-
1
-
-
70849125754
-
-
Argus homepage. http://qosient.com/argus/2009.
-
(2009)
Argus Homepage
-
-
-
3
-
-
70849114460
-
-
Silk documentation. http://tools.netsa.cert.org/silk/silkdocs.html, 2009.
-
(2009)
Silk Documentation
-
-
-
5
-
-
70849103195
-
-
Agent Technology Group, Gerstner Laboratory, Czech Technical University in Prague and Institute of Computer Science, Masaryk University in Brno
-
Agent Technology Group, Gerstner Laboratory, Czech Technical University in Prague and Institute of Computer Science, Masaryk University in Brno. CAMNEP (Cooperative Adaptive Mechanism for NEtwork Protection) project web page. http://http://agents.felk.cvut.cz/projects/camnep.
-
CAMNEP (Cooperative Adaptive Mechanism for NEtwork Protection) Project Web Page
-
-
-
6
-
-
34548324813
-
Multivariate online anomaly detection using kernel recursive least squares
-
DOI 10.1109/INFCOM.2007.79, 4215661, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
-
Tarem Ahmed, Mark Coates, and Anukool Lakhina. Multivariate online anomaly detection using kernel recursive least squares. In INFOCOM, pages 625-633, 2007. (Pubitemid 47334279)
-
(2007)
Proceedings - IEEE INFOCOM
, pp. 625-633
-
-
Ahmed, T.1
Coates, M.2
Lakhina, A.3
-
8
-
-
0003231464
-
Traffic flow measurement: Architecture
-
Informational), October
-
N. Brownlee, C. Mills, and G. Ruth. Traffic Flow Measurement: Architecture. RFC 2722 (Informational), October 1999.
-
(1999)
RFC
, vol.2722
-
-
Brownlee, N.1
Mills, C.2
Ruth., G.3
-
9
-
-
56449096542
-
-
Cisco Systems. Cisco IOS NetFlow. http://www.cisco.com/go/netflow, 2007.
-
(2007)
Cisco IOS NetFlow
-
-
-
10
-
-
33746913393
-
Cisco systems netflow services export version 9
-
Informational), October
-
B. Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational), October 2004.
-
(2004)
RFC
, vol.3954
-
-
Claise, B.1
-
12
-
-
56449128057
-
Netflow data visualization based on graphs. In visualization for computer security
-
Tomas Dymacek and Pavel Minarik. Netflow data visualization based on graphs. In Visualization for Computer Security, 5th International Workshop, VizSEC 2008 Proceedings, pages 144-151, 2008.
-
(2008)
5th International Workshop, VizSEC 2008 Proceedings
, pp. 144-151
-
-
Dymacek, T.1
Minarik, P.2
-
15
-
-
38049181167
-
Profiling the end host
-
Thomas Karagiannis, Konstantina Papagiannaki, Nina Taft, and Michalis Faloutsos. Profiling the end host. In PAM 2007, pages 186-196, 2007.
-
(2007)
PAM 2007
, pp. 186-196
-
-
Karagiannis, T.1
Papagiannaki, K.2
Taft, N.3
Faloutsos, M.4
-
16
-
-
14944386850
-
On scalable attack detection in the network
-
New York, NY, USA, ACM
-
Ramana Rao Kompella, Sumeet Singh, and George Varghese. On scalable attack detection in the network. In IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 187-200, New York, NY, USA, 2004. ACM.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 187-200
-
-
Kompella, R.R.1
Singh, S.2
Varghese, G.3
-
17
-
-
70849104855
-
-
Mycroft Mind Inc. NetFlow Visualizer. http://www.mycroftmind.com/ products:nfvis.
-
NetFlow Visualizer
-
-
-
18
-
-
63049094145
-
Bidirectional flow export using IP flow information export (IPFIX)
-
Proposed Standard), January
-
B. Trammell and E. Boschi. Bidirectional Flow Export Using IP Flow Information Export (IPFIX). RFC 5103 (Proposed Standard), January 2008.
-
(2008)
RFC
, vol.5103
-
-
Trammell, B.1
Boschi, E.2
-
19
-
-
37249064377
-
FlowMon Probe.
-
Pavel Čeleda, Milan Kovaćǐk, Tomáš Końiř, Vojtěch Krḿǐcek, Petr Špringl, and Martin Žádník. FlowMon Probe. Technical Report 31/2006, CESNET, z. s. p. o., 2006. http://www.cesnet.cz/doc/techzpravy/2006/flowmon- probe.
-
(2006)
Technical Report 31/2006 CESNET, Z. S. P. O
-
-
Čeleda, P.1
Kovaćǐk, M.2
Końiř, T.3
Krḿǐcek, V.4
Špringl, P.5
Žádník, M.6
-
21
-
-
84964467096
-
Protocol scrubbing: Network security through transparent flow modification
-
David Watson, Matthew Smart, G. Robert Malan, and Farnam Jahanian. Protocol scrubbing: Network security through transparent flow modification. DARPA Information Survivability Conference and Exposition, 2:1108, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 1108
-
-
Watson, D.1
Smart, M.2
Malan, G.R.3
Jahanian, F.4
-
22
-
-
70449469997
-
Profiling and clustering internet hosts
-
CSREA Press
-
Songjie Wei, Jelena Mirkovic, and Ezra Kissel. Profiling and clustering internet hosts. In DMIN, pages 269-275. CSREA Press, 2006.
-
(2006)
DMIN
, pp. 269-275
-
-
Wei, S.1
Mirkovic, J.2
Kissel, E.3
|