-
2
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Nov.
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, pp. 71-82, Nov. 2002.
-
(2002)
IMW
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
3
-
-
0024925404
-
Distance measures for signal processing and pattern recognition
-
M. Basseville. Distance measures for signal processing and pattern recognition. Signal Processing, 18:349-369, 1989.
-
(1989)
Signal Processing
, vol.18
, pp. 349-369
-
-
Basseville, M.1
-
4
-
-
46349103692
-
Détection d'attaques de dénis de service par un modèle non gaussien multirésolution
-
Nov.
-
Borgnat, P., et al. Détection d'attaques de dénis de service par un modèle non gaussien multirésolution. In CFIP-2006, pp. 303-314, Nov. 2006.
-
(2006)
CFIP-2006
, pp. 303-314
-
-
Borgnat, P.1
-
5
-
-
33749580207
-
Aberrant behavior detection in time series for network monitoring
-
Dec.
-
J. Brutlag. Aberrant behavior detection in time series for network monitoring. In USENIX System Administration Conference, Dec. 2000.
-
(2000)
USENIX System Administration Conference
-
-
Brutlag, J.1
-
6
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
C.-M. Cheng, H. Kung, and K.-S. Tan. Use of spectral analysis in defense against DoS attacks. In IEEE Globecom, volume 3, pp. 2031-2035, 2002.
-
(2002)
IEEE Globecom
, vol.3
, pp. 2031-2035
-
-
Cheng, C.-M.1
Kung, H.2
Tan, K.-S.3
-
7
-
-
7544246179
-
Traffic data repository at the WIDE project
-
June. mawi.wide.ad.jp/mawi
-
K. Cho, K. Mitsuya, and A. Kato. Traffic data repository at the WIDE project. In USENIX FREENIX Track, June 2000. mawi.wide.ad.jp/mawi
-
(2000)
USENIX FREENIX Track
-
-
Cho, K.1
Mitsuya, K.2
Kato, A.3
-
8
-
-
0003254064
-
A non-intrusive, wavelet-based approach to detecting network performance problems
-
Nov.
-
P. Huang, A. Feldmann, and W. Willinger. A non-intrusive, wavelet-based approach to detecting network performance problems. In IMW, pp. 213-227, Nov. 2001.
-
(2001)
IMW
, pp. 213-227
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
9
-
-
1242287724
-
A framework for classifying denial of service attacks
-
A. Hussain, J. Heidemann, and C. Papadopoulos. A framework for classifying denial of service attacks. In SIGCOMM, pp. 99-110, 2003.
-
(2003)
SIGCOMM
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
10
-
-
4143081502
-
A covariance analysis model for DDoS attack detection
-
June
-
S. Jin and D. Yeung. A covariance analysis model for DDoS attack detection. In ICC, volume 4, pp. 1882-1886, June 2004.
-
(2004)
ICC
, vol.4
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.2
-
11
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
May
-
J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In 11th WWW Conf., pp. 293-304, May 2002.
-
(2002)
11th WWW Conf.
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
12
-
-
33646742035
-
Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao. Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. Depend. Secur. Comput., 3(2):141-155, 2006.
-
(2006)
IEEE Trans. Depend. Secur. Comput.
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
13
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Oct.
-
B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen. Sketch-based change detection: Methods, evaluation, and applications. In IMC, pp. 234-247, Oct. 2003.
-
(2003)
IMC
, pp. 234-247
-
-
Krishnamurty, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
14
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Aug.
-
A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM, pp. 219-230, Aug. 2004.
-
(2004)
SIGCOMM
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
15
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
Oct.
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. In IMC, pp. 147-152, Oct. 2006.
-
(2006)
IMC
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
16
-
-
11144272176
-
A taxonomy of ddos attacks and defense mechanisms
-
Apr.
-
J. Mirkovic and P. Reiher. A taxonomy of ddos attacks and defense mechanisms. ACM Comp. Com. Rev., 34(2):39-53, Apr. 2004.
-
(2004)
ACM Comp. Com. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher., P.2
-
18
-
-
28444435635
-
Data streams: Algorithms and applications
-
Jan.
-
S. Muthukrishnan. Data streams: Algorithms and applications. In SODA, pp. 413, Jan. 2003.
-
(2003)
SODA
, pp. 413
-
-
Muthukrishnan, S.1
-
20
-
-
29244462508
-
Manifold learning visualization of network traffic data
-
Aug.
-
N. Patwari and A. Hero. Manifold learning visualization of network traffic data. In SIGCOMM MineNet, pp. 191-196, Aug. 2005.
-
(2005)
SIGCOMM MineNet
, pp. 191-196
-
-
Patwari, N.1
Hero, A.2
-
21
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies
-
DOI 10.1109/TDSC.2007.12
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry. Non gaussian and long memory statistical characterisations for internet traffic with anomalies. IEEE Trans. Depend. Secur. Comput., 4(1):56-70,. 2007. (Pubitemid 46384621)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
22
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
Oct.
-
A. Soule, K. Salamatian, and N. Taft. Combining filtering and statistical methods for anomaly detection. In IMC, pp. 331-344, Oct. 2005.
-
(2005)
IMC
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
23
-
-
1842435123
-
Tabulation based 4-universal hashing with applications to second moment estimation
-
Jan.
-
M. Thorup and Y. Zhang. Tabulation based 4-universal hashing with applications to second moment estimation. In SODA, pp. 615-624, Jan. 2004.
-
(2004)
SODA
, pp. 615-624
-
-
Thorup, M.1
Zhang, Y.2
-
24
-
-
84878704906
-
Network anomography
-
Oct.
-
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan. Network anomography. In IMC, pp. 317-330, Oct. 2005.
-
(2005)
IMC
, pp. 317-330
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
|