-
1
-
-
63049091135
-
-
Snort. http://www.snort.org.
-
Snort
-
-
-
2
-
-
63049131472
-
-
Argus. http://qosient.com/argus/.
-
Argus
-
-
-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Barford, P., Kline, J., Plonka, D., and Ron, A. A signal analysis of network traffic anomalies. In Proc. of IMW (2002).
-
(2002)
Proc. of IMW
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
34547464544
-
Impact of traffic sampling on anomaly detection metrics
-
Brauckhoff, D., Tellenbach, B., Wagner, A., Lakhina, A., and May, M. Impact of traffic sampling on anomaly detection metrics. In Proc. of ACM/USENIX IMC (2006).
-
(2006)
Proc. of ACM/USENIX IMC
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
Lakhina, A.4
May, M.5
-
5
-
-
84942256107
-
Statistical Approaches to DDoS Attack Detection and Response
-
Feinstein, L., Schnackenberg, D., Balupari, R., and Kindred, D. Statistical Approaches to DDoS Attack Detection and Response. In Proc. of DARPA Information Survivability Conference and Exposition (2003).
-
(2003)
Proc. of DARPA Information Survivability Conference and Exposition
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
6
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
Jung, J., Paxson, V., Berger, A. W., and Balakrishnan, H. Fast Portscan Detection Using Sequential Hypothesis Testing. In Proc. of the IEEE Symposium on Security and Privacy (2004).
-
(2004)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
7
-
-
79251558204
-
Detecting malicious network traffic using inverse distributions of packet contents
-
Karamcheti, V., Geiger, D., Kedem, Z., and Muthukrishnan, S. Detecting malicious network traffic using inverse distributions of packet contents. In Proc. of ACM SIGCOMM MineNet (2005).
-
(2005)
Proc. of ACM SIGCOMM MineNet
-
-
Karamcheti, V.1
Geiger, D.2
Kedem, Z.3
Muthukrishnan, S.4
-
8
-
-
63049104178
-
-
Kazaa. www.kazaa.com.
-
-
-
-
9
-
-
17644366974
-
Data streaming algorithms for efficient and accurate estimation of flow distribution
-
Kumar, A., Sung, M., Xu, J., and Wang, J. Data streaming algorithms for efficient and accurate estimation of flow distribution. In Proc. of ACM SIGMETRICS (2004).
-
(2004)
Proc. of ACM SIGMETRICS
-
-
Kumar, A.1
Sung, M.2
Xu, J.3
Wang, J.4
-
11
-
-
34748907928
-
Data streaming algorithms for estimating entropy of network traffic
-
Lall, A., Sekar, V., Xu, J., Ogihara, M., and Zhang, H. Data streaming algorithms for estimating entropy of network traffic. In Proc. of ACM SIGMETRICS (2006).
-
(2006)
Proc. of ACM SIGMETRICS
-
-
Lall, A.1
Sekar, V.2
Xu, J.3
Ogihara, M.4
Zhang, H.5
-
13
-
-
85014886244
-
Blaster revisited
-
June
-
Morrison, J. Blaster revisited. ACM Queue vol. 2 no. 4, June 2004.
-
(2004)
ACM Queue
, vol.2
, Issue.4
-
-
Morrison, J.1
-
14
-
-
84871993728
-
-
Cisco Netflow. http://www.cisco.com/warp/public/732/Tech/nmp/netflow/ index.shtml.
-
Cisco Netflow
-
-
-
15
-
-
63049114420
-
An Empirical Evaluation of Entropy-Based Traffic Anomaly Detection
-
Tech. Rep. CMU-CS-08-145, Computer Science Department, Carnegie Mellon University
-
Nychis, G., Sekar, V., Andersen, D. G., Kim, H., and Zhang, H. An Empirical Evaluation of Entropy-Based Traffic Anomaly Detection. Tech. Rep. CMU-CS-08-145, Computer Science Department, Carnegie Mellon University, 2008.
-
(2008)
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
16
-
-
63049101010
-
-
Phaal, P., Panchen, S., and Mckee, N. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176, 2001.
-
Phaal, P., Panchen, S., and Mckee, N. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176, 2001.
-
-
-
-
18
-
-
33846200876
-
Entropy Based Worm and Anomaly Detection in Fast IP Networks
-
Wagner, A., and Plattner, B. Entropy Based Worm and Anomaly Detection in Fast IP Networks. In Proc. IEEE WET ICE (2005).
-
(2005)
Proc. IEEE WET ICE
-
-
Wagner, A.1
Plattner, B.2
-
19
-
-
24344436696
-
Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and New Cryptography-based Scheme
-
Xu, J., Fan, J., Ammar, M. H., and Moon, S. B. Prefix-preserving IP Address Anonymization: Measurement-based Security Evaluation and New Cryptography-based Scheme. In Proc. of IEEE ICNP (2002).
-
(2002)
Proc. of IEEE ICNP
-
-
Xu, J.1
Fan, J.2
Ammar, M.H.3
Moon, S.B.4
-
20
-
-
33645792808
-
Profiling internet backbone traffic: Behavior models and applications
-
Xu, K., Zhang, Z., and Bhattacharyya, S. Profiling internet backbone traffic: Behavior models and applications. In Proc. of ACM SIGCOMM (2005).
-
(2005)
Proc. of ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
|