-
1
-
-
57849087571
-
An architecture for distributed real-time passive network measurement
-
Monterey, CA, Sep
-
T. Wolf, R. Ramaswamy, S. Bunga, and N. Yang, "An architecture for distributed real-time passive network measurement," in Proc. of 14th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), Monterey, CA, Sep. 2006, pp. 335-344.
-
(2006)
Proc. of 14th Annual Meeting of the IEEE/ACM International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS)
, pp. 335-344
-
-
Wolf, T.1
Ramaswamy, R.2
Bunga, S.3
Yang, N.4
-
2
-
-
85082364656
-
Design, deployment, and use of the DETER testbed
-
Boston, MA
-
T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab, "Design, deployment, and use of the DETER testbed," in DETER: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, MA, 2007.
-
(2007)
DETER: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
-
-
Benzel, T.1
Braden, R.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
3
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
New Orleans, LA, Dec
-
J. D. Brutlag, "Aberrant behavior detection in time series for network monitoring," in Proc. ofthe 14th Systems Administration Conference, New Orleans, LA, Dec. 2000, pp. 139-146.
-
(2000)
Proc. ofthe 14th Systems Administration Conference
, pp. 139-146
-
-
Brutlag, J.D.1
-
4
-
-
14944367267
-
Characterization of network- wide anomalies in traffic flows
-
Taormina, Italy, Oct
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of network- wide anomalies in traffic flows," in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Italy, Oct. 2004, pp. 201-206.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
5
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Dallas, TX, Nov
-
V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting SYN flooding attacks," in Proc. of IEEE Global Communications Conference (GLOBECOM), Dallas, TX, Nov. 2004, pp. 2050-2054.
-
(2004)
Proc. of IEEE Global Communications Conference (GLOBECOM)
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
6
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseille, France, Nov
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW), Marseille, France, Nov. 2002, pp. 71-82.
-
(2002)
Proc. of the 2nd ACM SIGCOMM Workshop on Internet Measurement (IMW)
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
7
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA, Oct
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," in Proc. of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05), Berkeley, CA, Oct. 2005.
-
(2005)
Proc. of the 5th ACM SIGCOMM Conference on Internet Measurement (IMC '05)
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
8
-
-
0035271352
-
An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems
-
Mar
-
N. Ye and Q. Chen, "An anomaly detection technique based on a chi-square statistic for detecting intrusions into information systems," Quality and Reliability Engineering International, vol. 17, no. 2, pp. 105-112, Mar. 2001.
-
(2001)
Quality and Reliability Engineering International
, vol.17
, Issue.2
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
9
-
-
67249113326
-
-
A. Lazarevic, L. Ertiz,V.Kumar,A.Ozgur,and J.Srivastava,A comparative study of anomaly detection schemes in network intrusion detection, in Proc. of the Third SIAM International Conference on Data Mining, San Francisco, CA, May 2003.
-
A. Lazarevic, L. Ert(iz,V.Kumar,A.Ozgur,and J.Srivastava,"A comparative study of anomaly detection schemes in network intrusion detection," in Proc. of the Third SIAM International Conference on Data Mining, San Francisco, CA, May 2003.
-
-
-
-
10
-
-
57849168781
-
Prediction and adaptation in a traffic-aware packet filtering method,
-
Master's thesis, Ecole Polytechnique Federale de Lausanne EPFL, Lausanne, Switzerland, Mar
-
C. Schwarzer, "Prediction and adaptation in a traffic-aware packet filtering method," Master's thesis, Ecole Polytechnique Federale de Lausanne (EPFL), Lausanne, Switzerland, Mar. 2006.
-
(2006)
-
-
Schwarzer, C.1
-
11
-
-
51749125078
-
A statistical approach to anomaly detection in interdomain routing
-
San Jose, CA, Oct
-
S. Deshpande, M. Thottan, T. K. Ho, and B. Sikdar, "A statistical approach to anomaly detection in interdomain routing," in Proc. of Third International Conferenc on Broadband Communications, Networks, and Systems (BROADNETS), San Jose, CA, Oct. 2006.
-
(2006)
Proc. of Third International Conferenc on Broadband Communications, Networks, and Systems (BROADNETS)
-
-
Deshpande, S.1
Thottan, M.2
Ho, T.K.3
Sikdar, B.4
-
12
-
-
14644397228
-
Change-point monitoring for the detection of dos attacks
-
Oct
-
H. Wang, D. Xhang, and K. G. Shin, "Change-point monitoring for the detection of dos attacks," IEEE Transactions on Dependable Secure Computing, vol. 1, no. 4, pp. 193-208, Oct. 2004.
-
(2004)
IEEE Transactions on Dependable Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Xhang, D.2
Shin, K.G.3
-
13
-
-
67249165196
-
-
University of Massachusetts, Amherst, MA, Tech. Rep. TR-08-CSE-08, Mar
-
T. Wolf and S. Shanbhag, "Massively parallel anomaly detection system," University of Massachusetts, Amherst, MA, Tech. Rep. TR-08-CSE-08, Mar. 2008.
-
(2008)
Massively parallel anomaly detection system
-
-
Wolf, T.1
Shanbhag, S.2
-
14
-
-
40649113159
-
Data fusion for outlier detection through pseudo-ROC curves and rank distributions
-
Vancouver, BC, Jul
-
P. F. Evangelista, M. J. Embrechts, and B. K. Szymanski, "Data fusion for outlier detection through pseudo-ROC curves and rank distributions," in Proc. of International Joint Conference on Neural Networks (IJCNN), Vancouver, BC, Jul. 2006, pp. 2166-2173.
-
(2006)
Proc. of International Joint Conference on Neural Networks (IJCNN)
, pp. 2166-2173
-
-
Evangelista, P.F.1
Embrechts, M.J.2
Szymanski, B.K.3
-
15
-
-
85050993301
-
SEER: A security experimentation environment for DETER
-
Boston, MA
-
S. Schwab, B. Wilson, C. Ko, and A. Hussain, "SEER: a security experimentation environment for DETER," in DETER: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007, Boston, MA, 2007.
-
(2007)
DETER: Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
-
-
Schwab, S.1
Wilson, B.2
Ko, C.3
Hussain, A.4
-
16
-
-
37849002360
-
Towards user-centric metrics for denial-of- service measurement
-
San Diego, CA, Jun
-
J. Mirkovic, A. Hussain, B. Wilson, S. Fahmy, P. Reiher, R. Thomas, W.-M. Yao, and S. Schwab, "Towards user-centric metrics for denial-of- service measurement," in ExpCS '07: Proceedings ofthe 2007 Workshop on Experimental Computer Science, San Diego, CA, Jun. 2007.
-
(2007)
ExpCS '07: Proceedings ofthe 2007 Workshop on Experimental Computer Science
-
-
Mirkovic, J.1
Hussain, A.2
Wilson, B.3
Fahmy, S.4
Reiher, P.5
Thomas, R.6
Yao, W.-M.7
Schwab, S.8
-
17
-
-
33646023117
-
An introduction to ROC analysis
-
Jun
-
T. Fawcett, "An introduction to ROC analysis," Pattern Recognition Letters, vol. 27, no. 8, pp. 861-874, Jun. 2006.
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
18
-
-
50949130514
-
Wavelet-based detection of dos attacks
-
San Francisco, CA, Nov
-
A. Dainotti, A. Pescape, and G. Ventre, "Wavelet-based detection of dos attacks," in Proc. of IEEE Global Communications Conference (GLOBECOM), San Francisco, CA, Nov. 2006.
-
(2006)
Proc. of IEEE Global Communications Conference (GLOBECOM)
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
|