메뉴 건너뛰기




Volumn , Issue , 2008, Pages 445-449

Wavelet-based unwanted traffic time series analysis

Author keywords

[No Author keywords available]

Indexed keywords

DISCRETE WAVELET TRANSFORMS; ELECTRICAL ENGINEERING; SIGNAL PROCESSING; TIME SERIES; TIME SERIES ANALYSIS; TRANSMISSION CONTROL PROTOCOL;

EID: 62949245784     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCEE.2008.106     Document Type: Conference Paper
Times cited : (16)

References (30)
  • 8
    • 62949203848 scopus 로고    scopus 로고
    • M. Bailey, E. Cooke, F. Jahanian, and J. Nazario, The internet motion sensor - a distributed blackhole monitoring system, in NDSS, 2005.
    • M. Bailey, E. Cooke, F. Jahanian, and J. Nazario, "The internet motion sensor - a distributed blackhole monitoring system," in NDSS, 2005.
  • 10
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Comput. Netw., vol. 51, no. 12, pp. 3448-3470, 2007.
    • (2007) Comput. Netw , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 12
    • 4344659702 scopus 로고    scopus 로고
    • Anomaly detection methods in wired networks: A survey and taxonomy
    • Oct
    • J. M. Estevez-Tapiador, P. Garcia-Teodoro, and J. E. Diaz-Verdejo, "Anomaly detection methods in wired networks: a survey and taxonomy," Computer Communications, vol. 27, no. 16, pp. 1569-1584, Oct. 2004.
    • (2004) Computer Communications , vol.27 , Issue.16 , pp. 1569-1584
    • Estevez-Tapiador, J.M.1    Garcia-Teodoro, P.2    Diaz-Verdejo, J.E.3
  • 14
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through ewma for autocorrelated and uncorrelated data, Reliability
    • March
    • N. Ye, S. Vilbert, and Q. Chen, "Computer intrusion detection through ewma for autocorrelated and uncorrelated data," Reliability, IEEE Transactions on, vol. 52, no. 1, pp. 75-82, March 2003.
    • (2003) IEEE Transactions on , vol.52 , Issue.1 , pp. 75-82
    • Ye, N.1    Vilbert, S.2    Chen, Q.3
  • 15
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • June
    • S. S. Kim and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data," Networking, IEEE/ACM Transactions on, vol. 16, no. 3, pp. 562-575, June 2008.
    • (2008) Networking, IEEE/ACM Transactions on , vol.16 , Issue.3 , pp. 562-575
    • Kim, S.S.1    Reddy, A.L.N.2
  • 16
    • 33947507304 scopus 로고    scopus 로고
    • On scalable attack detection in the network
    • R. R. Kompella, S. Singh, and G. Varghese, "On scalable attack detection in the network," IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 14-25, 2007.
    • (2007) IEEE/ACM Trans. Netw , vol.15 , Issue.1 , pp. 14-25
    • Kompella, R.R.1    Singh, S.2    Varghese, G.3
  • 17
    • 33947171900 scopus 로고    scopus 로고
    • A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
    • Sept
    • A. Tartakovsky, B. Rozovskii, R. Blazek, and H. Kim, "A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods," Signal Processing, IEEE Transactions on, vol. 54, no. 9, pp. 3372-3382, Sept. 2006.
    • (2006) Signal Processing, IEEE Transactions on , vol.54 , Issue.9 , pp. 3372-3382
    • Tartakovsky, A.1    Rozovskii, B.2    Blazek, R.3    Kim, H.4
  • 19
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in ip networks
    • Aug
    • M. Thottan and C. Ji, "Anomaly detection in ip networks," Signal Processing, IEEE Transactions on, vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
    • (2003) Signal Processing, IEEE Transactions on , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 20
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," SIGCOMM Comput. Commun, Rev., vol. 34, no. 4, pp. 219-230, 2004.
    • (2004) SIGCOMM Comput. Commun, Rev , vol.34 , Issue.4 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 22
    • 33751110003 scopus 로고    scopus 로고
    • Wavelet based denial-of-service detection
    • Nov
    • G. Carl, R. R. Brooks, and S. Rai, "Wavelet based denial-of-service detection," Computers & Security, vol. 25, no. 8, pp. 600-615, Nov. 2006.
    • (2006) Computers & Security , vol.25 , Issue.8 , pp. 600-615
    • Carl, G.1    Brooks, R.R.2    Rai, S.3
  • 23
    • 35148840623 scopus 로고    scopus 로고
    • Detecting denial-of-service attacks using the wavelet transform
    • M. Hamdi and N. Boudriga, "Detecting denial-of-service attacks using the wavelet transform," Comput. Commun., vol. 30, no. 16, pp. 3203-3213, 2007.
    • (2007) Comput. Commun , vol.30 , Issue.16 , pp. 3203-3213
    • Hamdi, M.1    Boudriga, N.2
  • 24
    • 33847616076 scopus 로고    scopus 로고
    • Wavelet analysis method for detection of DDoS attack on the basis of self-similarity
    • March
    • R. Xunyi, W. Ruchuan, and W. Haiyan, "Wavelet analysis method for detection of DDoS attack on the basis of self-similarity," Frontiers of Electrical and Electronic Engineering in China, vol. 2, no. 1, pp. 73-77, March 2007.
    • (2007) Frontiers of Electrical and Electronic Engineering in China , vol.2 , Issue.1 , pp. 73-77
    • Xunyi, R.1    Ruchuan, W.2    Haiyan, W.3
  • 25
    • 49649105240 scopus 로고    scopus 로고
    • W. Lu, M. Tavallaee, and A. A. Ghorbani, Detecting network anomalies using different wavelet basis functions, cnsr, 0, pp. 149-156, 2008.
    • W. Lu, M. Tavallaee, and A. A. Ghorbani, "Detecting network anomalies using different wavelet basis functions," cnsr, vol. 0, pp. 149-156, 2008.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.