-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: ACM SIGCOMM Internet Measurement Workshop (2002)
-
(2002)
ACM SIGCOMM Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
67650335608
-
Towards systematically evaluating flowlevel anomaly detection mechanisms
-
T̈ubingen Germany September
-
Brauckhoff, D., Fiedler, U., Plattner, B.: Towards systematically evaluating flowlevel anomaly detection mechanisms. In: Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), T̈ubingen, Germany (September 2006)
-
(2006)
Workshop on Monitoring Attack Detection and Mitigation (MonAM 2006)
-
-
Brauckhoff, D.1
Fiedler, U.2
Plattner, B.3
-
5
-
-
49949117328
-
Flow-level anomaly detection - blessing or curse
-
Student Workshop, Anchorage, Alaska, USA, May
-
Brauckhoff, D., May, M., Plattner, B.: Flow-level anomaly detection - blessing or curse? In: IEEE INFOCOM 2007, Student Workshop, Anchorage, Alaska, USA (May 2007)
-
(2007)
IEEE INFOCOM 2007
-
-
Brauckhoff, D.1
May, M.2
Plattner, B.3
-
6
-
-
85084160250
-
Flame: A flow-level anomaly modeling engine
-
Usenix, San Jose, CA, USA July
-
Brauckhoff, D., Wagner, A., May, M.: Flame: A flow-level anomaly modeling engine. In: Proceedings of CSET 2008 workshop, Usenix, San Jose, CA, USA (July 2008)
-
(2008)
Proceedings of CSET workshop
-
-
Brauckhoff, D.1
Wagner, A.2
May, M.3
-
8
-
-
26444461439
-
Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone. In: Julisch, K., Krügel, C. (eds.)
-
Springer, Heidelberg. LNCS, Julisch, K., Kr̈ugel, C. (eds.)
-
Düubendorfer, T., Wagner, A., Hossmann, T., Plattner, B.: Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone. In: Julisch, K., Krügel, C. (eds.) DIMVA 2005. LNCS, vol.3548, pp. 103-122. Springer, Heidelberg (2005)
-
(2005)
DIMVA 2005
, vol.3548
, pp. 103-122
-
-
Düubendorfer, T.1
Wagner, A.2
Hossmann, T.3
Plattner, B.4
-
9
-
-
14944379887
-
A behavioral approach to worm detection
-
WORM'04 - Proceedings of the 2004 ACM Workshop on Rapid Malcode
-
Ellis, D.R., Aiken, J.G., Attwood, K.S., Tenaglia, S.D.: A behavioral approach to worm detection. In: ACM Workshop on Rapid MalcoDe WORM (2005) (Pubitemid 40371959)
-
(2004)
WORM'04 - Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 43-53
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
10
-
-
34248358287
-
Traffic classification using clustering algorithms
-
DOI 10.1145/1162678.1162679, Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06
-
Erman, J., Arlitt, M., Mahanti, A.: Traffic classification using clustering algorithms. In: MineNet 2006: Proceedings of the 2006 SIGCOMM workshop on Mining network data, pp. 281-286. ACM, New York (2006) (Pubitemid 46740690)
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, MineNet'06
, vol.2006
, pp. 281-286
-
-
Erman, J.1
Arlitt, M.2
Mahanti, A.3
-
11
-
-
33745592857
-
Minds,detection of novel network attacks using data mining
-
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.-N., Dokas, P., Kumar, V., Srivastava, J.: Minds,detection of novel network attacks using data mining. In: ICDM Workshop on Data Mining for Computer Security (DMSEC) (2003)
-
(2003)
ICDM Workshop on Data Mining for Computer Security (DMSEC)
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.-N.4
Dokas, P.5
Kumar, V.6
Srivastava, J.7
-
12
-
-
33745442732
-
Host anomalies from network data
-
DOI 10.1109/IAW.2005.1495970, 1495970, Proceedings from the Sixth Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
-
Gates, C., Becknel, D.: Host anomalies from network data. In: IEEE SMC Information Assurance Workshop (2005) (Pubitemid 43948740)
-
(2005)
Proceedings from the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop, SMC 2005
, vol.2005
, pp. 325-332
-
-
Gates, C.1
Becknel, D.2
-
13
-
-
57049173886
-
Fast traffic classification in high speed networks
-
Ma, Y., Choi, D., Ata, S. (eds.) LNCS. Springer, Heidelberg
-
Gu, R., Hong,M.,Wang, H., Ji, Y.: Fast traffic classification in high speed networks. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol.5297, pp. 429-432. Springer, Heidelberg (2008)
-
(2008)
APNOMS 2008
, vol.5297
, pp. 429-432
-
-
Gu, R.1
Hong, M.2
Wang, H.3
Ji, Y.4
-
15
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
DOI 10.1145/1090191.1080119
-
Karagiannis, T., Papagiannaki, K., Faloutsos, M.: Blinc: Multilevel traffic classification in the dark. In: Proceedings of ACM SIGCOMM, pp. 229-240 (2005) (Pubitemid 46323507)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
16
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
DOI 10.1145/1090191.1080118
-
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. SIGCOMM Comput. Commun. Rev. 35(4), 217-228 (2005) (Pubitemid 46323506)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
18
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: INFOCOM (2003)
-
(2003)
In: INFOCOM
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
19
-
-
34748852070
-
Real-time analysis of flow data for network attack detection
-
DOI 10.1109/INM.2007.374774, 4258526, 10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
-
M̈unz, G., Carle, G.: Real-time analysis of flow data for network attack detection. In: Proceedings of IFIP/IEEE Symposium on Integrated Management (IM2007), Munich, Germany (May 2007) (Pubitemid 47485163)
-
(2007)
10th IFIP/IEEE International Symposium on Integrated Network Management 2007, IM '07
, pp. 100-108
-
-
Munz, G.1
Carle, G.2
-
20
-
-
85094839698
-
Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics
-
Berkeley, CA, December 3-8. The USENIX Association
-
Nickless, B., Navarro, J., Winkler, L.: Combining cisco netflow exports with relational database technology for usage statistics, intrusion detection, and network forensics. In: Proceedings of the Fourteenth Systems Administration Conference (LISA 2000), Berkeley, CA, December 3-8 2000, pp. 285-290. The USENIX Association (2000)
-
(2000)
In: Proceedings of the Fourteenth Systems Administration Conference (LISA 2000)
, vol.2000
, pp. 285-290
-
-
Nickless, B.1
Navarro, J.2
Winkler, L.3
-
21
-
-
35048841284
-
Detecting Worm Propagation Using Traffic Concentration Analysis and Inductive Learning
-
Intelligent Data Engineering and Automated Learning - IDEAL 2004
-
Noh, S., Lee, C., Ryu, K., Choi, K., Jung, G.: Detecting worm propagation using traffic concentration analysis and inductive learning. In: Yang, Z.R., Yin, H., Everson, R.M. (eds.) IDEAL 2004. LNCS, vol.3177, pp. 402-408. Springer, Heidelberg (2004) (Pubitemid 39174145)
-
(2004)
LECTURE NOTES IN COMPUTER SCIENCE
, Issue.3177
, pp. 402-408
-
-
Noh, S.1
Lee, C.2
Ryu, K.3
Choi, K.4
Jung, G.5
-
22
-
-
57049123650
-
Empirical analysis of application-level traffic classification using supervised machine learning
-
LNCS. Springer, Heidelberg. In: Ma, Y., Choi, D., Ata, S. (eds.)
-
Park, B., Won, Y.J., Choi, M.-J., Kim, M.-S., Hong, J.W.: Empirical analysis of application-level traffic classification using supervised machine learning. In: Ma, Y., Choi, D., Ata, S. (eds.) APNOMS 2008. LNCS, vol.5297, pp. 474-477. Springer, Heidelberg (2008)
-
(2008)
APNOMS 2008
, vol.5297
, pp. 474-477
-
-
Park, B.1
Won, Y.J.2
Choi, M.-J.3
Kim, M.-S.4
Hong, J.W.5
-
25
-
-
4544295719
-
The earlybird system for real-time detection of unknown worms
-
Singh, S., Estan, C., Varghese, G., Savage, S.: The earlybird system for real-time detection of unknown worms. In: ACM - Workshop on Hot Topics in Networks (HOTNETS) (2003)
-
(2003)
ACM - Workshop on Hot Topics in Networks (HOTNETS)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
|