-
1
-
-
84894918914
-
Who needs hackers?
-
Sept. 12
-
J. Schwarz, "Who needs hackers?" New York Times, Sept. 12, 2007.
-
(2007)
New York Times
-
-
Schwarz, J.1
-
2
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Nov.
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in Proc. ACM SIGCOMM Internet Measurement Workshop, Nov. 2002, pp. 71-82.
-
(2002)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
3
-
-
33749580207
-
Aberrant behavior detection in timeseries for network monitoring
-
Nov.
-
J. Brutlag, "Aberrant behavior detection in timeseries for network monitoring," in Proc. USENIX LISA, Nov. 2002.
-
(2002)
Proc. USENIX LISA
-
-
Brutlag, J.1
-
5
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Oct.
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: Methods, evaluation, and applications," in Proc. ACM SIGCOMM Internet Measurement Conf., Oct. 2003.
-
(2003)
Proc. ACM SIGCOMM Internet Measurement Conf.
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
6
-
-
84878704906
-
Network anomography
-
Oct.
-
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan, "Network anomography," in Proc. ACM SIGCOMM Internet Measurement Conf., Oct. 2005.
-
(2005)
Proc. ACM SIGCOMM Internet Measurement Conf.
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
-
7
-
-
0043166339
-
Anomaly detection in IP networks
-
Aug.
-
M. Thottan and C. Ji, "Anomaly detection in IP networks," IEEE Trans. Signal Processing, vol.51, no.8, pp. 2191-2204, Aug. 2003.
-
(2003)
IEEE Trans. Signal Processing
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
8
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in ACM SIGCOMM '05, 2005, pp. 217-228.
-
(2005)
ACM SIGCOMM '05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
36349029177
-
Sensitivity of pca for traffic anomaly detection
-
New York, NY, USA: ACM
-
H. Ringberg, A. Soule, J. Rexford, and C. Diot, "Sensitivity of pca for traffic anomaly detection," in SIGMETRICS '07: Proc. 2007 ACM SIGMETRICS International Conf. Measurement Modeling Computer Systems. New York, NY, USA: ACM, 2007, pp. 109-120.
-
(2007)
SIGMETRICS '07: Proc. 2007 ACM SIGMETRICS International Conf. Measurement Modeling Computer Systems
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
10
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA, USA: USENIX Association
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation," in IMC'05: Proc. Internet Measurement Conf. 2005 Internet Measurement Conf.. Berkeley, CA, USA: USENIX Association, 2005, pp. 32-32
-
(2005)
IMC'05: Proc. Internet Measurement Conf. 2005 Internet Measurement Conf.
, pp. 32-32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
11
-
-
33846200876
-
Entropy based worm and anomaly detection in fast ip networks
-
Washington, DC, USA: IEEE Computer Society
-
A. Wagner and B. Plattner, "Entropy based worm and anomaly detection in fast ip networks," in WETICE '05: Proc. 14th IEEE International Workshops Enabling Technologies: Infrastructure Collaborative Enterprise. Washington, DC, USA: IEEE Computer Society, 2005, pp. 172-177.
-
(2005)
WETICE '05: Proc. 14th IEEE International Workshops Enabling Technologies: Infrastructure Collaborative Enterprise
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
12
-
-
78650730087
-
Webclass: Adding rigor to manual labeling of traffic anomalies
-
H. Ringberg, A. Soule, and J. Rexford, "Webclass: adding rigor to manual labeling of traffic anomalies," SIGCOMM Comput. Commun. Rev., vol.38, no.1, pp. 35-38, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.1
, pp. 35-38
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
-
13
-
-
75149137634
-
Detectability of traffic anomalies in two adjacent networks
-
Apr.
-
A. Soule, H. Larsen, F. Silveira, J. Rexford, and C. Diot, "Detectability of traffic anomalies in two adjacent networks," in Proc. Passive Active Measurements (PAM) Conf., Apr. 2007.
-
(2007)
Proc. Passive Active Measurements (PAM) Conf.
-
-
Soule, A.1
Larsen, H.2
Silveira, F.3
Rexford, J.4
Diot, C.5
-
14
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
New York, NY, USA: ACM Press
-
D. Brauckhoff, B. Tellenbach, A. Wagner, M. May, and A. Lakhina, "Impact of packet sampling on anomaly detection metrics," in IMC '06: Proc. 6th ACM SIGCOMM Internet Measurement. New York, NY, USA: ACM Press, 2006, pp. 159-164.
-
(2006)
IMC '06: Proc. 6th ACM SIGCOMM Internet Measurement
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
15
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies
-
DOI 10.1109/TDSC.2007.12
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Nongaussian and long memory statistical characterizations for internet traffic with anomalies," IEEE/ACM Trans. Dependable Secure Computing, vol.4, no.1, pp. 56-70, 2007. (Pubitemid 46384621)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
19
-
-
84972893020
-
A dendrite method for cluster analysis
-
Calinski and Harabasz, "A dendrite method for cluster analysis," Commun. Statistics, vol.3, no.1, pp. 1-27, 1974.
-
(1974)
Commun. Statistics
, vol.3
, Issue.1
, pp. 1-27
-
-
Calinski1
Harabasz2
-
20
-
-
34250115918
-
An examination of procedures for determining the number of clusters in a data set
-
G. W. Milligan and M. Cooper, "An examination of procedures for determining the number of clusters in a data set," Psychometrika, vol.50, pp. 159-179, 1985.
-
(1985)
Psychometrika
, vol.50
, pp. 159-179
-
-
Milligan, G.W.1
Cooper, M.2
-
21
-
-
0003993827
-
-
[Online]. Available, MIT
-
Lincoln Laboratory, "DARPA intrusion detection evaluation," [Online]. Available: http://www.ll.mit.edu/mission/communications/ist/corpora/ ideval/, MIT, 2001.
-
(2001)
DARPA Intrusion Detection Evaluation
-
-
|