-
2
-
-
85084164413
-
BRO: A system for detecting network intruders in real-time
-
San Antonio, TX
-
V. Paxson, "BRO: A system for detecting network intruders in real-time," in Proc. 7th USENIX Security Symp., San Antonio, TX, 1998.
-
(1998)
Proc. 7th USENIX Security Symp
-
-
Paxson, V.1
-
4
-
-
24144497584
-
Building a better Net-Flow
-
Portland, OR
-
C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a better Net-Flow," in Proc. ACM SIGCOMM'04, Portland, OR, 2004.
-
(2004)
Proc. ACM SIGCOMM'04
-
-
Estan, C.1
Keys, K.2
Moore, D.3
Varghese, G.4
-
5
-
-
2942565524
-
-
IPFIX Flow Aggregation, Online, Available
-
IPFIX Flow Aggregation. Internet Draft [Online]. Available: http:// tools.ietf.org/html/draft-dressler-ipfix-aggregation-05.
-
Internet Draft
-
-
-
6
-
-
0141440878
-
New directions in traffic measurement and accounting
-
Pittsburgh, PA
-
C. Estan and G. Varghese, "New directions in traffic measurement and accounting," in Proc. ACM SIGCOMM'02, Pittsburgh, PA, 2002.
-
(2002)
Proc. ACM SIGCOMM'02
-
-
Estan, C.1
Varghese, G.2
-
7
-
-
1242330581
-
Adaptive random sampling for load change detection
-
Marina Del Rey, CA
-
B.-Y. Choi, J. Park, and Z.-L. Zhang, "Adaptive random sampling for load change detection," in Proc. ACM SIGMETRICS'02 (Extended Abstract), Marina Del Rey, CA, 2002.
-
(2002)
Proc. ACM SIGMETRICS'02 (Extended Abstract)
-
-
Choi, B.-Y.1
Park, J.2
Zhang, Z.-L.3
-
8
-
-
8344290018
-
Estimating flow distributions from sampled flowstatistics
-
Karlsruhe, Germany
-
N. Duffield, C. Lund, and M. Thorup, "Estimating flow distributions from sampled flowstatistics," in Proc. ACMSIGCOMM '03, Karlsruhe, Germany, 2003.
-
(2003)
Proc. ACMSIGCOMM '03
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
10
-
-
84870637005
-
Flowscan: A network traffic flow reporting and visualization tool
-
New Orleans, LA
-
D. Plonka, "Flowscan: A network traffic flow reporting and visualization tool," in Proc. USENIX Systems Administration Conf. (LISA), New Orleans, LA, 2000.
-
(2000)
Proc. USENIX Systems Administration Conf. (LISA)
-
-
Plonka, D.1
-
11
-
-
80052178028
-
Coralreef software suite as a tool for system and network administrators
-
San Diego, CA
-
D. Moore, K. Keys, R. Koga, E. Lagache, and K. C. Claffy, "Coralreef software suite as a tool for system and network administrators," in Proc. USENIX Systems Administration Conf. (LISA), San Diego, CA, 2001.
-
(2001)
Proc. USENIX Systems Administration Conf. (LISA)
-
-
Moore, D.1
Keys, K.2
Koga, R.3
Lagache, E.4
Claffy, K.C.5
-
12
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Karlsruhe, Germany
-
C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proc. ACM SIGCOMM'03 Karlsruhe, Germany, 2003.
-
(2003)
Proc. ACM SIGCOMM'03
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
13
-
-
35448978150
-
A robust system for accurate real-time summaries of internet traffic
-
Banff, Alberta, Canada
-
K. Keys, D. Moore, and C. Estan, "A robust system for accurate real-time summaries of internet traffic," in Proc. ACM SIGMETRICS'05 Banff, Alberta, Canada, 2005.
-
(2005)
Proc. ACM SIGMETRICS'05
-
-
Keys, K.1
Moore, D.2
Estan, C.3
-
14
-
-
8344277151
-
An information-theoretic approach to traffic matrix estimation
-
Karlsruhe, Germany
-
Y. Zhang, M. Roughan, C. Lund, and D. Donoho, "An information-theoretic approach to traffic matrix estimation," in Proc. ACM SIGCOMM'03, Karlsruhe, Germany, 2003.
-
(2003)
Proc. ACM SIGCOMM'03
-
-
Zhang, Y.1
Roughan, M.2
Lund, C.3
Donoho, D.4
-
15
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Oakland, CA
-
W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2001.
-
(2001)
Proc. IEEE Symp. Security and Privacy
-
-
Lee, W.1
Xiang, D.2
-
16
-
-
33645792808
-
Profiling internet backbone traffic: Behavior models and applications
-
Philadelphia, PA
-
K. Xu, Z. L. Zhang, and S. Bhattacharyya, "Profiling internet backbone traffic: Behavior models and applications," in Proc. ACM SIGCOMM'05 Philadelphia, PA, 2005.
-
(2005)
Proc. ACM SIGCOMM'05
-
-
Xu, K.1
Zhang, Z.L.2
Bhattacharyya, S.3
-
17
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," in Proc. ACM Internet Measurement Conf. (IMC'05), Berkeley, CA, 2005.
-
(2005)
Proc. ACM Internet Measurement Conf. (IMC'05)
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
18
-
-
84878715338
-
An information-theoretic approach to network monitoring and measurement
-
Berkeley, CA
-
Y. Liu, D. Towsley, and T. Ye, "An information-theoretic approach to network monitoring and measurement," in Proc. ACM Internet Measurement Conf. (IMC'05), Berkeley, CA, 2005.
-
(2005)
Proc. ACM Internet Measurement Conf. (IMC'05)
-
-
Liu, Y.1
Towsley, D.2
Ye, T.3
-
19
-
-
67650177162
-
-
CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks. CERT Coordination Center. [Online]. Available: http://www.cert.org/advisories/ CA-1998-01.html
-
CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks. CERT Coordination Center. [Online]. Available: http://www.cert.org/advisories/ CA-1998-01.html
-
-
-
-
20
-
-
67650111779
-
-
CERT Advisory CA-2003-04 MS-SQL Server Worm. CERT Coordination Center. [Online].Available: http://www.cert.org/advisories/CA-2003-04.html
-
CERT Advisory CA-2003-04 MS-SQL Server Worm. CERT Coordination Center. [Online].Available: http://www.cert.org/advisories/CA-2003-04.html
-
-
-
-
21
-
-
67650167842
-
-
CERT Advisory CA-2003-20 W32/Blaster Worm. CERT Coordination Center. [Online]. Available: http://www.cert.org/advisories/CA-2003-20.html
-
CERT Advisory CA-2003-20 W32/Blaster Worm. CERT Coordination Center. [Online]. Available: http://www.cert.org/advisories/CA-2003-20.html
-
-
-
-
22
-
-
67650140852
-
-
CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. CERT Coordination Center. [Online]. Available: http://www.cert.org/advisories/ CA-1996-21.html
-
CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks. CERT Coordination Center. [Online]. Available: http://www.cert.org/advisories/ CA-1996-21.html
-
-
-
-
23
-
-
1542330197
-
Charging from sampled network usage
-
San Francisco, CA
-
N. Duffield, C. Lund, and M. Thorup, "Charging from sampled network usage," in Proc. ACM SIGCOMM Internet Measurement Workshop, San Francisco, CA, 2001.
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
24
-
-
67650108728
-
-
Available
-
[Online]. Available: http://sourceforge.net/projects/fprobe
-
-
-
-
25
-
-
34250746319
-
Adaptive flow aggregation - a new solution for robust flow monitoring under security attacks
-
Vancouver, Canada
-
Y. Hu, D. M. Chiu, and J. Lui, "Adaptive flow aggregation - a new solution for robust flow monitoring under security attacks," in Proc. IEEE/IFIP Network Operations and Management Symp. (NOMS), Vancouver, Canada, 2006.
-
(2006)
Proc. IEEE/IFIP Network Operations and Management Symp. (NOMS)
-
-
Hu, Y.1
Chiu, D.M.2
Lui, J.3
-
27
-
-
19544394713
-
Bitmap algorithms for counting active flows on high speed links
-
Miami, FL
-
C. Estan, G. Varghese, and M. Fisk, "Bitmap algorithms for counting active flows on high speed links," in Proc. ACM Internet Measurement Conf. (IMC'03), Miami, FL, 2003.
-
(2003)
Proc. ACM Internet Measurement Conf. (IMC'03)
-
-
Estan, C.1
Varghese, G.2
Fisk, M.3
|