메뉴 건너뛰기




Volumn 20, Issue 5, 2010, Pages 295-316

An evaluation of automatic parameter tuning of a statistics-based anomaly detection algorithm

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION METHODS; ANOMALY-DETECTION ALGORITHMS; AUTOMATIC TUNING; DETECTION PERFORMANCE; DYNAMIC PARAMETERS; DYNAMIC TUNING; FIXED PARAMETERS; GAMMA MODELS; JAPAN STANDARD TIME; MULTISCALES; NETWORK TRAFFIC; PARAMETER LEARNING; PARAMETER PREDICTION; PARAMETER SETTING; PARAMETER-TUNING; PERIODIC CORRELATION; REAL TRAFFIC; REAL-TIME DETECTION; UNSUPERVISED METHOD;

EID: 77956385147     PISSN: 10557148     EISSN: 10991190     Source Type: Journal    
DOI: 10.1002/nem.749     Document Type: Article
Times cited : (6)

References (22)
  • 1
    • 85090433665 scopus 로고    scopus 로고
    • Snort: Lightweight intrusion detection for networks
    • November
    • Roesch M. Snort: lightweight intrusion detection for networks. In USENIX LISA 99, November 1999;229-238.
    • (1999) USENIX LISA 99 , pp. 229-238
    • Roesch, M.1
  • 2
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • December
    • Brutlag J. Aberrant behavior detection in time series for network monitoring. In USENIX LISA 00, December 2000;139-146.
    • (2000) USENIX LISA 00 , pp. 139-146
    • Brutlag, J.1
  • 3
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • November
    • Barford P, Kline J, Plonka D, Ron A. A signal analysis of network traffic anomalies. In ACM IMW 02, November 2002;71-82.
    • (2002) ACM IMW 02 , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 4
    • 14944367082 scopus 로고    scopus 로고
    • Sketch-based change detection: Methods evaluation and applications
    • October
    • Krishnamurty B, Sen S, Zhang Y, Chen Y. Sketch-based change detection: methods evaluation and applications. In ACM IMC 03, October 2003;234-247.
    • (2003) ACM IMC 03 , pp. 234-247
    • Krishnamurty, B.1    Sen, S.2    Zhang, Y.3    Chen, Y.4
  • 5
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • August
    • Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In ACM SIGCOMM 04, August 2004;219-230.
    • (2004) ACM SIGCOMM 04 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 6
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • October
    • Soule A, Salamatian K, Taft N. Combining filtering and statistical methods for anomaly detection. In ACM IMC 05, October 2005;331-344.
    • (2005) ACM IMC 05 , pp. 331-344
    • Soule, A.1    Salamatian, K.2    Taft, N.3
  • 7
    • 84878701863 scopus 로고    scopus 로고
    • Detecting anomalies in network traffic using maximum entropy estimation
    • October
    • Gu Y, McCallum A, Towsley D. Detecting anomalies in network traffic using maximum entropy estimation. In ACM IMC 05, October 2005;345-350.
    • (2005) ACM IMC 05 , pp. 345-350
    • Gu, Y.1    McCallum, A.2    Towsley, D.3
  • 9
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure
    • August
    • Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure. In ACM SIGCOMM 07: LSAD Workshop, August 2007;145-152.
    • (2007) ACM SIGCOMM 07: LSAD Workshop , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 10
    • 43949111011 scopus 로고    scopus 로고
    • A two-layered anomaly detection technique based on multi-modal flow behavior models
    • April
    • Stoeklin MP, Boudec JYL, Kind A. A two-layered anomaly detection technique based on multi-modal flow behavior models. In PAM 2008, April 2008;212-221.
    • (2008) PAM 2008 , pp. 212-221
    • Stoeklin, M.P.1    Boudec, J.Y.L.2    Kind, A.3
  • 11
    • 77956376882 scopus 로고    scopus 로고
    • Anomaly extraction in backbone networks using association rules
    • November
    • Brauckhoff D, Wagner A, Dimitropoulos X, Salamatian K. Anomaly extraction in backbone networks using association rules. In ACM IMC 09, November 2009;28-34.
    • (2009) ACM IMC 09 , pp. 28-34
    • Brauckhoff, D.1    Wagner, A.2    Dimitropoulos, X.3    Salamatian, K.4
  • 13
    • 70449501437 scopus 로고    scopus 로고
    • An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm
    • June
    • Himura Y, Fukuda K, Cho K, Esaki H. An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm. In IEEE ICC 2009, June 2009;6.
    • (2009) IEEE ICC 2009 , pp. 6
    • Himura, Y.1    Fukuda, K.2    Cho, K.3    Esaki, H.4
  • 14
    • 77951544397 scopus 로고    scopus 로고
    • A distribution-based approach to anomaly detection for 3G mobile networks
    • November-December
    • D Alconzo A, Coluccia A, Ricciato F, Maierhofer PR. A distribution-based approach to anomaly detection for 3G mobile networks. In IEEE GLOBECOM 2009, November-December 2009;8.
    • (2009) IEEE GLOBECOM 2009 , pp. 8
    • D Alconzo, A.1    Coluccia, A.2    Ricciato, F.3    Maierhofer, P.R.4
  • 18
    • 33750305627 scopus 로고    scopus 로고
    • A day in the life of the internet: Proposed community-wide experiment
    • Claffy KC. A day in the life of the Internet: proposed community-wide experiment. In ACM SIGCOMM Computer Communication Review 2006;36(2):39-40.
    • (2006) ACM SIGCOMM Computer Communication Review , vol.36 , Issue.2 , pp. 39-40
    • Claffy, K.C.1
  • 19
    • 70349684725 scopus 로고    scopus 로고
    • Seven years and one day: Sketching the evolution of internet traffic
    • April
    • Borgnat P, Dewaele G, Fukuda K, Abry P, Cho K. Seven years and one day: sketching the evolution of Internet traffic. In IEEE INFOCOM 2009, April 2009;711-719.
    • (2009) IEEE INFOCOM 2009 , pp. 711-719
    • Borgnat, P.1    Dewaele, G.2    Fukuda, K.3    Abry, P.4    Cho, K.5
  • 20
    • 77950464722 scopus 로고    scopus 로고
    • Evaluation of anomaly detection method based on pattern recognition
    • Fontugne R, Himura Y, Fukuda K. Evaluation of anomaly detection method based on pattern recognition. IEICE Transactions on Communications 2010; E93-B (2):328-335.
    • (2010) IEICE Transactions on Communications , vol.E93-B , Issue.2 , pp. 328-335
    • Fontugne, R.1    Himura, Y.2    Fukuda, K.3
  • 21
    • 70350771144 scopus 로고    scopus 로고
    • Internet traffic classification demystified: Myths, caveats, and the best practices
    • December
    • Kim H, Claffy KC, Fomenkov M, Barman D, Lee MFKY. Internet traffic classification demystified: myths, caveats, and the best practices. In ACM CoNEXT 2008, December 2008;12.
    • (2008) ACM CoNEXT 2008 , pp. 12
    • Kim, H.1    Claffy, K.C.2    Fomenkov, M.3    Barman, D.4    Lee, M.F.K.Y.5
  • 22
    • 77956384695 scopus 로고    scopus 로고
    • Quantifying host-based application traffic with multi-scale gamma model
    • April, Online. Available
    • Himura Y, Fukuda K, Cho K, Esaki H. Quantifying host-based application traffic with multi-scale gamma model. In PAM2009 Student Workshop, April 2009;2. [Online]. Available: http://pam2009.kaist.ac.kr/workshop-paper/yourconf1- paper12pdf [11 July 2010].
    • (2009) PAM2009 Student Workshop , pp. 2
    • Himura, Y.1    Fukuda, K.2    Cho, K.3    Esaki, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.