-
1
-
-
57749188160
-
Simple network mangement protocol (SNMP). RFC l 157/STD00 15, May 1990
-
J. D. Case, M. Fedor, M. L. Schoffstall and C. Davin, "Simple network mangement protocol (SNMP). RFC l 157/STD00 15, May 1990".
-
-
-
Case, J.D.1
Fedor, M.2
Schoffstall, M.L.3
Davin, C.4
-
4
-
-
43949144566
-
CoMo: An open infrastructure for network monitoring: Research Agenda
-
Technical report, Intel Research, February
-
Gianluca Iannaccone, "CoMo: An open infrastructure for network monitoring: Research Agenda", Technical report, Intel Research, February 2005.
-
(2005)
-
-
Iannaccone, G.1
-
5
-
-
1142267334
-
Gigascope: A stream database for network applications
-
C. Cranor, T. Johnson, O. Spatscheck and V. Shkapenyuk, "Gigascope: A stream database for network applications", in ACM SIGMOD, page 647-651, 2003.
-
(2003)
ACM SIGMOD
, pp. 647-651
-
-
Cranor, C.1
Johnson, T.2
Spatscheck, O.3
Shkapenyuk, V.4
-
7
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseilles, France, Nov
-
P. Barford, J. Kline, D. Plonka and A. Ron, "A signal analysis of network traffic anomalies", in ACM SIGCOMM Internet Measurement Workshop, (Marseilles, France), Nov. 2002.
-
(2002)
ACM SIGCOMM Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
8
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Aug
-
Anukool Lakhina, Mark Crovella and Christophe Diot, "Diagnosing network-wide traffic anomalies", SIGCOMM Comput. Commun. Rev. 4, 4, pp. 219-230, Aug. 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev
, vol.4
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
84893496533
-
Aberrant behavior detection and control in time series for network monitoring
-
New Orleans, LA, USA, USENIX, Dec
-
J. D. Brutlag, "Aberrant behavior detection and control in time series for network monitoring", in 14th Systems Administration Conference (LISA 2000), (New Orleans, LA, USA), USENIX, Dec. 2000.
-
(2000)
14th Systems Administration Conference (LISA 2000)
-
-
Brutlag, J.D.1
-
10
-
-
0043166339
-
Anomaly detection in IP Networks
-
Aug
-
M. Thottan and C. Ji, "Anomaly detection in IP Networks", IEEE Trans. on Signal Processing, vol. 51, n. 8, pp. 2191- 2204, Aug. 2003.
-
(2003)
IEEE Trans. on Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
12
-
-
0242540409
-
A unifying framework for detecting outliers and change points from non-stationary time series data
-
New York, NY, USA
-
K. Yamanishi and J. Takeuchi, "A unifying framework for detecting outliers and change points from non-stationary time series data", in KDD '02: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 676-681, New York, NY, USA, 2002.
-
(2002)
KDD '02: Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
, pp. 676-681
-
-
Yamanishi, K.1
Takeuchi, J.2
-
13
-
-
0029307876
-
A k-nearest neighbor classification rule based on Dempster-Shafer theory
-
May
-
T. Denoeux, "A k-nearest neighbor classification rule based on Dempster-Shafer theory", IEEE Transactions on Systems, Man and Cybernetics, vol. 25, n. 5, pp. 804 - 813, May 1995.
-
(1995)
IEEE Transactions on Systems, Man and Cybernetics
, vol.25
, Issue.5
, pp. 804-813
-
-
Denoeux, T.1
-
14
-
-
34548337359
-
Communication-Efficient Online Detection of Network-Wide Anomalies
-
Anchorage, Alaska, May
-
L. Huang, X. Nguyen, M. Garofalakis, J. Hellerstein, A. Joseph, M. Jordan and L. Taft, "Communication-Efficient Online Detection of Network-Wide Anomalies", in 26th Annual IEEE Conference on Computer Communications (INFOCOM'07), Anchorage, Alaska, May, 2007.
-
(2007)
26th Annual IEEE Conference on Computer Communications (INFOCOM'07)
-
-
Huang, L.1
Nguyen, X.2
Garofalakis, M.3
Hellerstein, J.4
Joseph, A.5
Jordan, M.6
Taft, L.7
-
15
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone and A. Lakhina, "Detection and identification of network anomalies using sketch subspaces", Proceedings of the 6th ACM SIGCOMM on Internet measurement, pp. 147-152, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM on Internet measurement
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
16
-
-
26844453653
-
Load characterization and anomaly detection for voice over IP traffic
-
Sept
-
M. Mandjes, I. Saniee and A.L. Stolyar, "Load characterization and anomaly detection for voice over IP traffic", Neural Networks, IEEE Transactions on, vol. 16, n. 5, pp. 1019-1026, Sept. 2005.
-
(2005)
Neural Networks, IEEE Transactions on
, vol.16
, Issue.5
, pp. 1019-1026
-
-
Mandjes, M.1
Saniee, I.2
Stolyar, A.L.3
-
17
-
-
39349111817
-
Intelligent Flow-Based Sampling for Effective Network Anomaly Detection
-
IEEE, pp
-
G. Androulidakis and S. Papavassiliou, "Intelligent Flow-Based Sampling for Effective Network Anomaly Detection", Global Telecommunications Conference, 2007. GLOBECOM'07. IEEE, pp. 1948-1953, 2007.
-
(2007)
Global Telecommunications Conference, 2007. GLOBECOM'07
, pp. 1948-1953
-
-
Androulidakis, G.1
Papavassiliou, S.2
-
18
-
-
14944367267
-
-
A. Lakhina, M. Crovella and Mark. Diot, Characterization of network-wide anomalies in traffic flows, in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 201-206, New York, NY, USA, 2004, ACM Press.
-
A. Lakhina, M. Crovella and Mark. Diot, "Characterization of network-wide anomalies in traffic flows", in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pp. 201-206, New York, NY, USA, 2004, ACM Press.
-
-
-
-
19
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Anukool Lakhina, Mark Crovella and Christophe Diot, "Mining anomalies using traffic feature distributions", in SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 217-228, 2005.
-
(2005)
SIGCOMM '05: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
20
-
-
38149086666
-
Network anomaly detection using nonextensive entropy
-
December
-
A. Ziviani, A. Gomes, M. Monsores and P. Rodrigues, "Network anomaly detection using nonextensive entropy", Communications Letters, IEEE vol. 11, n. 12, pp. 1034-1036, December 2007.
-
(2007)
Communications Letters, IEEE
, vol.11
, Issue.12
, pp. 1034-1036
-
-
Ziviani, A.1
Gomes, A.2
Monsores, M.3
Rodrigues, P.4
-
21
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
Aug
-
A. Patcha and J. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends", Computer Networks, vol. 51, n. 12, pp. 3448-3470, Aug. 2007.
-
(2007)
Computer Networks
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.2
-
22
-
-
0005312152
-
-
John Wiley and Sons, New York, NY, USA
-
J. Liebowitz, Expert System Applications to Telecommunications, John Wiley and Sons, New York, NY, USA, 1988.
-
(1988)
Expert System Applications to Telecommunications
-
-
Liebowitz, J.1
-
24
-
-
4544268957
-
A Flow-based Method for Abnormal Network Traffic Detection
-
Seoul, Apr
-
M. S. Kim, H. J. Kang, S. H. Hung, S. C. Chung and J. W. Hong, "A Flow-based Method for Abnormal Network Traffic Detection", in IEEE/IFIP Network Operations and Management Symposium, Seoul, Apr. 2004.
-
(2004)
IEEE/IFIP Network Operations and Management Symposium
-
-
Kim, M.S.1
Kang, H.J.2
Hung, S.H.3
Chung, S.C.4
Hong, J.W.5
-
25
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
Oct
-
C. Manikopoulos and S. Papavassiliou, "Network intrusion and fault detection: A statistical anomaly approach", IEEE Communications Magazine, vol. 40, n. 10, pp. 76-82, Oct, 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
26
-
-
4143149628
-
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
-
Boston, MA
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy and S. Stolfo, "A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data", in Data Mining for Security Applications, Kluwer, Boston, MA., 2002.
-
(2002)
Data Mining for Security Applications, Kluwer
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
27
-
-
33847704184
-
K-Means+ ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods
-
March
-
Shekhar R. Gaddam, Vir V. Phoha and Kiran S. Balagani, "K-Means+ ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods", Knowledge and Data Engineering, IEEE Transactions on, vol. 19, n. 3, pp. 345-354, March 2007.
-
(2007)
Knowledge and Data Engineering, IEEE Transactions on
, vol.19
, Issue.3
, pp. 345-354
-
-
Gaddam, S.R.1
Phoha, V.V.2
Balagani, K.S.3
-
28
-
-
0031351694
-
-
C.S. Hood and Ji. Chuanyi, Proactive network fault detection, in INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, 3, no., pp.1147-1155 3, 7-12, Ap 1997.
-
C.S. Hood and Ji. Chuanyi, "Proactive network fault detection", in INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol.3, no., pp.1147-1155 vol.3, 7-12, Ap 1997.
-
-
-
-
29
-
-
33846098197
-
Bayesian Neural Networks for Internet Traffic Classification
-
Jan
-
T. Auld, A. W. Moore and S. F. Gull, "Bayesian Neural Networks for Internet Traffic Classification", Neural Networks, IEEE Transactions on, vol. 18, n. 1, pp. 223-239, Jan. 2007.
-
(2007)
Neural Networks, IEEE Transactions on
, vol.18
, Issue.1
, pp. 223-239
-
-
Auld, T.1
Moore, A.W.2
Gull, S.F.3
-
30
-
-
85076083216
-
Comparison of Bayesian and Dempster-Shafer theory for sensing: A practitioner's approach
-
J.C. Hoffman and R.R. Murphy, "Comparison of Bayesian and Dempster-Shafer theory for sensing: A practitioner's approach", Proceedings of SPIE, vol. 203, pp. 266-279, 2003.
-
(2003)
Proceedings of SPIE
, vol.203
, pp. 266-279
-
-
Hoffman, J.C.1
Murphy, R.R.2
-
32
-
-
30144440941
-
Dempster-Shafer theory for intrusion detection in ad hoc networks
-
Nov.-Dec
-
T.M. Chen and V. Venkataramanan, "Dempster-Shafer theory for intrusion detection in ad hoc networks", Internet Computing, IEEE, vol. 9, n. 6, pp. 35-41, Nov.-Dec. 2005.
-
(2005)
Internet Computing, IEEE
, vol.9
, Issue.6
, pp. 35-41
-
-
Chen, T.M.1
Venkataramanan, V.2
-
33
-
-
0029255444
-
Network diagnosis by reasoning in uncertain nested evidence spaces
-
Feb/Mar/Apr
-
N. Dawes, J. Altoft and B. Pagurek, "Network diagnosis by reasoning in uncertain nested evidence spaces", Communications, IEEE Transactions on, vol. 43, n. 234, pp. 466-476, Feb/Mar/Apr 1995.
-
(1995)
Communications, IEEE Transactions on
, vol.43
, Issue.234
, pp. 466-476
-
-
Dawes, N.1
Altoft, J.2
Pagurek, B.3
-
34
-
-
0020826674
-
Sequential detection of abrupt changes in spectral characteristics of digital signals
-
Sep
-
M. Basseville and A. Benveniste, "Sequential detection of abrupt changes in spectral characteristics of digital signals", Information Theory, IEEE Transactions on, vol. 29, n. 5, pp. 709-724, Sep. 1983.
-
(1983)
Information Theory, IEEE Transactions on
, vol.29
, Issue.5
, pp. 709-724
-
-
Basseville, M.1
Benveniste, A.2
-
36
-
-
0029271793
-
QR methods of O(N) complexity in adaptive parameter estimation
-
Mar
-
Zheng-She Liu, "QR methods of O(N) complexity in adaptive parameter estimation", IEEE Trans. on Signal Processing, vol. 43, n. 3, pp. 720-729, Mar 1995.
-
(1995)
IEEE Trans. on Signal Processing
, vol.43
, Issue.3
, pp. 720-729
-
-
Liu, Z.-S.1
-
37
-
-
0041675012
-
-
Ph.d, Systems Science and Industrial Engineering Department, Binghamton University
-
Kari Sentz, Combination of Evidence in Dempster-Shafer Theory, Ph.d., Systems Science and Industrial Engineering Department, Binghamton University, 2002.
-
(2002)
Combination of Evidence in Dempster-Shafer Theory
-
-
Sentz, K.1
-
39
-
-
0031206656
-
Approximation algorithms and decision making in the Dempster-Shafer theory of evidence : An empirical study
-
M. Bauer, "Approximation algorithms and decision making in the Dempster-Shafer theory of evidence : An empirical study", International Journal of Approximate Reasoning, vol. 17, n. 2-3, pp. 217-237, 1997.
-
(1997)
International Journal of Approximate Reasoning
, vol.17
, Issue.2-3
, pp. 217-237
-
-
Bauer, M.1
-
40
-
-
57749205852
-
Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2), RFC 1445, Trusted Information Systems, Hughes, LAN Systems
-
Apr
-
J. Galvin and K. McCloghrie, "Administrative Model for version 2 of the Simple Network Management Protocol (SNMPv2), RFC 1445, Trusted Information Systems, Hughes, LAN Systems", Apr. 1993.
-
(1993)
-
-
Galvin, J.1
McCloghrie, K.2
-
41
-
-
0347608169
-
A Logic for Uncertain Probabilities
-
A. Josang, "A Logic for Uncertain Probabilities", International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 9, n. 3, pp. 279-311, 2001.
-
(2001)
International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
, vol.9
, Issue.3
, pp. 279-311
-
-
Josang, A.1
-
42
-
-
0031238275
-
Application of Majority Voting to Pattern Recognition: An Analysis of its Behaviour and Performance
-
L. Lam and C. Y. Suen, "Application of Majority Voting to Pattern Recognition: An Analysis of its Behaviour and Performance", IEEE Trans. on Syst. Man and Cyebrn.,Part A: Systems and Humans, vol. 27, pp. 553-568, 1997.
-
(1997)
IEEE Trans. on Syst. Man and Cyebrn.,Part A: Systems and Humans
, vol.27
, pp. 553-568
-
-
Lam, L.1
Suen, C.Y.2
-
43
-
-
33646423315
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
V.A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks", Computer Communications, vol. 29, n. 9, pp. 1433-1442, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
|