-
2
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
Berkeley, CA, USA: USENIX Association
-
J. D. Brutlag, "Aberrant behavior detection in time series for network monitoring," in LISA '00: Proceedings of the 14th USENIX Conference on System Administration. Berkeley, CA, USA: USENIX Association, 2000, pp. 139-146.
-
(2000)
LISA '00: Proceedings of the 14th USENIX Conference on System Administration
, pp. 139-146
-
-
Brutlag, J.D.1
-
3
-
-
0033712953
-
Statistical traffic modeling for network intrusion detection
-
Washington, DC, USA: IEEE Computer Society
-
J. B. D. Cabrera, B. Ravichandran, and R. K. Mehra, "Statistical traffic modeling for network intrusion detection," in MASCOTS '00: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems. Washington, DC, USA: IEEE Computer Society, 2000, p. 466.
-
(2000)
MASCOTS '00: Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
, pp. 466
-
-
Cabrera, J.B.D.1
Ravichandran, B.2
Mehra, R.K.3
-
5
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
IEEE
-
M.-S. Kim, H.-J. Kang, S.-C. Hong, S.-H. Chung, and J. W. Hong, "A flow-based method for abnormal network traffic detection," in Proceedings of the IEEE/IFIP Network Operations and Management Symposium. IEEE, 2004.
-
(2004)
Proceedings of the IEEE/IFIP Network Operations and Management Symposium
-
-
Kim, M.-S.1
Kang, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
7
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
New York, NY, USA: ACM Press
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment. New York, NY, USA: ACM Press, 2002, pp. 71-82.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
8
-
-
8344255864
-
Structural analysis of network traffic flows
-
New York, NY, USA: ACM Press
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft, "Structural analysis of network traffic flows," in SIGMETRICS 2004/PERFORMANCE 2004: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems. New York, NY, USA: ACM Press, 2004, pp. 61-72.
-
(2004)
SIGMETRICS 2004/PERFORMANCE 2004: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
9
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
New York, NY, USA: ACM Press
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in SIGCOMM '05: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. New York, NY, USA: ACM Press, 2005, pp. 217-228.
-
(2005)
SIGCOMM '05: Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
10
-
-
14944385135
-
Reversible sketches for efficient and accurate change detection over network data streams
-
New York, NY, USA: ACM Press
-
R. Schweller, A. Gupta, E. Parsons, and Y. Chen, "Reversible sketches for efficient and accurate change detection over network data streams," in IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement. New York, NY, USA: ACM Press, 2004, pp. 207-212.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 207-212
-
-
Schweller, R.1
Gupta, A.2
Parsons, E.3
Chen, Y.4
-
11
-
-
20544470066
-
Identification of intrusion scenarios through classification, characterization and analysis of firewall events
-
IEEE
-
L. Gaspary, C. Melchiors, F. Locatelli, and F. Dillenburg, "Identification of intrusion scenarios through classification, characterization and analysis of firewall events," in Proceedings of the IEEE Conference on Local Computer Networks. IEEE, 2004.
-
(2004)
Proceedings of the IEEE Conference on Local Computer Networks
-
-
Gaspary, L.1
Melchiors, C.2
Locatelli, F.3
Dillenburg, F.4
-
12
-
-
1242350162
-
-
Website
-
M. Kenney, "Ping of death," Website, http://www.insecure.org/ sploits/ping-o-death.html.
-
Ping of death
-
-
Kenney, M.1
-
13
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
"Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory," ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp. 262-294, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur
, vol.3
, Issue.4
, pp. 262-294
-
-
-
14
-
-
50049133193
-
-
P. Mell, V. Hu, R. Lippmann, J. Haines, and M. Zissman, An overview of issues in testing intrusion detection systems, 2003, nIST IR 7046.
-
P. Mell, V. Hu, R. Lippmann, J. Haines, and M. Zissman, "An overview of issues in testing intrusion detection systems," 2003, nIST IR 7046.
-
-
-
|