메뉴 건너뛰기




Volumn 5, Issue 2, 2008, Pages 65-77

Network anomaly diagnosis via statistical analysis and evidential reasoning

Author keywords

Anomaly detection; Dempster Shafer theory; Network management

Indexed keywords

ADMINISTRATIVE DATA PROCESSING; DATA FUSION; FORMAL LOGIC; MANAGEMENT INFORMATION SYSTEMS; METROPOLITAN AREA NETWORKS; SENSOR DATA FUSION; STATISTICAL METHODS;

EID: 57749203346     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2008.021103     Document Type: Article
Times cited : (15)

References (43)
  • 1
    • 57749188160 scopus 로고    scopus 로고
    • Simple network mangement protocol (SNMP). RFC l 157/STD00 15, May 1990
    • J. D. Case, M. Fedor, M. L. Schoffstall and C. Davin, "Simple network mangement protocol (SNMP). RFC l 157/STD00 15, May 1990".
    • Case, J.D.1    Fedor, M.2    Schoffstall, M.L.3    Davin, C.4
  • 4
    • 43949144566 scopus 로고    scopus 로고
    • CoMo: An open infrastructure for network monitoring: Research Agenda
    • Technical report, Intel Research, February
    • Gianluca Iannaccone, "CoMo: An open infrastructure for network monitoring: Research Agenda", Technical report, Intel Research, February 2005.
    • (2005)
    • Iannaccone, G.1
  • 5
  • 8
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • Aug
    • Anukool Lakhina, Mark Crovella and Christophe Diot, "Diagnosing network-wide traffic anomalies", SIGCOMM Comput. Commun. Rev. 4, 4, pp. 219-230, Aug. 2004.
    • (2004) SIGCOMM Comput. Commun. Rev , vol.4 , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 9
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection and control in time series for network monitoring
    • New Orleans, LA, USA, USENIX, Dec
    • J. D. Brutlag, "Aberrant behavior detection and control in time series for network monitoring", in 14th Systems Administration Conference (LISA 2000), (New Orleans, LA, USA), USENIX, Dec. 2000.
    • (2000) 14th Systems Administration Conference (LISA 2000)
    • Brutlag, J.D.1
  • 10
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP Networks
    • Aug
    • M. Thottan and C. Ji, "Anomaly detection in IP Networks", IEEE Trans. on Signal Processing, vol. 51, n. 8, pp. 2191- 2204, Aug. 2003.
    • (2003) IEEE Trans. on Signal Processing , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 13
    • 0029307876 scopus 로고
    • A k-nearest neighbor classification rule based on Dempster-Shafer theory
    • May
    • T. Denoeux, "A k-nearest neighbor classification rule based on Dempster-Shafer theory", IEEE Transactions on Systems, Man and Cybernetics, vol. 25, n. 5, pp. 804 - 813, May 1995.
    • (1995) IEEE Transactions on Systems, Man and Cybernetics , vol.25 , Issue.5 , pp. 804-813
    • Denoeux, T.1
  • 16
    • 26844453653 scopus 로고    scopus 로고
    • Load characterization and anomaly detection for voice over IP traffic
    • Sept
    • M. Mandjes, I. Saniee and A.L. Stolyar, "Load characterization and anomaly detection for voice over IP traffic", Neural Networks, IEEE Transactions on, vol. 16, n. 5, pp. 1019-1026, Sept. 2005.
    • (2005) Neural Networks, IEEE Transactions on , vol.16 , Issue.5 , pp. 1019-1026
    • Mandjes, M.1    Saniee, I.2    Stolyar, A.L.3
  • 18
    • 14944367267 scopus 로고    scopus 로고
    • A. Lakhina, M. Crovella and Mark. Diot, Characterization of network-wide anomalies in traffic flows, in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 201-206, New York, NY, USA, 2004, ACM Press.
    • A. Lakhina, M. Crovella and Mark. Diot, "Characterization of network-wide anomalies in traffic flows", in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 201-206, New York, NY, USA, 2004, ACM Press.
  • 20
    • 38149086666 scopus 로고    scopus 로고
    • Network anomaly detection using nonextensive entropy
    • December
    • A. Ziviani, A. Gomes, M. Monsores and P. Rodrigues, "Network anomaly detection using nonextensive entropy", Communications Letters, IEEE vol. 11, n. 12, pp. 1034-1036, December 2007.
    • (2007) Communications Letters, IEEE , vol.11 , Issue.12 , pp. 1034-1036
    • Ziviani, A.1    Gomes, A.2    Monsores, M.3    Rodrigues, P.4
  • 21
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • Aug
    • A. Patcha and J. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends", Computer Networks, vol. 51, n. 12, pp. 3448-3470, Aug. 2007.
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.2
  • 25
    • 0036804085 scopus 로고    scopus 로고
    • Network intrusion and fault detection: A statistical anomaly approach
    • Oct
    • C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach", IEEE Communications Magazine, vol. 40, n. 10, pp. 76-82, Oct, 2002.
    • (2002) IEEE Communications Magazine , vol.40 , Issue.10 , pp. 76-82
    • Manikopoulos, C.1    Papavassiliou, S.2
  • 27
    • 33847704184 scopus 로고    scopus 로고
    • K-Means+ ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods
    • March
    • Shekhar R. Gaddam, Vir V. Phoha and Kiran S. Balagani, "K-Means+ ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods", Knowledge and Data Engineering, IEEE Transactions on, vol. 19, n. 3, pp. 345-354, March 2007.
    • (2007) Knowledge and Data Engineering, IEEE Transactions on , vol.19 , Issue.3 , pp. 345-354
    • Gaddam, S.R.1    Phoha, V.V.2    Balagani, K.S.3
  • 28
    • 0031351694 scopus 로고    scopus 로고
    • C.S. Hood and Ji. Chuanyi, Proactive network fault detection, in INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 3, no., pp.1147-1155 3, 7-12, Ap 1997.
    • C.S. Hood and Ji. Chuanyi, "Proactive network fault detection", in INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, no., pp.1147-1155 vol.3, 7-12, Ap 1997.
  • 29
    • 33846098197 scopus 로고    scopus 로고
    • Bayesian Neural Networks for Internet Traffic Classification
    • Jan
    • T. Auld, A. W. Moore and S. F. Gull, "Bayesian Neural Networks for Internet Traffic Classification", Neural Networks, IEEE Transactions on, vol. 18, n. 1, pp. 223-239, Jan. 2007.
    • (2007) Neural Networks, IEEE Transactions on , vol.18 , Issue.1 , pp. 223-239
    • Auld, T.1    Moore, A.W.2    Gull, S.F.3
  • 30
    • 85076083216 scopus 로고    scopus 로고
    • Comparison of Bayesian and Dempster-Shafer theory for sensing: A practitioner's approach
    • J.C. Hoffman and R.R. Murphy, "Comparison of Bayesian and Dempster-Shafer theory for sensing: A practitioner's approach", Proceedings of SPIE, vol. 203, pp. 266-279, 2003.
    • (2003) Proceedings of SPIE , vol.203 , pp. 266-279
    • Hoffman, J.C.1    Murphy, R.R.2
  • 32
    • 30144440941 scopus 로고    scopus 로고
    • Dempster-Shafer theory for intrusion detection in ad hoc networks
    • Nov.-Dec
    • T.M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks", Internet Computing, IEEE, vol. 9, n. 6, pp. 35-41, Nov.-Dec. 2005.
    • (2005) Internet Computing, IEEE , vol.9 , Issue.6 , pp. 35-41
    • Chen, T.M.1    Venkataramanan, V.2
  • 33
    • 0029255444 scopus 로고
    • Network diagnosis by reasoning in uncertain nested evidence spaces
    • Feb/Mar/Apr
    • N. Dawes, J. Altoft and B. Pagurek, "Network diagnosis by reasoning in uncertain nested evidence spaces", Communications, IEEE Transactions on, vol. 43, n. 234, pp. 466-476, Feb/Mar/Apr 1995.
    • (1995) Communications, IEEE Transactions on , vol.43 , Issue.234 , pp. 466-476
    • Dawes, N.1    Altoft, J.2    Pagurek, B.3
  • 34
    • 0020826674 scopus 로고
    • Sequential detection of abrupt changes in spectral characteristics of digital signals
    • Sep
    • M. Basseville and A. Benveniste, "Sequential detection of abrupt changes in spectral characteristics of digital signals", Information Theory, IEEE Transactions on, vol. 29, n. 5, pp. 709-724, Sep. 1983.
    • (1983) Information Theory, IEEE Transactions on , vol.29 , Issue.5 , pp. 709-724
    • Basseville, M.1    Benveniste, A.2
  • 36
    • 0029271793 scopus 로고
    • QR methods of O(N) complexity in adaptive parameter estimation
    • Mar
    • Zheng-She Liu, "QR methods of O(N) complexity in adaptive parameter estimation", IEEE Trans. on Signal Processing, vol. 43, n. 3, pp. 720-729, Mar 1995.
    • (1995) IEEE Trans. on Signal Processing , vol.43 , Issue.3 , pp. 720-729
    • Liu, Z.-S.1
  • 37
    • 0041675012 scopus 로고    scopus 로고
    • Ph.d, Systems Science and Industrial Engineering Department, Binghamton University
    • Kari Sentz, Combination of Evidence in Dempster-Shafer Theory, Ph.d., Systems Science and Industrial Engineering Department, Binghamton University, 2002.
    • (2002) Combination of Evidence in Dempster-Shafer Theory
    • Sentz, K.1
  • 39
    • 0031206656 scopus 로고    scopus 로고
    • Approximation algorithms and decision making in the Dempster-Shafer theory of evidence : An empirical study
    • M. Bauer, "Approximation algorithms and decision making in the Dempster-Shafer theory of evidence : An empirical study", International Journal of Approximate Reasoning, vol. 17, n. 2-3, pp. 217-237, 1997.
    • (1997) International Journal of Approximate Reasoning , vol.17 , Issue.2-3 , pp. 217-237
    • Bauer, M.1
  • 40
    • 57749205852 scopus 로고
    • Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2), RFC 1445, Trusted Information Systems, Hughes, LAN Systems
    • Apr
    • J. Galvin and K. McCloghrie, "Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2), RFC 1445, Trusted Information Systems, Hughes, LAN Systems", Apr. 1993.
    • (1993)
    • Galvin, J.1    McCloghrie, K.2
  • 42
    • 0031238275 scopus 로고    scopus 로고
    • Application of Majority Voting to Pattern Recognition: An Analysis of its Behaviour and Performance
    • L. Lam and C. Y. Suen, "Application of Majority Voting to Pattern Recognition: An Analysis of its Behaviour and Performance", IEEE Trans. on Syst. Man and Cyebrn.,Part A: Systems and Humans, vol. 27, pp. 553-568, 1997.
    • (1997) IEEE Trans. on Syst. Man and Cyebrn.,Part A: Systems and Humans , vol.27 , pp. 553-568
    • Lam, L.1    Suen, C.Y.2
  • 43
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • V.A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks", Computer Communications, vol. 29, n. 9, pp. 1433-1442, 2006.
    • (2006) Computer Communications , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.