메뉴 건너뛰기




Volumn , Issue , 2008, Pages 17-26

An image processing approach to traffic anomaly detection

Author keywords

Anomaly detection; Internet traffic; Pattern recognition

Indexed keywords

ANOMALOUS ACTIVITY; ANOMALY DETECTION; CLUSTERING TECHNIQUES; DARKNET; INTERNET TRAFFIC; MULTI-SCALE STRUCTURES; PACKET BEHAVIOR; PACKET TRAFFIC; TIME AND SPACE; TRADITIONAL TECHNIQUES; TRAFFIC ANOMALIES; TRAFFIC FEATURES;

EID: 70349098688     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1503370.1503377     Document Type: Conference Paper
Times cited : (24)

References (17)
  • 1
  • 2
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. IMW '02, pages 71-82, 2002.
    • (2002) IMW '02 , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 4
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
    • G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. LSAD '07, pages 145-152, 2007.
    • (2007) LSAD '07 , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 5
    • 0015285440 scopus 로고
    • Use of the hough transformation to detect lines and curves in pictures
    • R. O. Duda and P. E. Hart. Use of the hough transformation to detect lines and curves in pictures. Commun. ACM, 15(1):11-15, 1972.
    • (1972) Commun. ACM , vol.15 , Issue.1 , pp. 11-15
    • Duda, R.O.1    Hart, P.E.2
  • 6
    • 38149030783 scopus 로고    scopus 로고
    • Nada - network anomaly detection algorithm
    • S. Farraposo, P. Owezarski, and E. Monteiro. Nada - network anomaly detection algorithm. DSOM '07, 4785:191-194, 2007.
    • (2007) DSOM '07 , vol.4785 , pp. 191-194
    • Farraposo, S.1    Owezarski, P.2    Monteiro, E.3
  • 7
    • 0003761433 scopus 로고
    • Method and means for recognizing complex patterns.
    • U.S. Patent 3,069,654
    • P. Hough. Method and means for recognizing complex patterns. U.S. Patent 3,069,654, 1962.
    • (1962)
    • Hough, P.1
  • 8
    • 33845536096 scopus 로고    scopus 로고
    • Detecting traffic anomalies at the source through aggregate analysis of packet header data
    • S. S. Kim and A. L. N. Reddy. Detecting traffic anomalies at the source through aggregate analysis of packet header data. Proc. of Networking 2004, pages 1047-1059, 2004.
    • (2004) Proc. of Networking 2004 , pp. 1047-1059
    • Kim, S.S.1    Reddy, A.L.N.2
  • 9
    • 24344452007 scopus 로고    scopus 로고
    • A study of analyzing network traffic as images in real-time
    • S. S. Kim and A. L. N. Reddy. A study of analyzing network traffic as images in real-time. INFOCOM '05, pages 2056-2067, 2005.
    • (2005) INFOCOM '05 , pp. 2056-2067
    • Kim, S.S.1    Reddy, A.L.N.2
  • 10
    • 33646742035 scopus 로고    scopus 로고
    • Packetscore: A statics-based packet filtering scheme against distributed denial-of-service attacks
    • Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao. Packetscore: A statics-based packet filtering scheme against distributed denial-of-service attacks. IEEE Trans. on Dependable and Secure Computing, 3(2):141-155, 2006.
    • (2006) IEEE Trans. on Dependable and Secure Computing , vol.3 , Issue.2 , pp. 141-155
    • Kim, Y.1    Lau, W.C.2    Chuah, M.C.3    Chao, H.J.4
  • 11
    • 1242287727 scopus 로고    scopus 로고
    • Low-rate tcp-targeted denial of service attacks: The shrew vs. the mice and elephants
    • A. Kuzmanovic and E. W. Knightly. Low-rate tcp-targeted denial of service attacks: the shrew vs. the mice and elephants. SIGCOMM '03, pages 75-86, 2003.
    • (2003) SIGCOMM '03 , pp. 75-86
    • Kuzmanovic, A.1    Knightly, E.W.2
  • 12
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. SIGCOMM '05, pages 217-228, 2005.
    • (2005) SIGCOMM '05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 15
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks, 31 (23-24):2435-2463, 1999.
    • (1999) Computer Networks , vol.31 , Issue.23-24 , pp. 2435-2463
    • Paxson, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.