메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Unsupervised ensemble anomaly detection through time-periodical packet sampling

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; ANOMALY DETECTION METHODS; BASELINE MODELS; CONVENTIONAL METHODS; FALSE NEGATIVE RATE; FALSE POSITIVE; LOSSY NATURE; NETWORK TRAFFIC; NORMAL BEHAVIOR; PACKET SAMPLING; PERFORMANCE VARIATIONS; REAL TRAFFIC; TRAFFIC DATA;

EID: 77953880481     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOMW.2010.5466662     Document Type: Conference Paper
Times cited : (7)

References (31)
  • 2
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • August
    • A. Patcha and J. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Computer Networks, vol. 51, no. 12, August 2007.
    • (2007) Computer Networks , vol.51 , Issue.12
    • Patcha, A.1    Park, J.2
  • 7
    • 84876132288 scopus 로고    scopus 로고
    • "InMon sFlow Probe," http://www.inmon.com/technology/index.php.
    • InMon sFlow Probe
  • 8
    • 84871993728 scopus 로고    scopus 로고
    • "Cisco NetFlow," http://www.cisco.com/web/go/netflow.
    • Cisco NetFlow
  • 10
    • 77953883296 scopus 로고    scopus 로고
    • "Snort," http://www.snort.org.
  • 11
    • 77953881877 scopus 로고    scopus 로고
    • "Bro," http://bro-ids.org.
  • 12
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • May
    • V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting syn flooding attacks," Computer Communications, vol. 29, no. 9, pp. 1433-1442, May 2006.
    • (2006) Computer Communications , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2
  • 16
    • 65249105995 scopus 로고    scopus 로고
    • Accurate anomaly detection through parallelism
    • January/February
    • S. Shanbhag and T. Wolf, "Accurate anomaly detection through parallelism," IEEE Network, vol. 23, no. 1, pp. 22-28, January/February 2009.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 22-28
    • Shanbhag, S.1    Wolf, T.2
  • 17
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • October
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 217-228, October 2005.
    • (2005) ACM SIGCOMM Computer Communication Review , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 18
    • 16344383315 scopus 로고    scopus 로고
    • Sampling for passive internet measurement: A review
    • N. Duffield, "Sampling for passive internet measurement: A review," Statistical Science, vol. 19, no. 3, pp. 472-498, 2004.
    • (2004) Statistical Science , vol.19 , Issue.3 , pp. 472-498
    • Duffield, N.1
  • 19
    • 28044462686 scopus 로고    scopus 로고
    • Estimating flow distributions from sampled flow statistics
    • October
    • N. Duffield, C. Lund, and M. Thorup, "Estimating flow distributions from sampled flow statistics," IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 933-946, October 2005.
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.5 , pp. 933-946
    • Duffield, N.1    Lund, C.2    Thorup, M.3
  • 24
    • 65249118227 scopus 로고    scopus 로고
    • Network anomaly detection and classification via opportunistic sampling
    • January/February
    • G. Androulidakis, V. Chatzigiannakis, and S. Papavassiliou, "Network anomaly detection and classification via opportunistic sampling," IEEE Network, vol. 23, no. 1, pp. 6-12, January/February 2009.
    • (2009) IEEE Network , vol.23 , Issue.1 , pp. 6-12
    • Androulidakis, G.1    Chatzigiannakis, V.2    Papavassiliou, S.3
  • 25
    • 84890503292 scopus 로고
    • Application of sampling methodologies to network traffic characterization
    • October
    • K. C. Claffy, G. C. Polyzos, and H.-W. Braun, "Application of sampling methodologies to network traffic characterization," ACM SIGCOMM Computer Communication Review, vol. 23, no. 4, pp. 194-203, October 1993.
    • (1993) ACM SIGCOMM Computer Communication Review , vol.23 , Issue.4 , pp. 194-203
    • Claffy, K.C.1    Polyzos, G.C.2    Braun, H.-W.3
  • 27
    • 0030211964 scopus 로고    scopus 로고
    • Bagging predictors
    • August
    • L. Breiman, "Bagging predictors," Machine Learning, vol. 24, no. 2, pp. 123-140, August 1996.
    • (1996) Machine Learning , vol.24 , Issue.2 , pp. 123-140
    • Breiman, L.1
  • 28
    • 0025448521 scopus 로고
    • The strength of weak learnability
    • June
    • R. E. Schapire, "The strength of weak learnability," Machine Learning, vol. 5, no. 2, pp. 197-227, June 1990.
    • (1990) Machine Learning , vol.5 , Issue.2 , pp. 197-227
    • Schapire, R.E.1
  • 30
    • 54249116402 scopus 로고    scopus 로고
    • Design of an unsupervised weight parameter estimation method in ensemble learning
    • June
    • M. Uchida, Y. Maehara, and H. Shioya, "Design of an unsupervised weight parameter estimation method in ensemble learning," Lecture Notes in Computer Science, vol. 4984, pp. 771-780, June 2008.
    • (2008) Lecture Notes in Computer Science , vol.4984 , pp. 771-780
    • Uchida, M.1    Maehara, Y.2    Shioya, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.