메뉴 건너뛰기




Volumn , Issue , 2009, Pages 28-34

Anomaly extraction in backbone networks using association rules

Author keywords

Anomaly extraction; Association rules; Histogram cloning

Indexed keywords

ANOMALOUS EVENTS; ANOMALY DETECTION; ANOMALY DETECTOR; BACK-BONE NETWORK; FALSE POSITIVE; ORDERS OF MAGNITUDE; ROOT CAUSE ANALYSIS; TRAFFIC DATA;

EID: 77956376882     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1644893.1644897     Document Type: Conference Paper
Times cited : (66)

References (23)
  • 1
    • 0001882616 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • September 12-15, Santiago de Chile, Chile, Morgan Kaufmann, 1994
    • R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB'94, Proceedings of 20th International Conference on Very Large Data Bases, September 12-15, 1994, Santiago de Chile, Chile, pages 487-499. Morgan Kaufmann, 1994.
    • (1994) VLDB'94, Proceedings of 20th International Conference on Very Large Data Bases , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 5
    • 34547803269 scopus 로고    scopus 로고
    • Summarization - compressing data into an informative representation
    • V. Chandola and V. Kumar. Summarization - compressing data into an informative representation. Knowl. Inf. Syst., 12:355-378, 2007.
    • (2007) Knowl. Inf. Syst. , vol.12 , pp. 355-378
    • Chandola, V.1    Kumar, V.2
  • 10
    • 65249128484 scopus 로고    scopus 로고
    • What's going on?: Learning communication rules in edge networks
    • S. Kandula, R. Chandra, and D. Katabi. What's going on?: learning communication rules in edge networks. In SIGCOMM, pages 87-98, 2008.
    • (2008) SIGCOMM , pp. 87-98
    • Kandula, S.1    Chandra, R.2    Katabi, D.3
  • 17
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3:262-294, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur , vol.3 , pp. 262-294
    • McHugh, J.1
  • 18
    • 67650330261 scopus 로고    scopus 로고
    • Scan surveillance in internet networks
    • K. H. Ramah, K. Salamatian, and F. Kamoun. Scan surveillance in internet networks. In Networking, pages 614-625, 2009.
    • (2009) Networking , pp. 614-625
    • Ramah, K.H.1    Salamatian, K.2    Kamoun, F.3
  • 19
    • 34548301939 scopus 로고    scopus 로고
    • Dowitcher: Effective worm detection and containment in the internet core
    • S. Ranjan, S. Shah, A. Nucci, M. M. Munafò, R. L. Cruz, and S. M. Muthukrishnan. Dowitcher: Effective worm detection and containment in the internet core. In INFOCOM, pages 2541-2545, 2007.
    • (2007) INFOCOM , pp. 2541-2545
    • Ranjan, S.1    Shah, S.2    Nucci, A.3    Munafò, M.M.4    Cruz, R.L.5    Muthukrishnan, S.M.6
  • 20
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • Berkeley, California, USA, October 19-21, USENIX Association, 2005
    • A. Soule, K. Salamatian, and N. Taft. Combining filtering and statistical methods for anomaly detection. In IMC'05: Proceedings of the 5th Conference on Internet Measurement 2005, Berkeley, California, USA, October 19-21, 2005, pages 331-344. USENIX Association, 2005.
    • (2005) IMC'05: Proceedings of the 5th Conference on Internet Measurement 2005 , pp. 331-344
    • Soule, A.1    Salamatian, K.2    Taft, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.