메뉴 건너뛰기




Volumn , Issue , 2010, Pages

URCA: Pulling out anomalies by their root causes

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION METHODS; DDOS ATTACK; PULLING OUT; ROOT CAUSE; ROOT CAUSE ANALYSIS; TRAFFIC ANOMALIES;

EID: 77953306333     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2010.5462151     Document Type: Conference Paper
Times cited : (52)

References (19)
  • 4
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • -, "Mining anomalies using traffic feature distributions," in Proceedings of SIGCOMM, August 2005, pp. 217-228.
    • Proceedings of SIGCOMM, August 2005 , pp. 217-228
  • 14
    • 1242310086 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proceedings of SIGCOMM, August 2003, pp. 137-148.
    • Proceedings of SIGCOMM, August 2003 , pp. 137-148
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 15
    • 14944356227 scopus 로고    scopus 로고
    • Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
    • Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund, "Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications," in Proceedings of IMC, October 2004, pp. 101-114.
    • Proceedings of IMC, October 2004 , pp. 101-114
    • Zhang, Y.1    Singh, S.2    Sen, S.3    Duffield, N.4    Lund, C.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.