techniques," Technical Report 10: 92-1460, Accrue Software, 2002.
-
(2002)
-
-
Berkhin, P.1
-
56
-
-
16444383160
-
Survey of Clustering Algorithms
-
R. Xu and D. Wunsch, "Survey of Clustering Algorithms," IEEE Trans. Neural Networks, vol. 16, no. 3, pp. 645-678, 2005.
-
(2005)
IEEE Trans. Neural Networks
, vol.16
, Issue.3
, pp. 645-678
-
-
Xu, R.1
Wunsch, D.2
-
57
-
-
33645222472
-
Hierarchical Visualization of Network Intrusion Detection Data
-
T. Itoh, H. Takakura, A. Sawada, and K. Koyamada, "Hierarchical Visualization of Network Intrusion Detection Data," IEEE Computer Graphics and Applications, vol. 26, no. 2, pp. 40-47, 2006.
-
(2006)
IEEE Computer Graphics and Applications
, vol.26
, Issue.2
, pp. 40-47
-
-
Itoh, T.1
Takakura, H.2
Sawada, A.3
Koyamada, K.4
-
58
-
-
33749818129
-
Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification
-
Oct
-
J. Wang, D. Miller, and G. Kesidis, "Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification," IEEE J. Selected Areas of Comm., vol. 24, no. 10, pp. 1929-1941, Oct. 2006.
-
(2006)
IEEE J. Selected Areas of Comm
, vol.24
, Issue.10
, pp. 1929-1941
-
-
Wang, J.1
Miller, D.2
Kesidis, G.3
|