메뉴 건너뛰기




Volumn 5430 LNCS, Issue , 2009, Pages 23-40

Behavioural characterization for network anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

CORPORATE NETWORKS; EXPERIMENTAL TEST; NETFLOW; NETWORK ANOMALY DETECTION; NETWORK EDGES; SUBNETS; WORM ATTACK;

EID: 67650289599     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-01004-0_2     Document Type: Conference Paper
Times cited : (2)

References (27)
  • 5
    • 49949117328 scopus 로고    scopus 로고
    • Flow-level anomaly detection - blessing or curse
    • Student Workshop, Anchorage, Alaska, USA, May
    • Brauckhoff, D., May, M., Plattner, B.: Flow-level anomaly detection - blessing or curse? In: IEEE INFOCOM 2007, Student Workshop, Anchorage, Alaska, USA (May 2007)
    • (2007) IEEE INFOCOM 2007
    • Brauckhoff, D.1    May, M.2    Plattner, B.3
  • 6
    • 85084160250 scopus 로고    scopus 로고
    • Flame: A flow-level anomaly modeling engine
    • Usenix, San Jose, CA, USA July
    • Brauckhoff, D., Wagner, A., May, M.: Flame: A flow-level anomaly modeling engine. In: Proceedings of CSET 2008 workshop, Usenix, San Jose, CA, USA (July 2008)
    • (2008) Proceedings of CSET workshop
    • Brauckhoff, D.1    Wagner, A.2    May, M.3
  • 8
    • 26444461439 scopus 로고    scopus 로고
    • Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone. In: Julisch, K., Krügel, C. (eds.)
    • Springer, Heidelberg. LNCS, Julisch, K., Kr̈ugel, C. (eds.)
    • Düubendorfer, T., Wagner, A., Hossmann, T., Plattner, B.: Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol.3548, pp. 103-122. Springer, Heidelberg (2005)
    • (2005) DIMVA 2005 , vol.3548 , pp. 103-122
    • Düubendorfer, T.1    Wagner, A.2    Hossmann, T.3    Plattner, B.4
  • 10
    • 34248358287 scopus 로고    scopus 로고
    • Traffic classification using clustering algorithms
    • DOI 10.1145/1162678.1162679, Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06
    • Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: MineNet 2006: Proceedings of the 2006 SIGCOMM workshop on Mining network data, pp. 281-286. ACM, New York (2006) (Pubitemid 46740690)
    • (2006) Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06 , vol.2006 , pp. 281-286
    • Erman, J.1    Arlitt, M.2    Mahanti, A.3
  • 13
    • 57049173886 scopus 로고    scopus 로고
    • Fast traffic classification in high speed networks
    • Ma, Y., Choi, D., Ata, S. (eds.) LNCS. Springer, Heidelberg
    • Gu, R., Hong,M.,Wang, H., Ji, Y.: Fast traffic classification in high speed networks. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol.5297, pp. 429-432. Springer, Heidelberg (2008)
    • (2008) APNOMS 2008 , vol.5297 , pp. 429-432
    • Gu, R.1    Hong, M.2    Wang, H.3    Ji, Y.4
  • 15
    • 33847303101 scopus 로고    scopus 로고
    • BLINC: Multilevel traffic classification in the dark
    • DOI 10.1145/1090191.1080119
    • Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: Proceedings of ACM SIGCOMM, pp. 229-240 (2005) (Pubitemid 46323507)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 229-240
    • Karagiannis, T.1    Papagiannaki, K.2    Faloutsos, M.3
  • 16
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • DOI 10.1145/1090191.1080118
    • Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. SIGCOMM Comput. Commun. Rev. 35(4), 217-228 (2005) (Pubitemid 46323506)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 18
    • 0042474173 scopus 로고    scopus 로고
    • Internet quarantine: Requirements for containing self-propagating code
    • Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: INFOCOM (2003)
    • (2003) In: INFOCOM
    • Moore, D.1    Shannon, C.2    Voelker, G.M.3    Savage, S.4
  • 19
    • 34748852070 scopus 로고    scopus 로고
    • Real-time analysis of flow data for network attack detection
    • DOI 10.1109/INM.2007.374774, 4258526, 10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
    • M̈unz, G., Carle, G.: Real-time analysis of flow data for network attack detection. In: Proceedings of IFIP/IEEE Symposium on Integrated Management (IM2007), Munich, Germany (May 2007) (Pubitemid 47485163)
    • (2007) 10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07 , pp. 100-108
    • Munz, G.1    Carle, G.2
  • 20
    • 85094839698 scopus 로고    scopus 로고
    • Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics
    • Berkeley, CA, December 3-8. The USENIX Association
    • Nickless, B., Navarro, J., Winkler, L.: Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics. In: Proceedings of the Fourteenth Systems Administration Conference (LISA 2000), Berkeley, CA, December 3-8 2000, pp. 285-290. The USENIX Association (2000)
    • (2000) In: Proceedings of the Fourteenth Systems Administration Conference (LISA 2000) , vol.2000 , pp. 285-290
    • Nickless, B.1    Navarro, J.2    Winkler, L.3
  • 21
    • 35048841284 scopus 로고    scopus 로고
    • Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
    • Intelligent Data Engineering and Automated Learning - IDEAL 2004
    • Noh, S., Lee, C., Ryu, K., Choi, K., Jung, G.: Detecting worm propagation using traffic concentration analysis and inductive learning. In: Yang, Z.R., Yin, H., Everson, R.M. (eds.) IDEAL 2004. LNCS, vol.3177, pp. 402-408. Springer, Heidelberg (2004) (Pubitemid 39174145)
    • (2004) LECTURE NOTES IN COMPUTER SCIENCE , Issue.3177 , pp. 402-408
    • Noh, S.1    Lee, C.2    Ryu, K.3    Choi, K.4    Jung, G.5
  • 22
    • 57049123650 scopus 로고    scopus 로고
    • Empirical analysis of application-level traffic classification using supervised machine learning
    • LNCS. Springer, Heidelberg. In: Ma, Y., Choi, D., Ata, S. (eds.)
    • Park, B., Won, Y.J., Choi, M.-J., Kim, M.-S., Hong, J.W.: Empirical analysis of application-level traffic classification using supervised machine learning. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol.5297, pp. 474-477. Springer, Heidelberg (2008)
    • (2008) APNOMS 2008 , vol.5297 , pp. 474-477
    • Park, B.1    Won, Y.J.2    Choi, M.-J.3    Kim, M.-S.4    Hong, J.W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.