-
1
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in Proceedings of IMW, November 2002, pp. 71-82.
-
Proceedings of IMW, November 2002
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
2
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: methods, evaluation, and applications," in Proceedings of IMC, October 2003, pp. 234-247.
-
Proceedings of IMC, October 2003
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
3
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," in Proceedings of SIGCOMM, August 2004, pp. 219-230.
-
Proceedings of SIGCOMM, August 2004
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
4
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
-, "Mining anomalies using traffic feature distributions," in Proceedings of SIGCOMM, August 2005, pp. 217-228.
-
Proceedings of SIGCOMM, August 2005
, pp. 217-228
-
-
-
5
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
A. Soule, K. Salamatian, and N. Taft, "Combining filtering and statistical methods for anomaly detection," in Proceedings of IMC, October 2005, pp. 331-344.
-
Proceedings of IMC, October 2005
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
6
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina, "Detection and identification of network anomalies using sketch subspaces," in Proceedings of IMC, October 2006, pp. 147-152.
-
Proceedings of IMC, October 2006
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
7
-
-
63049084484
-
An empirical evaluation of entropy-based anomaly detection
-
G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang, "An empirical evaluation of entropy-based anomaly detection," in Proceedings of IMC, October 2008, pp. 151-156.
-
Proceedings of IMC, October 2008
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
8
-
-
77953296380
-
-
Thomson, Tech. Rep. CR-PRL-2009-02-0001
-
F. Silveira, C. Diot, N. Taft, and R. Govindan, "Detecting correlated anomalous flows," Thomson, Tech. Rep. CR-PRL-2009-02-0001, 2009.
-
(2009)
Detecting Correlated Anomalous Flows
-
-
Silveira, F.1
Diot, C.2
Taft, N.3
Govindan, R.4
-
10
-
-
1542300243
-
An analysis of BGP multiple origin AS (MOAS) conflicts
-
X. Zhao, D. Pei, L. Wang, D. Massey, A. Mankin, S. F. Wu, and L. Zhang, "An analysis of BGP multiple origin AS (MOAS) conflicts," in Proceedings of IMW, 2001, pp. 31-35.
-
Proceedings of IMW, 2001
, pp. 31-35
-
-
Zhao, X.1
Pei, D.2
Wang, L.3
Massey, D.4
Mankin, A.5
Wu, S.F.6
Zhang, L.7
-
11
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: multilevel traffic classification in the dark," in Proceedings of SIGCOMM, August 2005, pp. 229-240.
-
Proceedings of SIGCOMM, August 2005
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
12
-
-
84893405732
-
Data clustering: A review
-
A. K. Jain, M. N. Murty, and P. J. Flynn, "Data clustering: a review," ACM Computing Surveys, vol. 31, no. 3, pp. 264-323, 1999.
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
13
-
-
77955418559
-
Uncovering artifacts of flow measurement tools
-
I. Cunha, F. Silveira, R. Oliveira, R. Teixeira, and C. Diot, "Uncovering artifacts of flow measurement tools," in Proceedings of PAM, April 2009.
-
Proceedings of PAM, April 2009
-
-
Cunha, I.1
Silveira, F.2
Oliveira, R.3
Teixeira, R.4
Diot, C.5
-
14
-
-
1242310086
-
Automatically inferring patterns of resource consumption in network traffic
-
C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proceedings of SIGCOMM, August 2003, pp. 137-148.
-
Proceedings of SIGCOMM, August 2003
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
15
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund, "Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications," in Proceedings of IMC, October 2004, pp. 101-114.
-
Proceedings of IMC, October 2004
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
16
-
-
3142735161
-
Diamond in the rough: Finding hierarchical heavy hitters in multi-dimensional data
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, "Diamond in the rough: finding hierarchical heavy hitters in multi-dimensional data," in Proceedings of SIGMOD, 2004, pp. 155-166.
-
Proceedings of SIGMOD, 2004
, pp. 155-166
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
17
-
-
11244259702
-
-
UC Berkeley, Tech. Rep.
-
M. Caesar, L. Subramanian, and R. H. Katz, "Towards localizing root causes of BGP dynamics," UC Berkeley, Tech. Rep., 2003.
-
(2003)
Towards Localizing Root Causes of BGP Dynamics
-
-
Caesar, M.1
Subramanian, L.2
Katz, R.H.3
-
18
-
-
21844445354
-
Locating Internet routing instabilities
-
A. Feldmann, O. Maennel, Z. M. Mao, A. Berger, and B. Maggs, "Locating Internet routing instabilities," SIGCOMM Computer Communication Review, vol. 34, no. 4, pp. 205-218, 2004.
-
(2004)
SIGCOMM Computer Communication Review
, vol.34
, Issue.4
, pp. 205-218
-
-
Feldmann, A.1
Maennel, O.2
Mao, Z.M.3
Berger, A.4
Maggs, B.5
|