메뉴 건너뛰기




Volumn 53, Issue 6, 2009, Pages 774-789

Characterizing network traffic by means of the NetMine framework

Author keywords

Generalized association rules; Network data analysis; Network traffic characterization

Indexed keywords

ASSOCIATIVE PROCESSING; DATA MINING; INFORMATION MANAGEMENT; INFORMATION THEORY; INTERNET; TAXONOMIES;

EID: 61749086468     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2008.12.011     Document Type: Article
Times cited : (28)

References (38)
  • 3
    • 33846098197 scopus 로고    scopus 로고
    • Bayesian neural networks for internet traffic classification
    • Auld T., Moore A., and Gull S. Bayesian neural networks for internet traffic classification. IEEE Transactions on Neural Networks 18 1 (2007) 223
    • (2007) IEEE Transactions on Neural Networks , vol.18 , Issue.1 , pp. 223
    • Auld, T.1    Moore, A.2    Gull, S.3
  • 4
    • 0001986373 scopus 로고    scopus 로고
    • Continuous queries over data streams
    • Babu S., and Widom J. Continuous queries over data streams. ACM SIGMOD Record 30 3 (2001) 109-120
    • (2001) ACM SIGMOD Record , vol.30 , Issue.3 , pp. 109-120
    • Babu, S.1    Widom, J.2
  • 5
    • 33744469859 scopus 로고    scopus 로고
    • M. Baldi, E. Baralis, F. Risso, Data mining techniques for effective and scalable traffic analysis, in: Integrated Network Management, 2005, IM 2005, 2005 Ninth IFIP/IEEE International Symposium on, 2005, pp. 105-118.
    • M. Baldi, E. Baralis, F. Risso, Data mining techniques for effective and scalable traffic analysis, in: Integrated Network Management, 2005, IM 2005, 2005 Ninth IFIP/IEEE International Symposium on, 2005, pp. 105-118.
  • 6
    • 61749094681 scopus 로고    scopus 로고
    • Generalized itemset discovery by means of opportunistic aggregation
    • Technical report, Politecnico di Torino
    • E. Baralis, T. Cerquitelli, V. D'Elia, Generalized itemset discovery by means of opportunistic aggregation, Technical report, Politecnico di Torino, 2008, .
    • (2008)
    • Baralis, E.1    Cerquitelli, T.2    D'Elia, V.3
  • 10
    • 0040377588 scopus 로고    scopus 로고
    • Niagaracq: A scalable continuous query system for internet databases
    • W. Chen, J.F. Naughton, P.A. Bernstein Eds, May 16-18, Dallas, Texas, USA, ACM
    • J. Chen, D.J. DeWitt, F. Tian, Y. Wang, Niagaracq: a scalable continuous query system for internet databases, in: W. Chen, J.F. Naughton, P.A. Bernstein (Eds.), Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, May 16-18, 2000, Dallas, Texas, USA, ACM, 2000, pp. 379-390.
    • (2000) Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data , pp. 379-390
    • Chen, J.1    DeWitt, D.J.2    Tian, F.3    Wang, Y.4
  • 12
    • 34248358287 scopus 로고    scopus 로고
    • Traffic classification using clustering algorithms
    • ACM Press, New York, NY, USA
    • Erman J., Arlitt M., and Mahanti A. Traffic classification using clustering algorithms. MineNet '06 (2006), ACM Press, New York, NY, USA 281-286
    • (2006) MineNet '06 , pp. 281-286
    • Erman, J.1    Arlitt, M.2    Mahanti, A.3
  • 15
    • 0033311838 scopus 로고    scopus 로고
    • Mining multiple-level association rules in large databases
    • Han J., and Fu Y. Mining multiple-level association rules in large databases. IEEE Transactions on Knowledge and Data Engineering 11 5 (1999) 798-804
    • (1999) IEEE Transactions on Knowledge and Data Engineering , vol.11 , Issue.5 , pp. 798-804
    • Han, J.1    Fu, Y.2
  • 16
    • 0032645074 scopus 로고    scopus 로고
    • TCP/IP security threats and attack methods
    • Harris B., and Hunt R. TCP/IP security threats and attack methods. Computer Communications 22 10 (1999) 885-897
    • (1999) Computer Communications , vol.22 , Issue.10 , pp. 885-897
    • Harris, B.1    Hunt, R.2
  • 18
    • 61749087715 scopus 로고    scopus 로고
    • Jiawei Han, Micheline Kamber, Data Mining: Concepts and Techniques, Series Editor Morgan Kaufmann Publishers, The Morgan Kaufmann Series in Data Management Systems, Jim Gray, March 2006.
    • Jiawei Han, Micheline Kamber, Data Mining: Concepts and Techniques, Series Editor Morgan Kaufmann Publishers, The Morgan Kaufmann Series in Data Management Systems, Jim Gray, March 2006.
  • 19
    • 33847303101 scopus 로고    scopus 로고
    • T. Karagiannis, K. Papagiannaki, M. Faloutsos, Blinc: multilevel traffic classification in the dark, in: SIGCOMM, 2005, pp. 229-240.
    • T. Karagiannis, K. Papagiannaki, M. Faloutsos, Blinc: multilevel traffic classification in the dark, in: SIGCOMM, 2005, pp. 229-240.
  • 20
    • 8844231014 scopus 로고    scopus 로고
    • Mining multi-cross-level fuzzy weighted association rules
    • M. Kaya, R. Alhajj, Mining multi-cross-level fuzzy weighted association rules, in: IEEE Conference on Intellectual Systems, 2004, pp. 225-230.
    • (2004) IEEE Conference on Intellectual Systems , pp. 225-230
    • Kaya, M.1    Alhajj, R.2
  • 21
    • 84963538525 scopus 로고    scopus 로고
    • Experiments with data mining in enterprise management, Integrated Network Management, 1999, Distributed Management for the Networked Millennium
    • A. Knobbe, D. Van der Wallen, L. Lewis, Experiments with data mining in enterprise management, Integrated Network Management, 1999, Distributed Management for the Networked Millennium, in: Proceedings of the Sixth IFIP/IEEE International Symposium on, 1999, pp. 353-366.
    • (1999) Proceedings of the Sixth IFIP/IEEE International Symposium on , pp. 353-366
    • Knobbe, A.1    Van der Wallen, D.2    Lewis, L.3
  • 22
    • 34248368977 scopus 로고    scopus 로고
    • Minerals: using data mining to detect router misconfigurations
    • ACM Press, New York, NY, USA
    • Le F., Lee S., Wong T., Kim H.S., and Newcomb D. Minerals: using data mining to detect router misconfigurations. MineNet '06 (2006), ACM Press, New York, NY, USA 293-298
    • (2006) MineNet '06 , pp. 293-298
    • Le, F.1    Lee, S.2    Wong, T.3    Kim, H.S.4    Newcomb, D.5
  • 23
    • 22944475382 scopus 로고    scopus 로고
    • Inducing multi-level association rules from multiple relations
    • Lisi F., and Malerba D. Inducing multi-level association rules from multiple relations. Machine Learning 55 2 (2004) 175-210
    • (2004) Machine Learning , vol.55 , Issue.2 , pp. 175-210
    • Lisi, F.1    Malerba, D.2
  • 26
    • 33244467936 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • Moore A., and Zuev D. Internet traffic classification using bayesian analysis techniques. ACM SIGMETRICS Performance Evaluation Review 33 1 (2005) 50-60
    • (2005) ACM SIGMETRICS Performance Evaluation Review , vol.33 , Issue.1 , pp. 50-60
    • Moore, A.1    Zuev, D.2
  • 27
    • 14344265818 scopus 로고    scopus 로고
    • Internet traffic classification using bayesian analysis techniques
    • ACM Press, New York, NY, USA
    • Moore A.W., and Zuev D. Internet traffic classification using bayesian analysis techniques. SIGMETRICS '05 (2005), ACM Press, New York, NY, USA 50-60
    • (2005) SIGMETRICS '05 , pp. 50-60
    • Moore, A.W.1    Zuev, D.2
  • 29
    • 62849120844 scopus 로고    scopus 로고
    • A survey of techniques for internet traffic classification using machine learning
    • Nguyen T.T., and Armitage G. A survey of techniques for internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials 10 4 (2008) 56-76
    • (2008) IEEE Communications Surveys and Tutorials , vol.10 , Issue.4 , pp. 56-76
    • Nguyen, T.T.1    Armitage, G.2
  • 30
    • 34447280122 scopus 로고    scopus 로고
    • Network anomaly detection with incomplete audit data
    • Patcha A., and Park J.-M. Network anomaly detection with incomplete audit data. Computer Networks 51 13 (2007) 3935-3955
    • (2007) Computer Networks , vol.51 , Issue.13 , pp. 3935-3955
    • Patcha, A.1    Park, J.-M.2
  • 31
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: existing solutions and latest technological trends
    • Patcha A., and Park J.-M. An overview of anomaly detection techniques: existing solutions and latest technological trends. Computer Networks 51 12 (2007) 3448-3470
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 34
    • 33750512162 scopus 로고    scopus 로고
    • Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening
    • Tansel Ozyer R.A., and Barker K. Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. Journal of Network and Computer Applications 30 1 (2007) 99-113
    • (2007) Journal of Network and Computer Applications , vol.30 , Issue.1 , pp. 99-113
    • Tansel Ozyer, R.A.1    Barker, K.2
  • 36
    • 27544463917 scopus 로고    scopus 로고
    • A clustering algorithm for intrusion detection
    • Wang Q., and Megalooikonomu V. A clustering algorithm for intrusion detection. Proceedings of SPIE 5812 (2005) 31-38
    • (2005) Proceedings of SPIE , vol.5812 , pp. 31-38
    • Wang, Q.1    Megalooikonomu, V.2
  • 38
    • 33751393658 scopus 로고    scopus 로고
    • Automated traffic classification and application identification using machine learning
    • IEEE
    • Zander S., Nguyen T., and Armitage G. Automated traffic classification and application identification using machine learning. Conference on Local Computer Networks vol. 30 (2005), IEEE 250
    • (2005) Conference on Local Computer Networks , vol.30 , pp. 250
    • Zander, S.1    Nguyen, T.2    Armitage, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.