메뉴 건너뛰기




Volumn 6, Issue 2, 2009, Pages 110-121

Histogram-based traffic anomaly detection

Author keywords

Computer network security, monitoring, clustering methods

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTION MODELS; CLUSTERING METHODS; DESIGN OPTION; FEATURE-BASED; HISTOGRAM MODELS; IMPACT PERFORMANCE; IP ADDRESSS; NETWORK ANOMALIES; NETWORK TRAFFIC; NEW APPROACHES; PACKET HEADER; PORT NUMBERS; RESEARCH EFFORTS; SERVICE LEVEL AGREEMENTS; TECHNICAL DETAILS; TRAFFIC ANOMALIES; TRAFFIC FEATURES;

EID: 75149179043     PISSN: 19324537     EISSN: None     Source Type: Journal    
DOI: 10.1109/TNSM.2009.090604     Document Type: Article
Times cited : (158)

References (21)
  • 1
    • 84894918914 scopus 로고    scopus 로고
    • Who needs hackers?
    • Sept. 12
    • J. Schwarz, "Who needs hackers?" New York Times, Sept. 12, 2007.
    • (2007) New York Times
    • Schwarz, J.1
  • 3
    • 33749580207 scopus 로고    scopus 로고
    • Aberrant behavior detection in timeseries for network monitoring
    • Nov.
    • J. Brutlag, "Aberrant behavior detection in timeseries for network monitoring," in Proc. USENIX LISA, Nov. 2002.
    • (2002) Proc. USENIX LISA
    • Brutlag, J.1
  • 4
    • 11244340240 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • Aug.
    • A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," in ACM SIGCOMM, Aug. 2004.
    • (2004) ACM SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 7
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP networks
    • Aug.
    • M. Thottan and C. Ji, "Anomaly detection in IP networks," IEEE Trans. Signal Processing, vol.51, no.8, pp. 2191-2204, Aug. 2003.
    • (2003) IEEE Trans. Signal Processing , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 8
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in ACM SIGCOMM '05, 2005, pp. 217-228.
    • (2005) ACM SIGCOMM '05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 12
    • 78650730087 scopus 로고    scopus 로고
    • Webclass: Adding rigor to manual labeling of traffic anomalies
    • H. Ringberg, A. Soule, and J. Rexford, "Webclass: adding rigor to manual labeling of traffic anomalies," SIGCOMM Comput. Commun. Rev., vol.38, no.1, pp. 35-38, 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.1 , pp. 35-38
    • Ringberg, H.1    Soule, A.2    Rexford, J.3
  • 15
    • 33847761464 scopus 로고    scopus 로고
    • Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies
    • DOI 10.1109/TDSC.2007.12
    • A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Nongaussian and long memory statistical characterizations for internet traffic with anomalies," IEEE/ACM Trans. Dependable Secure Computing, vol.4, no.1, pp. 56-70, 2007. (Pubitemid 46384621)
    • (2007) IEEE Transactions on Dependable and Secure Computing , vol.4 , Issue.1 , pp. 56-70
    • Scherrer, A.1    Larrieu, N.2    Owezarski, P.3    Borgnat, P.4    Abry, P.5
  • 19
    • 84972893020 scopus 로고
    • A dendrite method for cluster analysis
    • Calinski and Harabasz, "A dendrite method for cluster analysis," Commun. Statistics, vol.3, no.1, pp. 1-27, 1974.
    • (1974) Commun. Statistics , vol.3 , Issue.1 , pp. 1-27
    • Calinski1    Harabasz2
  • 20
    • 34250115918 scopus 로고
    • An examination of procedures for determining the number of clusters in a data set
    • G. W. Milligan and M. Cooper, "An examination of procedures for determining the number of clusters in a data set," Psychometrika, vol.50, pp. 159-179, 1985.
    • (1985) Psychometrika , vol.50 , pp. 159-179
    • Milligan, G.W.1    Cooper, M.2
  • 21
    • 0003993827 scopus 로고    scopus 로고
    • [Online]. Available, MIT
    • Lincoln Laboratory, "DARPA intrusion detection evaluation," [Online]. Available: http://www.ll.mit.edu/mission/communications/ist/corpora/ ideval/, MIT, 2001.
    • (2001) DARPA Intrusion Detection Evaluation


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.