-
2
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson V. Bro: a system for detecting network intruders in real-time. Computer Networks 1999;31%(23-24):2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
4
-
-
70450206702
-
Specification of the IP flow information export (IPFIX) Protocol for the exchange of IP traffic flow information
-
January
-
Claise B, Bryant S, Sadasivan G, Leinen S, Dietz T. Specification of the IP Flow Information Export (IPFIX) Protocol for the exchange of IP traffic flow information. RFC 5101, January 2008.
-
(2008)
RFC 5101
-
-
Claise, B.1
Bryant, S.2
Sadasivan, G.3
Leinen, S.4
Dietz, T.5
-
7
-
-
18144385431
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
Dallas, TX
-
Siris VA, Papagalou F. Application of anomaly detection algorithms for detecting SYN flooding attacks. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 04), Vol. 4, Dallas, TX, 2004;2050-2054.
-
(2004)
Proceedings of IEEE Global Telecommunications Conference (GLOBECOM 04)
, vol.4
, pp. 2050-2054
-
-
Siris, V.A.1
Papagalou, F.2
-
8
-
-
0037333205
-
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
-
Ye N, Vilbert S, Chen Q. Computer intrusion detection through EWMA for autocorrelated and uncorrelated data. IEEE Transactions on Reliability 2003;51(1):75-82.
-
(2003)
IEEE Transactions on Reliability
, vol.51
, Issue.1
, pp. 75-82
-
-
Ye, N.1
Vilbert, S.2
Chen, Q.3
-
10
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Krishnamurthy B, Sen S, Zhang Y, Chen Y. Sketch-based change detection: methods, evaluation, and applications. In Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement (IMC 03), 2003;234-247.
-
(2003)
Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement (IMC 03)
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
11
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
Li X, Bian F, Crovella M, Diot C., Govindan R, Iannaccone G, Lakhina A. Detection and identification of network anomalies using sketch subspaces. In Proceedings of the 6th ACMSIGCOMM on Internet Measurement (IMC 06), 2006;147-152.
-
(2006)
Proceedings of the 6th ACMSIGCOMM on Internet Measurement (IMC 06)
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
12
-
-
14844367057
-
An improved data stream summary: The Count-Min sketch and its applications
-
Cormode G, Muthukrishnan S. An improved data stream summary: the Count-Min sketch and its applications. Journal of Algorithms 2005;55(1):58-75.
-
(2005)
Journal of Algorithms
, vol.55
, Issue.1
, pp. 58-75
-
-
Cormode, G.1
Muthukrishnan, S.2
-
13
-
-
33746983029
-
Detection of intrusion in information systems by sequential change-point methods
-
Tartakovsky A, Rozovskii B, Blazek R, Kim H. Detection of intrusion in information systems by sequential change-point methods. Statistical Methodology 2006;3(3):252-340.
-
(2006)
Statistical Methodology
, vol.3
, Issue.3
, pp. 252-340
-
-
Tartakovsky, A.1
Rozovskii, B.2
Blazek, R.3
Kim, H.4
-
16
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
Nychis G, Sekar V, Andersen DG, Kim H, Zhang H. An empirical evaluation of entropy-based traffic anomaly detection. In Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement (IMC 08), 2008;151-156.
-
(2008)
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement (IMC 08)
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
19
-
-
84954358597
-
Traffic flooding attack detection with SNMP MIB using SVM
-
Yu J, Lee H, Kim M-S, Park D. Traffic flooding attack detection with SNMP MIB using SVM. Computer Communications 2008;31(17):4212-4219.
-
(2008)
Computer Communications
, vol.31
, Issue.17
, pp. 4212-4219
-
-
Yu, J.1
Lee, H.2
Kim, M.-S.3
Park, D.4
-
20
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 04), 2004;219-230.
-
(2004)
Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM 04)
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
22
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Zhang Y, Singh S, Sen S, Duffield N, Lund C. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In IMC 04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, 2004;101-114.
-
(2004)
IMC 04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
24
-
-
34249780184
-
Reverse hashing for high-speed network monitoring: Algorithms, evaluation, and applications
-
April
-
Schweller R, Li Z, Chen Y, Gao Y, Gupta A, Parsons E, Zhang Y, Dinda P, Kao M-Y, Memik G. Reverse hashing for high-speed network monitoring: algorithms, evaluation, and applications. In Proceedings of IEEE International Conference on Computer Communications (INFOCOM '06), April 2006;1-12.
-
(2006)
Proceedings of IEEE International Conference on Computer Communications (INFOCOM '06)
, pp. 1-12
-
-
Schweller, R.1
Li, Z.2
Chen, Y.3
Gao, Y.4
Gupta, A.5
Parsons, E.6
Zhang, Y.7
Dinda, P.8
Kao, M.-Y.9
Memik, G.10
-
25
-
-
36148989956
-
Reversible sketches: Enabling monitoring and analysis over high-speed data streams
-
Schweller R, Li Z, Chen Y, Gao Y, Gupta A, Zhang Y, Dinda P, Kao M-Y, Memik G. Reversible sketches: enabling monitoring and analysis over high-speed data streams. IEEE/ACM Transactions on Networking 2007;15(5):1059-1072.
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.5
, pp. 1059-1072
-
-
Schweller, R.1
Li, Z.2
Chen, Y.3
Gao, Y.4
Gupta, A.5
Zhang, Y.6
Dinda, P.7
Kao, M.-Y.8
Memik, G.9
-
33
-
-
28444447116
-
A new approach for early detection of internet worms based on connection degree
-
Guangzhou, China
-
Bo C., Fang B-X, Yun X-C. A new approach for early detection of Internet worms based on connection degree. In Proceedings of the 2005 International Conference on Machine Learning and Cybernetics, Guangzhou, China, 2005;2424-2430.
-
(2005)
Proceedings of the 2005 International Conference on Machine Learning and Cybernetics
, pp. 2424-2430
-
-
Bo, C.1
Fang, B.-X.2
Yun, X.-C.3
-
39
-
-
38549179979
-
Combating against attacks on encrypted protocols
-
Fadlullah Z, Taleb T, Ansari N, Hashimoto K, Miyake Y, Nemoto Y, Kato N. Combating against attacks on encrypted protocols. In Proceedings of the IEEE International Conference on Communications, 2007 (ICC07), 2007;1211-1216.
-
(2007)
Proceedings of the IEEE International Conference on Communications, 2007 (ICC07)
, pp. 1211-1216
-
-
Fadlullah, Z.1
Taleb, T.2
Ansari, N.3
Hashimoto, K.4
Miyake, Y.5
Nemoto, Y.6
Kato, N.7
-
41
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
Brauckhoff D, Tellenbach B, Wagner A, May M, Lakhina A. Impact of packet sampling on anomaly detection metrics. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement (IMC 06), 2006;159-164.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC 06)
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
42
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
Mai J, Chuah C-N, Sridharan A, Ye T, Zang H. Is sampled data sufficient for anomaly detection? In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC 06), 2006;165-176.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC 06)
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
43
-
-
46349085574
-
A study on detecting network anomalies using sampled flow statistics
-
Kawahara R, Mori T, Kamiyama N, Harada S, Asano S. A study on detecting network anomalies using sampled flow statistics. In Proceedings of the International Symposium on Applications and the Internet Workshops, 2007.
-
(2007)
Proceedings of the International Symposium on Applications and the Internet Workshops
-
-
Kawahara, R.1
Mori, T.2
Kamiyama, N.3
Harada, S.4
Asano, S.5
-
45
-
-
65249118227
-
Network anomaly detection and classification via opportunistic sampling
-
Androulidakis G, Chatzigiannakis V, Papavassiliou S. Network anomaly detection and classification via opportunistic sampling. IEEE Network 2009;23(1):6-12.
-
(2009)
IEEE Network
, vol.23
, Issue.1
, pp. 6-12
-
-
Androulidakis, G.1
Chatzigiannakis, V.2
Papavassiliou, S.3
-
46
-
-
42149164334
-
Improving network anomaly detection via selective flow-based sampling
-
Androulidakis G, Papavassiliou S. Improving network anomaly detection via selective flow-based sampling. IET Communications Journal 2008;2(3):399-409.
-
(2008)
IET Communications Journal
, vol.2
, Issue.3
, pp. 399-409
-
-
Androulidakis, G.1
Papavassiliou, S.2
-
48
-
-
8344272783
-
What's new: Finding significant differences in network data streams
-
Cormode G, Muthukrishnan S. What's new: finding significant differences in network data streams. In Proceedings of IEEE Infocom, 2004;1534-1545.
-
(2004)
Proceedings of IEEE Infocom
, pp. 1534-1545
-
-
Cormode, G.1
Muthukrishnan, S.2
-
51
-
-
62949129764
-
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
-
Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures. In Proceedings of the ACM SIGCOMM Workshop on Large-Scale Attack Defense (LSAD07), 2007.
-
(2007)
Proceedings of the ACM SIGCOMM Workshop on Large-Scale Attack Defense (LSAD07)
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
53
-
-
72349083803
-
Detection and localization of change points in high-dimensional network traffic data
-
Levy-Leduc C., Roueff F. Detection and localization of change points in high-dimensional network traffic data. Annals of Applied Statistics, 2009;3(2):637-662.
-
(2009)
Annals of Applied Statistics
, vol.3
, Issue.2
, pp. 637-662
-
-
Levy-Leduc, C.1
Roueff, F.2
-
54
-
-
84888470618
-
Load shedding in network monitoring applications
-
Barlet-Ros P, Iannaccone G, Sanjuàs-Cuxart J, Amores-Lopez D, Solé-Pareta J. Load shedding in network monitoring applications. In Proceedings of the USENIX Annual Technical Conference (ATC 07), 2007;1-14.
-
(2007)
Proceedings of the USENIX Annual Technical Conference (ATC 07)
, pp. 1-14
-
-
Barlet-Ros, P.1
Iannaccone, G.2
Sanjuàs-Cuxart, J.3
Amores-Lopez, D.4
Solé-Pareta, J.5
-
56
-
-
77956388996
-
-
Optimized RC4 code. Available:, 9 July
-
Optimized RC4 code. Available: http://www.zengl.net/freeswan/[9 July 2010].
-
(2010)
-
-
-
57
-
-
77956387838
-
-
Count-Min sketch source code. Available:, 9 July
-
Count-Min sketch source code. Available: http://www.cs.rutgers.edu/muthu/ massdal-code-index.html [9 July 2010].
-
(2010)
-
-
-
58
-
-
77956382996
-
-
MAWI working group traffic archive
-
MAWI working group traffic archive. http://mawi.wide.ad.jp/mawi/.
-
-
-
|