메뉴 건너뛰기




Volumn 3, Issue 2, 2009, Pages 637-662

Detection and localization of change-points in high-dimensional network traffic data

Author keywords

Change point detection; High dimensional data; Network anomaly detection; Rank tests

Indexed keywords


EID: 72349083803     PISSN: 19326157     EISSN: 19417330     Source Type: Journal    
DOI: 10.1214/08-AOAS232     Document Type: Article
Times cited : (79)

References (23)
  • 6
    • 84951601829 scopus 로고
    • A generalized Wilcoxon test for comparing arbitrarily single censored samples
    • Gehan, E. (1965). A generalized Wilcoxon test for comparing arbitrarily single censored samples. Biometrika 52 203-223.
    • (1965) Biometrika , vol.52 , pp. 203-223
    • Gehan, E.1
  • 7
    • 0034344429 scopus 로고    scopus 로고
    • A nonparametric test for change in randomly censored data
    • Gombay, E. and Liu, S. (2000). A nonparametric test for change in randomly censored data. Can. J. Statist. 28 113-121.
    • (2000) Can. J. Statist. , vol.28 , pp. 113-121
    • Gombay, E.1    Liu, S.2
  • 13
    • 0014060670 scopus 로고
    • Ranking procedures for arbitrarily restricted observations
    • Mantel, N. (1967). Ranking procedures for arbitrarily restricted observations. Biometrics 23 65-78.
    • (1967) Biometrics , vol.23 , pp. 65-78
    • Mantel, N.1
  • 15
    • 0002916530 scopus 로고
    • Continuous inspection schemes
    • Page, E. S. (1954). Continuous inspection schemes. Biometrika 41 100-115.
    • (1954) Biometrika , vol.41 , pp. 100-115
    • Page, E.S.1
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • Paxson, V. (1999). Bro: A system for detecting network intruders in real-time. Computer Network 31 2435-2463.
    • (1999) Computer Network , vol.31 , pp. 2435-2463
    • Paxson, V.1
  • 17
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • In USENIX Association, Berkeley, CA
    • Roesch, M. (1999). Snort: Lightweight intrusion detection for networks. InProceedings of LISA'99 229-238. USENIX Association, Berkeley, CA.
    • (1999) Proceedings of LISA'99 , pp. 229-238
    • Roesch, M.1
  • 18
    • 79951498665 scopus 로고    scopus 로고
    • A novel approach for anomaly detection over high-speed networks
    • In
    • Salem, O., Vaton, S. and Gravey, A. (2007). A novel approach for anomaly detection over high-speed networks. In Proceedings of EC2ND.
    • (2007) Proceedings of EC2ND.
    • Salem, O.1    Vaton, S.2    Gravey, A.3
  • 19
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting SYN flooding attacks
    • Siris, A. and Papagalou, F. (2004). Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications 29 1433-1442.
    • (2004) Computer Communications , vol.29 , pp. 1433-1442
    • Siris, A.1    Papagalou, F.2
  • 20
    • 33746983029 scopus 로고    scopus 로고
    • Detection of intrusion in information systems by sequential change-point methods
    • Tartakovsky, A., Rozovskii, B., Blazek, R. and Kim, H. (2006a). Detection of intrusion in information systems by sequential change-point methods. Statist. Methodol. 3 252-340.
    • (2006) Statist. Methodol. , vol.3 , pp. 252-340
    • Tartakovsky, A.1    Rozovskii, B.2    Blazek, R.3    Kim, H.4
  • 21
    • 33947171900 scopus 로고    scopus 로고
    • A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
    • Tartakovsky, A., Rozovskii, B., Blazek, R. and Kim, H. (2006b). A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. IEEE Transactions on Signal Processing 54 3372-3382.
    • (2006) IEEE Transactions on Signal Processing , vol.54 , pp. 3372-3382
    • Tartakovsky, A.1    Rozovskii, B.2    Blazek, R.3    Kim, H.4
  • 23


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.