메뉴 건너뛰기




Volumn 5, Issue 2, 2010, Pages 288-299

Predictive network anomaly detection and visualization

Author keywords

Auto regressive moving average (ARMA) modeling; Entropy; Fisher discriminant; Network anomaly; Wiener filtering

Indexed keywords

AUTO-REGRESSIVE MOVING AVERAGE (ARMA) MODELING; AUTOREGRESSIVE MOVING AVERAGE; FISHER DISCRIMINANT; NETWORK ANOMALIES; WIENER FILTERING;

EID: 77952616174     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2041808     Document Type: Article
Times cited : (36)

References (42)
  • 4
    • 34147111253 scopus 로고    scopus 로고
    • Network intrusion detection in covariance feature space
    • DOI 10.1016/j.patcog.2006.12.010, PII S0031320306005310
    • S. Jin, D. S. Yeung, and X. Wang, "Network intrusion detection in covariance feature space, " Pattern Recognit., vol. 40, no. 8, pp. 2185-2197, 2007. (Pubitemid 46574766)
    • (2007) Pattern Recognition , vol.40 , Issue.8 , pp. 2185-2197
    • Jin, S.1    Yeung, D.S.2    Wang, X.3
  • 5
    • 0033876324 scopus 로고    scopus 로고
    • A predictability analysis of network traffic
    • A. Sang and S. Li, "A predictability analysis of network traffic, " in Proc. INFOCOM (1), 2000, pp. 342-351.
    • (2000) Proc. INFOCOM , Issue.1 , pp. 342-351
    • Sang, A.1    Li, S.2
  • 8
    • 0032178081 scopus 로고    scopus 로고
    • Data networks as cascades: Investigating the multifractal nature of internet WAN traffic
    • A. Feldmann, A. C. Gilbert, and W. Willinger, "Data networks as cascades: Investigating the multifractal nature of internet WAN traffic, " in Proc. SIGCOMM, 1998, pp. 42-55.
    • (1998) Proc. SIGCOMM , pp. 42-55
    • Feldmann, A.1    Gilbert, A.C.2    Willinger, W.3
  • 9
    • 50049117476 scopus 로고    scopus 로고
    • Internet security visualization case study: Instrumenting a network for netflow security visualization tools
    • in, Tucson, AZ, Dec. 5-9
    • W. Yurcik and Y. Li, "Internet security visualization case study: Instrumenting a network for netflow security visualization tools, " in Proc. Annual Computer Security Applications Conf. (ACSAC 05), Tucson, AZ, Dec. 5-9, 2005.
    • (2005) Proc. Annual Computer Security Applications Conf. (ACSAC 05)
    • Yurcik, W.1    Li, Y.2
  • 10
    • 84870637005 scopus 로고    scopus 로고
    • A network traffic flow reporting and visualization tool
    • in, New Orleans, LA
    • D. Plonka, "A network traffic flow reporting and visualization tool, " in Proc. 14th USENIX Conf. System Administration, New Orleans, LA, 2000, pp. 305-318.
    • (2000) Proc. 14th USENIX Conf. System Administration , pp. 305-318
    • Plonka, D.1
  • 11
    • 77952602382 scopus 로고    scopus 로고
    • Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 1 Aug, Online
    • Y. Gong, Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 1 Aug. 2004 [Online]. Available: http://www.securityfocus. com/infocus/1796
    • (2004)
    • Gong, Y.1
  • 12
    • 77952648215 scopus 로고    scopus 로고
    • Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 2 Sep, Online. Available
    • Y. Gong, Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 2 Sep. 2004 [Online]. Available: http://www.securityfocus. com/infocus/1796
    • (2004)
    • Gong, Y.1
  • 13
    • 33646007938 scopus 로고    scopus 로고
    • Multiresolution FIR neural-network-based learning algorithm applied to network traffic prediction
    • Mar
    • V. Alarcon-Aquino and J. A. Barria, "Multiresolution FIR neural-network-based learning algorithm applied to network traffic prediction, " IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 36, no. 2, pp. 208-220, Mar. 2006.
    • (2006) IEEE Trans. Syst., Man, Cybern. C, Appl. Rev. , vol.36 , Issue.2 , pp. 208-220
    • Alarcon-Aquino, V.1    Barria, J.A.2
  • 15
    • 77952627835 scopus 로고    scopus 로고
    • Mining Anomalies Using Traffic Distributions CS Department, Boston University, Feb
    • A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Distributions CS Department, Boston University, Tech. Rep. 2005-002, Feb. 2005.
    • (2005) Tech. Rep. 2005-002
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 17
    • 84947061370 scopus 로고    scopus 로고
    • Network Event Detection With T-Entropy Centre for Discrete Mathematics and Theoretical Computer Science, University of Auckland, New Zealand, May
    • R. Eimann, U. Speidel, N. Brownlee, and J. Yang, Network Event Detection With T-Entropy Centre for Discrete Mathematics and Theoretical Computer Science, University of Auckland, New Zealand, Rep. CDMTCS-266, May 2005.
    • (2005) Rep. CDMTCS-266
    • Eimann, R.1    Speidel, U.2    Brownlee, N.3    Yang, J.4
  • 18
    • 77952613539 scopus 로고    scopus 로고
    • Data Streaming Algorithms for Estimating Entropy of Network Traffic Computer Science Department, University of Rochester, Nov
    • A. Lall, V. Sekar, M. Ogihara, J. J. Xu, and H. Zhang, Data Streaming Algorithms for Estimating Entropy of Network Traffic Computer Science Department, University of Rochester, Tech. Rep. TR886, Nov. 2005.
    • (2005) Tech. Rep. TR886
    • Lall, A.1    Sekar, V.2    Ogihara, M.3    Xu, J.J.4    Zhang, H.5
  • 19
    • 62949193210 scopus 로고    scopus 로고
    • Measuring network change: Rényi cross entropy and the second order degree distribution
    • in, Adelaide, Australia, Mar
    • E. F. Harrington, "Measuring network change: Rényi cross entropy and the second order degree distribution, " in Proc. Passive and Active Measurement (PAM) Conf., Adelaide, Australia, Mar. 2006.
    • (2006) Proc. Passive and Active Measurement (PAM) Conf.
    • Harrington, E.F.1
  • 21
    • 33845536096 scopus 로고    scopus 로고
    • Detecting traffic anomalies through aggregate analysis of packet header data
    • in, New York: Springer
    • S. S. Kim, A. L. N. Reddy, and M. Vannucci, "Detecting traffic anomalies through aggregate analysis of packet header data, " in Networking. New York: Springer, 2004, vol. 3042, pp. 1047-1059.
    • (2004) Networking , vol.3042 , pp. 1047-1059
    • Kim, S.S.1    Reddy, A.L.N.2    Vannucci, M.3
  • 25
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP networks
    • Aug
    • M. Thottan and C. Ji, "Anomaly detection in IP networks, " IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 26
    • 26844499879 scopus 로고    scopus 로고
    • Statistical analysis of network traffic for adaptive faults detection
    • Sep
    • H. Hajji, "Statistical analysis of network traffic for adaptive faults detection, " IEEE Trans. Neural Netw., vol. 16, no. 5, pp. 1053-1063, Sep. 2005.
    • (2005) IEEE Trans. Neural Netw. , vol.16 , Issue.5 , pp. 1053-1063
    • Hajji, H.1
  • 27
    • 33847704184 scopus 로고    scopus 로고
    • K-Means+ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
    • Mar
    • S. R. Gaddam and K. S. Balagani, "K-Means+ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods, " IEEE Trans. Knowl. Data Eng., vol. 19, no. 3, pp. 345-354, Mar. 2007.
    • (2007) IEEE Trans. Knowl. Data Eng. , vol.19 , Issue.3 , pp. 345-354
    • Gaddam, S.R.1    Balagani, K.S.2
  • 28
    • 38149086666 scopus 로고    scopus 로고
    • Network anomaly detection using nonextensive entropy
    • Dec
    • A. Ziviani, M. L. Monsores, P. S. S. Rodrigues, and A. T. A. Gomes, "Network anomaly detection using nonextensive entropy, " IEEE Commun. Lett., vol. 11, no. 12, pp. 1034-1036, Dec. 2007.
    • (2007) IEEE Commun. Lett. , vol.11 , Issue.12 , pp. 1034-1036
    • Ziviani, A.1    Monsores, M.L.2    Rodrigues, P.S.S.3    Gomes, A.T.A.4
  • 29
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • Jun
    • S. S. Kim and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data, " IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 562-575, Jun. 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.3 , pp. 562-575
    • Kim, S.S.1    Reddy, A.L.N.2
  • 30
    • 65249118227 scopus 로고    scopus 로고
    • Network anomaly detection and classification via opportunistic sampling
    • Jan./Feb
    • G. Androulidakis, V. Chatzigiannakis, and S. Papavassiliou, "Network anomaly detection and classification via opportunistic sampling, " IEEE Network, vol. 23, no. 1, pp. 6-12, Jan./Feb. 2009.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 6-12
    • Androulidakis, G.1    Chatzigiannakis, V.2    Papavassiliou, S.3
  • 34
    • 77952612657 scopus 로고    scopus 로고
    • Master's thesis, Wake Forest University, Winston-Salem, NC, 27109
    • A. Schneider, "Methods of Internet Worm Propagation, " Master's thesis, Wake Forest University, Winston-Salem, NC, 2009, 27109.
    • (2009) "Methods of Internet Worm Propagation
    • Schneider, A.1
  • 35
    • 77952629639 scopus 로고    scopus 로고
    • Analysis of the "SQL Slammer" Worm and Its Effects on Indiana University and Related Institutions Feb, Online. Available
    • G. Travis, E. Balas, D. A. J. Ripley, and S. Wallace, Analysis of the "SQL Slammer" Worm and Its Effects on Indiana University and Related Institutions Feb. 2003 [Online]. Available: http://paintsquirrel. ucs.indiana.edu/pdf/SLAMMER.pdf, pp. 1-18
    • (2003) , pp. 1-18
    • Travis, G.1    Balas, E.2    Ripley, D.A.J.3    Wallace, S.4
  • 37
    • 0035420120 scopus 로고    scopus 로고
    • The noise properties of stochastic processes and entropy production
    • B. C. Bag, S. K. Banik, and D. S. Ray, "The noise properties of stochastic processes and entropy production, " Phys. Rev. E, vol. 64, p. 026110, 2001.
    • (2001) Phys. Rev. E , vol.64 , pp. 026110
    • Bag, B.C.1    Banik, S.K.2    Ray, D.S.3
  • 41
    • 69949188654 scopus 로고
    • Tests for serial correlation in regression analysis based on the periodogram of least-squares residuals
    • Sep
    • W. L. Crum, "Tests for serial correlation in regression analysis based on the periodogram of least-squares residuals, " J. Amer. Statist. Assoc., vol. 18, no. 143, pp. 889-899, Sep. 1923.
    • (1923) J. Amer. Statist. Assoc. , vol.18 , Issue.143 , pp. 889-899
    • Crum, W.L.1
  • 42
    • 0003334194 scopus 로고
    • The resemblance between the ordinate of the periodogram and the correlation coefficient
    • Mar
    • J. Durbin, "The resemblance between the ordinate of the periodogram and the correlation coefficient, " Biometrika, vol. 56, no. 1, pp. 1-15, Mar. 1969.
    • (1969) Biometrika , vol.56 , Issue.1 , pp. 1-15
    • Durbin, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.