메뉴 건너뛰기




Volumn 23, Issue 1, 2009, Pages 22-28

Accurate anomaly detection through parallelism

Author keywords

Algorithm design and analysis; Classification algorithms; Detection algorithms; Layout; Monitoring; Prediction algorithms; Program processors

Indexed keywords

ALGORITHM DESIGN AND ANALYSIS; CLASSIFICATION ALGORITHMS; DETECTION ALGORITHMS; LAYOUT; PREDICTION ALGORITHMS;

EID: 65249105995     PISSN: 08908044     EISSN: None     Source Type: Journal    
DOI: 10.1109/MNET.2009.4804320     Document Type: Article
Times cited : (43)

References (16)
  • 1
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant Behavior Detection in Time Series for Network Monitoring
    • New Orleans, LA, Dec
    • J. D. Brutlag, "Aberrant Behavior Detection in Time Series for Network Monitoring," Proc. 74th Sys. Admin. Conf., New Orleans, LA, Dec. 2000, pp. 139-46.
    • (2000) Proc. 74th Sys. Admin. Conf , pp. 139-146
    • Brutlag, J.D.1
  • 2
    • 18144385431 scopus 로고    scopus 로고
    • Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks
    • Dallas, TX, Nov
    • V. A. Siris and F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks," Proc. IEEE GLOBECOM Dallas, TX, Nov. 2004, pp. 2050-54.
    • (2004) Proc. IEEE GLOBECOM , pp. 2050-2054
    • Siris, V.A.1    Papagalou, F.2
  • 3
    • 57849168781 scopus 로고    scopus 로고
    • Prediction and Adaptation in a Traffic-Aware Packet Filtering Method,
    • Master's thesis, EPFL, Lausanne, Switzerland, Mar
    • C. Schwarzer, "Prediction and Adaptation in a Traffic-Aware Packet Filtering Method," Master's thesis, EPFL, Lausanne, Switzerland, Mar. 2006.
    • (2006)
    • Schwarzer, C.1
  • 5
    • 14644397228 scopus 로고    scopus 로고
    • Change-Point Monitoring for the Detection of DoS Attacks
    • Oct
    • H. Wang, D. Xhang, and K. G. Shin, "Change-Point Monitoring for the Detection of DoS Attacks," IEEE Trans. Dependable Secure Comp., vol. 1, no. 4, Oct. 2004, pp. 193-208.
    • (2004) IEEE Trans. Dependable Secure Comp , vol.1 , Issue.4 , pp. 193-208
    • Wang, H.1    Xhang, D.2    Shin, K.G.3
  • 6
    • 0141427794 scopus 로고    scopus 로고
    • A Signal Analysis of Network Traffic Anomalies
    • Marseille, France, Nov
    • P. Barford et al., "A Signal Analysis of Network Traffic Anomalies," Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement, Marseille, France, Nov. 2002, pp. 71-82.
    • (2002) Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement , pp. 71-82
    • Barford, P.1
  • 9
    • 57849114377 scopus 로고    scopus 로고
    • Massively Parallel Anomaly Detection in Online Network Measurement
    • St. Thomas, U.S. Virgin Islands, Aug
    • S. Shanbhag and T. Wolf, "Massively Parallel Anomaly Detection in Online Network Measurement," Proc. 77th IEEE ICCCN, St. Thomas, U.S. Virgin Islands, Aug. 2008.
    • (2008) Proc. 77th IEEE ICCCN
    • Shanbhag, S.1    Wolf, T.2
  • 10
    • 67249166209 scopus 로고    scopus 로고
    • Evaluation of an Online Parallel Anomaly Detection System
    • New Orleans, LA, Dec
    • S. Shanbhag and T. Wolf, "Evaluation of an Online Parallel Anomaly Detection System," Proc. IEEE GLOBECOM, New Orleans, LA, Dec. 2008.
    • (2008) Proc. IEEE GLOBECOM
    • Shanbhag, S.1    Wolf, T.2
  • 11
    • 50649100899 scopus 로고    scopus 로고
    • Challenges and Applications for Network-Processor-Based Programmable Routers
    • Princeton, NJ, Mar
    • T. Wolf, "Challenges and Applications for Network-Processor-Based Programmable Routers," Proc. IEEE Sarnoff Symp., Princeton, NJ, Mar. 2006.
    • (2006) Proc. IEEE Sarnoff Symp
    • Wolf, T.1
  • 12
    • 47649122510 scopus 로고    scopus 로고
    • A Characterization of High-Performance Network Monitoring Systems and Workloads
    • Brooklyn, NY, May
    • S. Bunga and T. Wolf, "A Characterization of High-Performance Network Monitoring Systems and Workloads," Proc. IEEE Wksp. High Perf. Switching and Routing, Brooklyn, NY, May 2007.
    • (2007) Proc. IEEE Wksp. High Perf. Switching and Routing
    • Bunga, S.1    Wolf, T.2
  • 13
    • 40649113159 scopus 로고    scopus 로고
    • Data Fusion for Outlier Detection Through Pseudo-ROC Curves an Rank Distributions
    • Vancouver, BC, July
    • P. F. Evangelista, M. J. Embrechts, and B. K. Szymanski, "Data Fusion for Outlier Detection Through Pseudo-ROC Curves an Rank Distributions," Proc. Int'l. Joint Conf. Neural Net., Vancouver, BC, July 2006, pp. 2166-73.
    • (2006) Proc. Int'l. Joint Conf. Neural Net , pp. 2166-2173
    • Evangelista, P.F.1    Embrechts, M.J.2    Szymanski, B.K.3
  • 14
    • 1242287724 scopus 로고    scopus 로고
    • A Framework for Classifying Denial of Service Attacks
    • Karlsruhe, Germany, Aug
    • A. Hussain, J. Heidemann, and C. Papadopoulos, "A Framework for Classifying Denial of Service Attacks," Proc. SIGCOMM '03, Karlsruhe, Germany, Aug. 2003, pp. 99-110.
    • (2003) Proc. SIGCOMM '03 , pp. 99-110
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 15
    • 0141762461 scopus 로고    scopus 로고
    • Code-Red: A Case Study on the Spread and Victims of an Internet Worm
    • Marseille, France, Nov
    • D. Moore, C. Shannon, and J. Brown, 'Code-Red: A Case Study on the Spread and Victims of an Internet Worm," Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement, Marseille, France, Nov. 2002, pp. 273-84.
    • (2002) Proc. 2nd ACM SIGCOMM Wksp. Internet Measurement , pp. 273-284
    • Moore, D.1    Shannon, C.2    Brown, J.3
  • 16
    • 84962260018 scopus 로고    scopus 로고
    • Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation
    • Hilton Head, SC, Jan
    • R. P. Lippmarm et al., "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. DARPA Info. Suryivability Conf. Expo., Hilton Head, SC, vol. 2, Jan. 2000, pp. 12-26.
    • (2000) Proc. DARPA Info. Suryivability Conf. Expo , vol.2 , pp. 12-26
    • Lippmarm, R.P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.