-
2
-
-
38049077367
-
Anomaly detection based on aggregated network behavior metrics
-
in, WiCom 2007
-
G. Shen, D. Chen, and Z. Qin, "Anomaly detection based on aggregated network behavior metrics, " in Proc. Wireless Communications, Networking and Mobile Computing, 2007 (WiCom 2007), pp. 2210-2213.
-
(2007)
Proc. Wireless Communications, Networking and Mobile Computing
, pp. 2210-2213
-
-
Shen, G.1
Chen, D.2
Qin, Z.3
-
3
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
in, Berkeley, CA, USENIX Association
-
A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization, " in Proc. First Conf. First Workshop on Hot Topics in Understanding Botnets (HotBots'07), Berkeley, CA, 2007, p. 7, USENIX Association.
-
(2007)
Proc. First Conf. First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
, pp. 7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
4
-
-
34147111253
-
Network intrusion detection in covariance feature space
-
DOI 10.1016/j.patcog.2006.12.010, PII S0031320306005310
-
S. Jin, D. S. Yeung, and X. Wang, "Network intrusion detection in covariance feature space, " Pattern Recognit., vol. 40, no. 8, pp. 2185-2197, 2007. (Pubitemid 46574766)
-
(2007)
Pattern Recognition
, vol.40
, Issue.8
, pp. 2185-2197
-
-
Jin, S.1
Yeung, D.S.2
Wang, X.3
-
5
-
-
0033876324
-
A predictability analysis of network traffic
-
A. Sang and S. Li, "A predictability analysis of network traffic, " in Proc. INFOCOM (1), 2000, pp. 342-351.
-
(2000)
Proc. INFOCOM
, Issue.1
, pp. 342-351
-
-
Sang, A.1
Li, S.2
-
6
-
-
33645155484
-
An aggregation technique for traffic monitoring
-
K. Cho, R. Kaizaki, and A. Kato, "An aggregation technique for traffic monitoring, " in Symp. Applications and the Internet (SAINT) Workshops, 2002, p. 74.
-
(2002)
Symp. Applications and the Internet (SAINT) Workshops
, pp. 74
-
-
Cho, K.1
Kaizaki, R.2
Kato, A.3
-
7
-
-
14944369649
-
Characteristics of internet background radiation
-
in, Oct
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of internet background radiation, " in Proc. ACM Internet Measurement Conf., Oct. 2004, pp. 27-40.
-
(2004)
Proc. ACM Internet Measurement Conf.
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
8
-
-
0032178081
-
Data networks as cascades: Investigating the multifractal nature of internet WAN traffic
-
A. Feldmann, A. C. Gilbert, and W. Willinger, "Data networks as cascades: Investigating the multifractal nature of internet WAN traffic, " in Proc. SIGCOMM, 1998, pp. 42-55.
-
(1998)
Proc. SIGCOMM
, pp. 42-55
-
-
Feldmann, A.1
Gilbert, A.C.2
Willinger, W.3
-
9
-
-
50049117476
-
Internet security visualization case study: Instrumenting a network for netflow security visualization tools
-
in, Tucson, AZ, Dec. 5-9
-
W. Yurcik and Y. Li, "Internet security visualization case study: Instrumenting a network for netflow security visualization tools, " in Proc. Annual Computer Security Applications Conf. (ACSAC 05), Tucson, AZ, Dec. 5-9, 2005.
-
(2005)
Proc. Annual Computer Security Applications Conf. (ACSAC 05)
-
-
Yurcik, W.1
Li, Y.2
-
10
-
-
84870637005
-
A network traffic flow reporting and visualization tool
-
in, New Orleans, LA
-
D. Plonka, "A network traffic flow reporting and visualization tool, " in Proc. 14th USENIX Conf. System Administration, New Orleans, LA, 2000, pp. 305-318.
-
(2000)
Proc. 14th USENIX Conf. System Administration
, pp. 305-318
-
-
Plonka, D.1
-
11
-
-
77952602382
-
-
Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 1 Aug, Online
-
Y. Gong, Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 1 Aug. 2004 [Online]. Available: http://www.securityfocus. com/infocus/1796
-
(2004)
-
-
Gong, Y.1
-
12
-
-
77952648215
-
-
Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 2 Sep, Online. Available
-
Y. Gong, Security Focus Article: Detecting Worms and Abnormal Activities With NetFlows, Part 2 Sep. 2004 [Online]. Available: http://www.securityfocus. com/infocus/1796
-
(2004)
-
-
Gong, Y.1
-
13
-
-
33646007938
-
Multiresolution FIR neural-network-based learning algorithm applied to network traffic prediction
-
Mar
-
V. Alarcon-Aquino and J. A. Barria, "Multiresolution FIR neural-network-based learning algorithm applied to network traffic prediction, " IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 36, no. 2, pp. 208-220, Mar. 2006.
-
(2006)
IEEE Trans. Syst., Man, Cybern. C, Appl. Rev.
, vol.36
, Issue.2
, pp. 208-220
-
-
Alarcon-Aquino, V.1
Barria, J.A.2
-
14
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
in, New York, ACM
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation, " in Proc. 5th ACM SIGCOMM Conf. Internet Measurement (IMC '05), New York, 2005, pp. 1-6, ACM.
-
(2005)
Proc. 5th ACM SIGCOMM Conf. Internet Measurement (IMC '05)
, pp. 1-6
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
15
-
-
77952627835
-
-
Mining Anomalies Using Traffic Distributions CS Department, Boston University, Feb
-
A. Lakhina, M. Crovella, and C. Diot, Mining Anomalies Using Traffic Distributions CS Department, Boston University, Tech. Rep. 2005-002, Feb. 2005.
-
(2005)
Tech. Rep. 2005-002
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
16
-
-
33645213060
-
Visual correlation of network alerts
-
Mar./Apr
-
S. Foresti, J. Agutter, Y. Livnat, S. Moon, and R. F. Erbacher, "Visual correlation of network alerts, " IEEE Comput. Graphics Applicat., vol. 26, no. 2, pp. 48-59, Mar./Apr. 2006.
-
(2006)
IEEE Comput. Graphics Applicat.
, vol.26
, Issue.2
, pp. 48-59
-
-
Foresti, S.1
Agutter, J.2
Livnat, Y.3
Moon, S.4
Erbacher, R.F.5
-
17
-
-
84947061370
-
-
Network Event Detection With T-Entropy Centre for Discrete Mathematics and Theoretical Computer Science, University of Auckland, New Zealand, May
-
R. Eimann, U. Speidel, N. Brownlee, and J. Yang, Network Event Detection With T-Entropy Centre for Discrete Mathematics and Theoretical Computer Science, University of Auckland, New Zealand, Rep. CDMTCS-266, May 2005.
-
(2005)
Rep. CDMTCS-266
-
-
Eimann, R.1
Speidel, U.2
Brownlee, N.3
Yang, J.4
-
18
-
-
77952613539
-
-
Data Streaming Algorithms for Estimating Entropy of Network Traffic Computer Science Department, University of Rochester, Nov
-
A. Lall, V. Sekar, M. Ogihara, J. J. Xu, and H. Zhang, Data Streaming Algorithms for Estimating Entropy of Network Traffic Computer Science Department, University of Rochester, Tech. Rep. TR886, Nov. 2005.
-
(2005)
Tech. Rep. TR886
-
-
Lall, A.1
Sekar, V.2
Ogihara, M.3
Xu, J.J.4
Zhang, H.5
-
19
-
-
62949193210
-
Measuring network change: Rényi cross entropy and the second order degree distribution
-
in, Adelaide, Australia, Mar
-
E. F. Harrington, "Measuring network change: Rényi cross entropy and the second order degree distribution, " in Proc. Passive and Active Measurement (PAM) Conf., Adelaide, Australia, Mar. 2006.
-
(2006)
Proc. Passive and Active Measurement (PAM) Conf.
-
-
Harrington, E.F.1
-
21
-
-
33845536096
-
Detecting traffic anomalies through aggregate analysis of packet header data
-
in, New York: Springer
-
S. S. Kim, A. L. N. Reddy, and M. Vannucci, "Detecting traffic anomalies through aggregate analysis of packet header data, " in Networking. New York: Springer, 2004, vol. 3042, pp. 1047-1059.
-
(2004)
Networking
, vol.3042
, pp. 1047-1059
-
-
Kim, S.S.1
Reddy, A.L.N.2
Vannucci, M.3
-
22
-
-
69949112041
-
Anomaly prediction in network traffic using adaptive Wiener filtering and ARMA modeling
-
in, Oct
-
M. Celenk, T. Conley, J. Graham, and J. Willis, "Anomaly prediction in network traffic using adaptive Wiener filtering and ARMA modeling, " in Proc. IEEE Int. Conf. Systems, Man, and Cybernetics, Oct. 2008, pp. 3548-3553.
-
(2008)
Proc. IEEE Int. Conf. Systems, Man, and Cybernetics
, pp. 3548-3553
-
-
Celenk, M.1
Conley, T.2
Graham, J.3
Willis, J.4
-
23
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
in, Washington, DC
-
X. Fu, B. Graham, R. Bettati, and W. Zhao, "On effectiveness of link padding for statistical traffic analysis attacks, " in Proc. 23rd IEEE Int. Conf. Distributed Computing Systems (ICDCS '03), Washington, DC, 2003, p. 340.
-
(2003)
Proc. 23rd IEEE Int. Conf. Distributed Computing Systems (ICDCS '03)
, pp. 340
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
24
-
-
33846200876
-
Entropy based worm and anomaly detection in fast IP networks
-
in, Washington, DC
-
A. Wagner and B. Plattner, "Entropy based worm and anomaly detection in fast IP networks, " in Proc. 14th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, Washington, DC, 2005, pp. 172-177.
-
(2005)
Proc. 14th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
25
-
-
0043166339
-
Anomaly detection in IP networks
-
Aug
-
M. Thottan and C. Ji, "Anomaly detection in IP networks, " IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
26
-
-
26844499879
-
Statistical analysis of network traffic for adaptive faults detection
-
Sep
-
H. Hajji, "Statistical analysis of network traffic for adaptive faults detection, " IEEE Trans. Neural Netw., vol. 16, no. 5, pp. 1053-1063, Sep. 2005.
-
(2005)
IEEE Trans. Neural Netw.
, vol.16
, Issue.5
, pp. 1053-1063
-
-
Hajji, H.1
-
27
-
-
33847704184
-
K-Means+ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods
-
Mar
-
S. R. Gaddam and K. S. Balagani, "K-Means+ID3: A novel method for supervised anomaly detection by cascading K-Means clustering and ID3 decision tree learning methods, " IEEE Trans. Knowl. Data Eng., vol. 19, no. 3, pp. 345-354, Mar. 2007.
-
(2007)
IEEE Trans. Knowl. Data Eng.
, vol.19
, Issue.3
, pp. 345-354
-
-
Gaddam, S.R.1
Balagani, K.S.2
-
28
-
-
38149086666
-
Network anomaly detection using nonextensive entropy
-
Dec
-
A. Ziviani, M. L. Monsores, P. S. S. Rodrigues, and A. T. A. Gomes, "Network anomaly detection using nonextensive entropy, " IEEE Commun. Lett., vol. 11, no. 12, pp. 1034-1036, Dec. 2007.
-
(2007)
IEEE Commun. Lett.
, vol.11
, Issue.12
, pp. 1034-1036
-
-
Ziviani, A.1
Monsores, M.L.2
Rodrigues, P.S.S.3
Gomes, A.T.A.4
-
29
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
Jun
-
S. S. Kim and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data, " IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 562-575, Jun. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.3
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
30
-
-
65249118227
-
Network anomaly detection and classification via opportunistic sampling
-
Jan./Feb
-
G. Androulidakis, V. Chatzigiannakis, and S. Papavassiliou, "Network anomaly detection and classification via opportunistic sampling, " IEEE Network, vol. 23, no. 1, pp. 6-12, Jan./Feb. 2009.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 6-12
-
-
Androulidakis, G.1
Chatzigiannakis, V.2
Papavassiliou, S.3
-
33
-
-
77952653835
-
-
Master's thesis, Delft University of Technology, Delft, The Netherlands, Jun
-
S. M. Asmoredjo, "A Probabilistic Model for Cyber Attacks and Protection, " Master's thesis, Delft University of Technology, Delft, The Netherlands, Jun. 2005.
-
(2005)
"A Probabilistic Model for Cyber Attacks and Protection
-
-
Asmoredjo, S.M.1
-
34
-
-
77952612657
-
-
Master's thesis, Wake Forest University, Winston-Salem, NC, 27109
-
A. Schneider, "Methods of Internet Worm Propagation, " Master's thesis, Wake Forest University, Winston-Salem, NC, 2009, 27109.
-
(2009)
"Methods of Internet Worm Propagation
-
-
Schneider, A.1
-
35
-
-
77952629639
-
-
Analysis of the "SQL Slammer" Worm and Its Effects on Indiana University and Related Institutions Feb, Online. Available
-
G. Travis, E. Balas, D. A. J. Ripley, and S. Wallace, Analysis of the "SQL Slammer" Worm and Its Effects on Indiana University and Related Institutions Feb. 2003 [Online]. Available: http://paintsquirrel. ucs.indiana.edu/pdf/SLAMMER.pdf, pp. 1-18
-
(2003)
, pp. 1-18
-
-
Travis, G.1
Balas, E.2
Ripley, D.A.J.3
Wallace, S.4
-
36
-
-
31844457315
-
Worm evolution tracking via timing analysis
-
in, New York
-
M. Abu Rajab, F. Monrose, and A. Terzis, "Worm evolution tracking via timing analysis, " in Proc. 2005 ACM Workshop on Rapid Malcode (WORM '05), New York, 2005, pp. 52-59.
-
(2005)
Proc. 2005 ACM Workshop on Rapid Malcode (WORM '05)
, pp. 52-59
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
37
-
-
0035420120
-
The noise properties of stochastic processes and entropy production
-
B. C. Bag, S. K. Banik, and D. S. Ray, "The noise properties of stochastic processes and entropy production, " Phys. Rev. E, vol. 64, p. 026110, 2001.
-
(2001)
Phys. Rev. E
, vol.64
, pp. 026110
-
-
Bag, B.C.1
Banik, S.K.2
Ray, D.S.3
-
38
-
-
62949240334
-
Anomaly detection and visualization using Fisher discriminant clustering of network entropy
-
in, Nov
-
M. Celenk, T. Conley, J. Willis, and J. Graham, "Anomaly detection and visualization using Fisher discriminant clustering of network entropy, " in Proc. IEEE Third Int. Conf. Digital Information Management (ICDIM 2008), Nov. 2008, pp. 216-220.
-
(2008)
Proc. IEEE Third Int. Conf. Digital Information Management (ICDIM 2008)
, pp. 216-220
-
-
Celenk, M.1
Conley, T.2
Willis, J.3
Graham, J.4
-
41
-
-
69949188654
-
Tests for serial correlation in regression analysis based on the periodogram of least-squares residuals
-
Sep
-
W. L. Crum, "Tests for serial correlation in regression analysis based on the periodogram of least-squares residuals, " J. Amer. Statist. Assoc., vol. 18, no. 143, pp. 889-899, Sep. 1923.
-
(1923)
J. Amer. Statist. Assoc.
, vol.18
, Issue.143
, pp. 889-899
-
-
Crum, W.L.1
-
42
-
-
0003334194
-
The resemblance between the ordinate of the periodogram and the correlation coefficient
-
Mar
-
J. Durbin, "The resemblance between the ordinate of the periodogram and the correlation coefficient, " Biometrika, vol. 56, no. 1, pp. 1-15, Mar. 1969.
-
(1969)
Biometrika
, vol.56
, Issue.1
, pp. 1-15
-
-
Durbin, J.1
|