메뉴 건너뛰기




Volumn 20, Issue 5, 2010, Pages 317-337

Unsupervised host behavior classification from connection patterns

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; BIDIRECTIONALITY; CLUSTERING TECHNIQUES; CONNECTION PATTERNS; CROSS VALIDATION; DATA SHARING; FEATURE SPACE; HOST BEHAVIORS; IN-NETWORK MANAGEMENT; INTERNET CONNECTIVITY; MINIMUM SPANNING TREES; NETWORK COMMUNICATIONS; OPERATIONAL CONSTRAINTS; PACKET PAYLOADS; STATE-OF-THE-ART METHODS; STATISTICAL CLASSIFICATION; TRAFFIC CLASSIFICATION; TRAFFIC MONITORING; UNSUPERVISED CLASSIFICATION;

EID: 77956384873     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.750     Document Type: Article
Times cited : (30)

References (36)
  • 2
    • 38049121051 scopus 로고    scopus 로고
    • Early recognition of encrypted applications
    • April
    • Bernaille L, Teixeira R. Early recognition of encrypted applications. In PAM 2007, April 2007;165-175.
    • (2007) PAM 2007 , pp. 165-175
    • Bernaille, L.1    Teixeira, R.2
  • 3
    • 33244467936 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • June
    • Moore AW, Zuev D. Internet traffic classification using Bayesian analysis techniques. In ACM SIGMETRICS 05, June 2005;50-60.
    • (2005) ACM SIGMETRICS 05 , pp. 50-60
    • Moore, A.W.1    Zuev, D.2
  • 4
    • 37249023319 scopus 로고    scopus 로고
    • A comparative study of unsupervised machine learning and data mining techniques for intrusion detection
    • Sadoddin R, Ghorbani AA. A comparative study of unsupervised machine learning and data mining techniques for intrusion detection. In MLDM 07, 2007;404-418.
    • (2007) MLDM 07 , pp. 404-418
    • Sadoddin, R.1    Ghorbani, A.A.2
  • 5
    • 32344452166 scopus 로고    scopus 로고
    • A comparative study of anomaly detection schemes in network intrusion detection
    • Lazarevic A, Ozgur A, Ertoz L, Srivastava J, Kumar V. A comparative study of anomaly detection schemes in network intrusion detection. In SIAM 03, 2003.
    • (2003) SIAM 03
    • Lazarevic, A.1    Ozgur, A.2    Ertoz, L.3    Srivastava, J.4    Kumar, V.5
  • 9
  • 11
    • 49749084901 scopus 로고    scopus 로고
    • Heuristics to classify internet backbone traffic based on connection patterns
    • January
    • John W, Tafvelin S. Heuristics to classify Internet backbone traffic based on connection patterns. In ICOIN 08, January 2008.
    • (2008) ICOIN 08
    • John, W.1    Tafvelin, S.2
  • 12
    • 65249141597 scopus 로고    scopus 로고
    • Unconstrained endpoint profiling (googling the internet)
    • August
    • Trestian I, Ranjan S, Kuzmanovic A, Nucci A. Unconstrained endpoint profiling (Googling the Internet). In ACM SIGCOMM 08, August 2008;279-290.
    • (2008) ACM SIGCOMM 08 , pp. 279-290
    • Trestian, I.1    Ranjan, S.2    Kuzmanovic, A.3    Nucci, A.4
  • 13
    • 70349684725 scopus 로고    scopus 로고
    • Seven years and one day: Sketching the evolution of internet traffic
    • April
    • Borgnat P, Dewaele G, Fukuda K, Abry P, Cho K. Seven years and one day: sketching the evolution of Internet traffic. In IEEE INFOCOM 2009, April 2009;711-719.
    • (2009) IEEE INFOCOM 2009 , pp. 711-719
    • Borgnat, P.1    Dewaele, G.2    Fukuda, K.3    Abry, P.4    Cho, K.5
  • 14
    • 60949108379 scopus 로고    scopus 로고
    • Passive network forensics: Behavioural classification of network hosts based on connection patterns
    • McHugh J, McLeod R, Nagaonkar V. Passive network forensics: behavioural classification of network hosts based on connection patterns. ACM SIGOPS Operating Systems Review 2008;42(3):99-111.
    • (2008) ACM SIGOPS Operating Systems Review , vol.42 , Issue.3 , pp. 99-111
    • McHugh, J.1    McLeod, R.2    Nagaonkar, V.3
  • 15
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • Xu K, Zhang Z-L, Bhattacharyya S. Profiling Internet backbone traffic: behavior models and applications. In ACM SIGCOMM 05, 2005;169-180.
    • (2005) ACM SIGCOMM 05 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 17
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • August
    • Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In ACM SIGCOMM 05, August 2005;217-228.
    • (2005) ACM SIGCOMM 05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 18
    • 70350473045 scopus 로고    scopus 로고
    • Analysis of internet backbone traffic and header anomalies observed
    • October
    • John W, Tafvelin S. Analysis of Internet backbone traffic and header anomalies observed. In ACM IMC 07, October 2007.
    • (2007) ACM IMC 07
    • John, W.1    Tafvelin, S.2
  • 20
    • 70349658648 scopus 로고    scopus 로고
    • Tracking cardinality distributions in network traffic
    • April
    • Chen A, Li LE, Cao J. Tracking cardinality distributions in network traffic. In IEEE INFOCOM 2009, April 2009;819-827.
    • (2009) IEEE INFOCOM 2009 , pp. 819-827
    • Chen, A.1    Li, L.E.2    Cao, J.3
  • 21
    • 33845633068 scopus 로고    scopus 로고
    • Sketch guided sampling: Using on-line estimates of flow size for adaptive data collection
    • April
    • Kumar A, Xu J. Sketch guided sampling: using on-line estimates of flow size for adaptive data collection. In IEEE INFOCOM 2006, April 2006.
    • (2006) IEEE INFOCOM 2006
    • Kumar, A.1    Xu, J.2
  • 23
    • 0002726668 scopus 로고
    • On the history of the minimum spanning tree problem
    • Graham RL, Hell P. On the history of the minimum spanning tree problem. Annals of the History of Computing 1985;7(1):43-57.
    • (1985) Annals of the History of Computing , vol.7 , Issue.1 , pp. 43-57
    • Graham, R.L.1    Hell, P.2
  • 24
    • 77956392015 scopus 로고    scopus 로고
    • Dual rooted-diffusions for clustering and classification on manifolds
    • May
    • Grikschat S, Costa JA, Hero AO, Michel O. Dual rooted-diffusions for clustering and classification on manifolds. In IEEE ICASSP 06, May 2006.
    • (2006) IEEE ICASSP 06
    • Grikschat, S.1    Costa, J.A.2    Hero, A.O.3    Michel, O.4
  • 26
    • 0033184661 scopus 로고    scopus 로고
    • Theory of greedy approximations to minimal k-point random graphs
    • Hero AO, Michel O. theory of greedy approximations to minimal k-point random graphs. IEEE Transactions on Information Theory 1999;45:1921-1939.
    • (1999) IEEE Transactions on Information Theory , vol.45 , pp. 1921-1939
    • Hero, A.O.1    Michel, O.2
  • 28
    • 67349225775 scopus 로고    scopus 로고
    • Some properties of rènyi entropy and rènyi entropy rate
    • Golshani L, Pasha E, Yari G. Some properties of Rènyi entropy and Rènyi entropy rate. Information Sciences 2009;179:2426-2433.
    • (2009) Information Sciences , vol.179 , pp. 2426-2433
    • Golshani, L.1    Pasha, E.2    Yari, G.3
  • 29
    • 0043130613 scopus 로고    scopus 로고
    • Identification of regulatory binding sites using minimum spanning trees
    • Lihue, HI
    • Olman V, Xu D, Xu Y. Identification of regulatory binding sites using minimum spanning trees. In Proceedings of the 8th Pacific Symposium on Biocomputing, Vol. 3, Lihue, HI, 2003;327-338.
    • (2003) Proceedings of the 8th Pacific Symposium on Biocomputing , vol.3 , pp. 327-338
    • Olman, V.1    Xu, D.2    Xu, Y.3
  • 31
    • 33746476985 scopus 로고    scopus 로고
    • Diffusion maps and coarse-graining: A unified framework for dimensionality reduction, graph partitioning and data set parameterization
    • Lafon S, Lee AB. Diffusion maps and coarse-graining: a unified framework for dimensionality reduction, graph partitioning and data set parameterization. IEEE Transactions on Pattern Analysis and Machine Intelligence 2006;28(9):1393-1403.
    • (2006) IEEE Transactions on Pattern Analysis and Machine Intelligence , vol.28 , Issue.9 , pp. 1393-1403
    • Lafon, S.1    Lee, A.B.2
  • 32
    • 77956391797 scopus 로고    scopus 로고
    • Initialization free graph based clustering
    • Laboratoire I3S, CNRS, Universitè de Nice-Sophia Antipolis, France
    • Galluccio L, Michel O, Comon P, Slezak E, Hero AO. Initialization free graph based clustering. Tech. Rep. I3S/RR-2009-08-FR, Laboratoire I3S, CNRS, Universitè de Nice-Sophia Antipolis, France, 2009.
    • (2009) Tech. Rep. I3S/RR-2009-08-FR
    • Galluccio, L.1    Michel, O.2    Comon, P.3    Slezak, E.4    Hero, A.O.5
  • 34
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure
    • August
    • Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure. In ACM SIGCOMM LSAD 07, August 2007;145-152.
    • (2007) ACM SIGCOMM LSAD 07 , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 35
    • 77956370129 scopus 로고    scopus 로고
    • Akerman R. 2007. Ports for Internet services. Available:, 17 July
    • Akerman R. 2007. Ports for Internet services. Available: http://www.chebucto.ns.ca/~rakerman/porttable.html [17 July 2020].
    • (2020)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.