메뉴 건너뛰기




Volumn 20, Issue 6, 2008, Pages 752-767

An efficient clustering scheme to exploit hierarchical data in network traffic analysis

Author keywords

Classification and association rules; Clustering; Hierarchical clustering; Network management; Network monitoring; Traffic analysis

Indexed keywords

ASSOCIATION RULES; CLASSIFICATION (OF INFORMATION); CLUSTER ANALYSIS; CLUSTERING ALGORITHMS; NUMERICAL METHODS; TELECOMMUNICATION TRAFFIC;

EID: 42949110140     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2007.190725     Document Type: Article
Times cited : (44)

References (58)
  • 1
    • 17644366974 scopus 로고    scopus 로고
    • Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution
    • A. Kuman, M. Sung, J. Xu, and J. Wang, "Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution," Proc. ACM SIGMETRICS, 2004.
    • (2004) Proc. ACM SIGMETRICS
    • Kuman, A.1    Sung, M.2    Xu, J.3    Wang, J.4
  • 3
    • 14944364840 scopus 로고    scopus 로고
    • Characterization of Network-Wide Anomalies in Traffic Flows,
    • Technical Report BUCS-2004-020, Boston Univ
    • A. Lakhina, M. Crovella, and C. Diot, "Characterization of Network-Wide Anomalies in Traffic Flows," Technical Report BUCS-2004-020, Boston Univ., 2004.
    • (2004)
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 6
    • 42949098315 scopus 로고    scopus 로고
    • A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links
    • B. Roh and S. Yoo, "A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links," Proc. Telecomm. and Networking, 2004.
    • (2004) Proc. Telecomm. and Networking
    • Roh, B.1    Yoo, S.2
  • 8
    • 14944346102 scopus 로고    scopus 로고
    • Automatically Inferring Patterns of Resource Consumption in Network Traffic Problem
    • C. Estan, S. Savage, and G. Varghese, "Automatically Inferring Patterns of Resource Consumption in Network Traffic Problem," Proc. ACM SIGCOMM, 2003.
    • (2003) Proc. ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 9
    • 0032369672 scopus 로고    scopus 로고
    • Bayesian Inference of Network Traffic Using Link Count Data
    • June
    • C. Tebaldi and M. West, "Bayesian Inference of Network Traffic Using Link Count Data," J. Am. Statistical Assoc., pp. 557-573, June 1998.
    • (1998) J. Am. Statistical Assoc , pp. 557-573
    • Tebaldi, C.1    West, M.2
  • 13
    • 42949089679 scopus 로고    scopus 로고
    • Network Visualization Tools, http://www.caida.org/fundin/ internetatlas/viz/viztools.html, 2007.
    • (2007) Network Visualization Tools
  • 14
    • 42949101890 scopus 로고    scopus 로고
    • AutoFocus, http://www.caida.org/tools/measurement/autofocus, 2007.
    • (2007) AutoFocus
  • 15
    • 42949154578 scopus 로고    scopus 로고
    • cflowd: Traffic Flow Analysis Tool, http://www.caida.org/tools/ measurement/cflowd/, 2007.
    • cflowd: Traffic Flow Analysis Tool, http://www.caida.org/tools/ measurement/cflowd/, 2007.
  • 16
    • 42949095788 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory-1998 DARPA Intrusion Detection Evaluation Data Set
    • MIT Lincoln Laboratory-1998 DARPA Intrusion Detection Evaluation Data Set, http://www.ll.mit.edu/IST/ideval/data/1998/ 1998_data_index.htm, 1998.
    • (1998)
  • 17
    • 42949174976 scopus 로고    scopus 로고
    • Network Monitoring Tools, http://www.slac.stanford.edu/xorg/ nmtf/nmtf-tools.html, 2007.
    • (2007) Network Monitoring Tools
  • 18
    • 55249087732 scopus 로고    scopus 로고
    • Flow-Tools, http://www.splintered.net/sw/flow-tools/, 2007.
    • (2007) Flow-Tools
  • 19
    • 84974756244 scopus 로고
    • Characterizing End-to-End Packet Delay and Loss in the Internet
    • J. Bolot, "Characterizing End-to-End Packet Delay and Loss in the Internet," J. High Speed Networks, vol. 2, no. 3, pp. 289-298, 1993.
    • (1993) J. High Speed Networks , vol.2 , Issue.3 , pp. 289-298
    • Bolot, J.1
  • 21
    • 84890503292 scopus 로고
    • Applications of Sampling Methodologies to Network Traffic Characterization
    • K. Claffy, G.C. Pluyzos, and H.W. Braun, "Applications of Sampling Methodologies to Network Traffic Characterization," Proc ACM SIGCOMM, 1993.
    • (1993) Proc ACM SIGCOMM
    • Claffy, K.1    Pluyzos, G.C.2    Braun, H.W.3
  • 22
    • 17644384166 scopus 로고    scopus 로고
    • On the Correlation of Internet Flow Characteristics,
    • Technical Report ISI-TR-574, USC/Information Sciences Inst, July
    • K. Lan and J. Heidemann, "On the Correlation of Internet Flow Characteristics," Technical Report ISI-TR-574, USC/Information Sciences Inst., July 2003.
    • (2003)
    • Lan, K.1    Heidemann, J.2
  • 23
    • 42949136797 scopus 로고    scopus 로고
    • Traffic Anomaly Detection and Characterization in the Tunisian National University Network
    • K. Ramah, H. Ayari, and F. Kamoun, "Traffic Anomaly Detection and Characterization in the Tunisian National University Network," Proc. Networking, 2006.
    • (2006) Proc. Networking
    • Ramah, K.1    Ayari, H.2    Kamoun, F.3
  • 25
    • 84885827067 scopus 로고    scopus 로고
    • Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting
    • Aug
    • M. Cai, J. Pan, Y. Kwok, and K. Hwang, "Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting," Proc. SIGCOMM Workshops '05, Aug. 2005.
    • (2005) Proc. SIGCOMM Workshops '05
    • Cai, M.1    Pan, J.2    Kwok, Y.3    Hwang, K.4
  • 26
    • 0004135984 scopus 로고    scopus 로고
    • IDIOT-Users Guide
    • The COAST Project, Technical Report TR-96-050, Dept. Computer Science, Purdue Univ, Sept
    • M. Crosbie, B. Dole, T. Ellis, I. Krsul, and E. Spafford, "IDIOT-Users Guide. The COAST Project," Technical Report TR-96-050, Dept. Computer Science, Purdue Univ., Sept. 1996.
    • (1996)
    • Crosbie, M.1    Dole, B.2    Ellis, T.3    Krsul, I.4    Spafford, E.5
  • 27
    • 0037661195 scopus 로고    scopus 로고
    • Network Traffic Anomaly Detection Based on Packet Bytes
    • M. Mahoney, "Network Traffic Anomaly Detection Based on Packet Bytes," Proc ACM Symp. Applied Computing, 2003.
    • (2003) Proc ACM Symp. Applied Computing
    • Mahoney, M.1
  • 35
    • 24944473612 scopus 로고    scopus 로고
    • PISA: Automatic Extraction of Traffic Signatures
    • P. Chhabra, A. John, and H. Saran, "PISA: Automatic Extraction of Traffic Signatures," Proc. Networking, pp. 730-742, 2005.
    • (2005) Proc. Networking , pp. 730-742
    • Chhabra, P.1    John, A.2    Saran, H.3
  • 36
    • 0003254064 scopus 로고    scopus 로고
    • A Non-Instrusive, Wavelet-Based Approach to Detecting Network Performance Problems
    • P. Huang, A. Feldmann, and W. Willinger, "A Non-Instrusive, Wavelet-Based Approach to Detecting Network Performance Problems," Proc. Internet Measurement Workshop, pp. 213-227, 2001.
    • (2001) Proc. Internet Measurement Workshop , pp. 213-227
    • Huang, P.1    Feldmann, A.2    Willinger, W.3
  • 38
    • 0032136445 scopus 로고    scopus 로고
    • Broadband Traffic Modeling: Simple Solutions to Hard Problems
    • R. Addie, M. Zukerman, and T. Neame, "Broadband Traffic Modeling: Simple Solutions to Hard Problems," IEEE Comm. Magazine, vol. 36, pp. 2-9, 1998.
    • (1998) IEEE Comm. Magazine , vol.36 , pp. 2-9
    • Addie, R.1    Zukerman, M.2    Neame, T.3
  • 42
    • 38149128386 scopus 로고    scopus 로고
    • Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data
    • S. Kim, A. Reddy, and M. Vannucci, "Detecting Traffic Anomalies at the Source through Aggregate Analysis of Packet Header Data," Proc Networking, 2004.
    • (2004) Proc Networking
    • Kim, S.1    Reddy, A.2    Vannucci, M.3
  • 44
    • 0003239489 scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • Jan
    • V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. Seventh Usenix Security Symp., Jan. 1988.
    • (1988) Proc. Seventh Usenix Security Symp
    • Paxson, V.1
  • 46
    • 0000690179 scopus 로고    scopus 로고
    • Where Mathematics Meets the Internet
    • W. Willinger and V. Paxson, "Where Mathematics Meets the Internet," Notices of the Am. Math. Soc., vol. 45, no. 8, pp. 961-970, 1998.
    • (1998) Notices of the Am. Math. Soc , vol.45 , Issue.8 , pp. 961-970
    • Willinger, W.1    Paxson, V.2
  • 47
    • 0001073106 scopus 로고    scopus 로고
    • Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data
    • Y. Vardi, "Network Tomography: Estimating Source-Destination Traffic Intensities from Link Data," J. Am. Statistical Assoc., pp. 365-377, 1996.
    • (1996) J. Am. Statistical Assoc , pp. 365-377
    • Vardi, Y.1
  • 49
    • 42949092187 scopus 로고    scopus 로고
    • MIT Lincoln Laboratory-DARPA Intrusion Detection Evaluation
    • 1998 Training Data Attack Schedule, MIT Lincoln Laboratory-DARPA Intrusion Detection Evaluation, http://www.ll.mit.edu/ IST/ideval/docs/1998/ attacks.html, 1998.
    • (1998) 1998 Training Data Attack Schedule
  • 50
    • 0004204715 scopus 로고    scopus 로고
    • A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems,
    • master's thesis, Dept. Electrical Eng. and Computer Science, MIT, pp, June
    • K. Kendall, "A Database of Computer Attacks for the Evaluation of Intrusion Detection Systems," master's thesis, Dept. Electrical Eng. and Computer Science, MIT, pp. 51-53, June 1999.
    • (1999) , pp. 51-53
    • Kendall, K.1
  • 52
    • 1842650939 scopus 로고    scopus 로고
    • Exploiting Hierarchical Domain Structure to Compute Similarity
    • P. Ganesan, H. Garcia-Molina, and J. Widom, "Exploiting Hierarchical Domain Structure to Compute Similarity," ACM Trans. Information Systems, vol. 21, no. 1, pp. 64-93, 2003.
    • (2003) ACM Trans. Information Systems , vol.21 , Issue.1 , pp. 64-93
    • Ganesan, P.1    Garcia-Molina, H.2    Widom, J.3
  • 55
    • 0442289065 scopus 로고    scopus 로고
    • Survey of Clustering Data Mining Techniques,
    • Technical Report 10: 92-1460, Accrue Software
    • P. Berkhin, "Survey of Clustering Data Mining Techniques," Technical Report 10: 92-1460, Accrue Software, 2002.
    • (2002)
    • Berkhin, P.1
  • 56
    • 16444383160 scopus 로고    scopus 로고
    • Survey of Clustering Algorithms
    • R. Xu and D. Wunsch, "Survey of Clustering Algorithms," IEEE Trans. Neural Networks, vol. 16, no. 3, pp. 645-678, 2005.
    • (2005) IEEE Trans. Neural Networks , vol.16 , Issue.3 , pp. 645-678
    • Xu, R.1    Wunsch, D.2
  • 58
    • 33749818129 scopus 로고    scopus 로고
    • Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification
    • Oct
    • J. Wang, D. Miller, and G. Kesidis, "Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification," IEEE J. Selected Areas of Comm., vol. 24, no. 10, pp. 1929-1941, Oct. 2006.
    • (2006) IEEE J. Selected Areas of Comm , vol.24 , Issue.10 , pp. 1929-1941
    • Wang, J.1    Miller, D.2    Kesidis, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.