메뉴 건너뛰기




Volumn , Issue , 2007, Pages 145-152

Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures

Author keywords

Anomaly Detection; Gamma multiresolution modeling; MAWI database; Sketch; Traffic measurement

Indexed keywords

AGGREGATION LEVEL; ANOMALY DETECTION; CHARACTERIZATION PROCEDURES; IP ADDRESSS; KEY FEATURE; LONG LASTING; LOW-INTENSITY; MULTI-RESOLUTION MODELING; MULTI-RESOLUTIONS; NON-GAUSSIAN; NON-GAUSSIAN MARGINAL DISTRIBUTION; PRIOR KNOWLEDGE; RANDOM PROJECTIONS; REAL-TIME IDENTIFICATION; STATISTICAL DETECTION; TRAFFIC BEHAVIOR; TRAFFIC MEASUREMENTS;

EID: 62949129764     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1352664.1352674     Document Type: Conference Paper
Times cited : (100)

References (24)
  • 2
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • Nov.
    • P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. In IMW, pp. 71-82, Nov. 2002.
    • (2002) IMW , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 3
    • 0024925404 scopus 로고
    • Distance measures for signal processing and pattern recognition
    • M. Basseville. Distance measures for signal processing and pattern recognition. Signal Processing, 18:349-369, 1989.
    • (1989) Signal Processing , vol.18 , pp. 349-369
    • Basseville, M.1
  • 4
    • 46349103692 scopus 로고    scopus 로고
    • Détection d'attaques de dénis de service par un modèle non gaussien multirésolution
    • Nov.
    • Borgnat, P., et al. Détection d'attaques de dénis de service par un modèle non gaussien multirésolution. In CFIP-2006, pp. 303-314, Nov. 2006.
    • (2006) CFIP-2006 , pp. 303-314
    • Borgnat, P.1
  • 5
    • 33749580207 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • Dec.
    • J. Brutlag. Aberrant behavior detection in time series for network monitoring. In USENIX System Administration Conference, Dec. 2000.
    • (2000) USENIX System Administration Conference
    • Brutlag, J.1
  • 6
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • C.-M. Cheng, H. Kung, and K.-S. Tan. Use of spectral analysis in defense against DoS attacks. In IEEE Globecom, volume 3, pp. 2031-2035, 2002.
    • (2002) IEEE Globecom , vol.3 , pp. 2031-2035
    • Cheng, C.-M.1    Kung, H.2    Tan, K.-S.3
  • 7
    • 7544246179 scopus 로고    scopus 로고
    • Traffic data repository at the WIDE project
    • June. mawi.wide.ad.jp/mawi
    • K. Cho, K. Mitsuya, and A. Kato. Traffic data repository at the WIDE project. In USENIX FREENIX Track, June 2000. mawi.wide.ad.jp/mawi
    • (2000) USENIX FREENIX Track
    • Cho, K.1    Mitsuya, K.2    Kato, A.3
  • 8
    • 0003254064 scopus 로고    scopus 로고
    • A non-intrusive, wavelet-based approach to detecting network performance problems
    • Nov.
    • P. Huang, A. Feldmann, and W. Willinger. A non-intrusive, wavelet-based approach to detecting network performance problems. In IMW, pp. 213-227, Nov. 2001.
    • (2001) IMW , pp. 213-227
    • Huang, P.1    Feldmann, A.2    Willinger, W.3
  • 9
    • 1242287724 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • A. Hussain, J. Heidemann, and C. Papadopoulos. A framework for classifying denial of service attacks. In SIGCOMM, pp. 99-110, 2003.
    • (2003) SIGCOMM , pp. 99-110
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 10
    • 4143081502 scopus 로고    scopus 로고
    • A covariance analysis model for DDoS attack detection
    • June
    • S. Jin and D. Yeung. A covariance analysis model for DDoS attack detection. In ICC, volume 4, pp. 1882-1886, June 2004.
    • (2004) ICC , vol.4 , pp. 1882-1886
    • Jin, S.1    Yeung, D.2
  • 11
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
    • May
    • J. Jung, B. Krishnamurthy, and M. Rabinovich. Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites. In 11th WWW Conf., pp. 293-304, May 2002.
    • (2002) 11th WWW Conf. , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 12
    • 33646742035 scopus 로고    scopus 로고
    • Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao. Packetscore: A statistics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. Depend. Secur. Comput., 3(2):141-155, 2006.
    • (2006) IEEE Trans. Depend. Secur. Comput. , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 13
    • 14944367082 scopus 로고    scopus 로고
    • Sketch-based change detection: Methods, evaluation, and applications
    • Oct.
    • B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen. Sketch-based change detection: Methods, evaluation, and applications. In IMC, pp. 234-247, Oct. 2003.
    • (2003) IMC , pp. 234-247
    • Krishnamurty, B.1    Sen, S.2    Zhang, Y.3    Chen, Y.4
  • 14
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • Aug.
    • A. Lakhina, M. Crovella, and C. Diot. Diagnosing network-wide traffic anomalies. In SIGCOMM, pp. 219-230, Aug. 2004.
    • (2004) SIGCOMM , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 15
    • 34547487270 scopus 로고    scopus 로고
    • Detection and identification of network anomalies using sketch subspaces
    • Oct.
    • X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. In IMC, pp. 147-152, Oct. 2006.
    • (2006) IMC , pp. 147-152
    • Li, X.1    Bian, F.2    Crovella, M.3    Diot, C.4    Govindan, R.5    Iannaccone, G.6    Lakhina, A.7
  • 16
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attacks and defense mechanisms
    • Apr.
    • J. Mirkovic and P. Reiher. A taxonomy of ddos attacks and defense mechanisms. ACM Comp. Com. Rev., 34(2):39-53, Apr. 2004.
    • (2004) ACM Comp. Com. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher., P.2
  • 18
    • 28444435635 scopus 로고    scopus 로고
    • Data streams: Algorithms and applications
    • Jan.
    • S. Muthukrishnan. Data streams: Algorithms and applications. In SODA, pp. 413, Jan. 2003.
    • (2003) SODA , pp. 413
    • Muthukrishnan, S.1
  • 20
    • 29244462508 scopus 로고    scopus 로고
    • Manifold learning visualization of network traffic data
    • Aug.
    • N. Patwari and A. Hero. Manifold learning visualization of network traffic data. In SIGCOMM MineNet, pp. 191-196, Aug. 2005.
    • (2005) SIGCOMM MineNet , pp. 191-196
    • Patwari, N.1    Hero, A.2
  • 22
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • Oct.
    • A. Soule, K. Salamatian, and N. Taft. Combining filtering and statistical methods for anomaly detection. In IMC, pp. 331-344, Oct. 2005.
    • (2005) IMC , pp. 331-344
    • Soule, A.1    Salamatian, K.2    Taft, N.3
  • 23
    • 1842435123 scopus 로고    scopus 로고
    • Tabulation based 4-universal hashing with applications to second moment estimation
    • Jan.
    • M. Thorup and Y. Zhang. Tabulation based 4-universal hashing with applications to second moment estimation. In SODA, pp. 615-624, Jan. 2004.
    • (2004) SODA , pp. 615-624
    • Thorup, M.1    Zhang, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.