-
1
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
November
-
Roesch M. Snort: lightweight intrusion detection for networks. In USENIX LISA 99, November 1999;229-238.
-
(1999)
USENIX LISA 99
, pp. 229-238
-
-
Roesch, M.1
-
2
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
December
-
Brutlag J. Aberrant behavior detection in time series for network monitoring. In USENIX LISA 00, December 2000;139-146.
-
(2000)
USENIX LISA 00
, pp. 139-146
-
-
Brutlag, J.1
-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
November
-
Barford P, Kline J, Plonka D, Ron A. A signal analysis of network traffic anomalies. In ACM IMW 02, November 2002;71-82.
-
(2002)
ACM IMW 02
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
14944367082
-
Sketch-based change detection: Methods evaluation and applications
-
October
-
Krishnamurty B, Sen S, Zhang Y, Chen Y. Sketch-based change detection: methods evaluation and applications. In ACM IMC 03, October 2003;234-247.
-
(2003)
ACM IMC 03
, pp. 234-247
-
-
Krishnamurty, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
5
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
August
-
Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In ACM SIGCOMM 04, August 2004;219-230.
-
(2004)
ACM SIGCOMM 04
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
6
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
October
-
Soule A, Salamatian K, Taft N. Combining filtering and statistical methods for anomaly detection. In ACM IMC 05, October 2005;331-344.
-
(2005)
ACM IMC 05
, pp. 331-344
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
7
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
October
-
Gu Y, McCallum A, Towsley D. Detecting anomalies in network traffic using maximum entropy estimation. In ACM IMC 05, October 2005;345-350.
-
(2005)
ACM IMC 05
, pp. 345-350
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
8
-
-
33646742035
-
PacketScore: A statistics-based packet filtering scheme against distributed denial-of-service
-
Kim Y, Lau WC, Chuah MC, Chao HJ. PacketScore: a statistics-based packet filtering scheme against distributed denial-of-service. IEEE Transactions on Dependable and Secure Computing 2006;3(2):141-155.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
9
-
-
62949129764
-
Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure
-
August
-
Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using Sketch and non Gaussian multiresolution statistical detection procedure. In ACM SIGCOMM 07: LSAD Workshop, August 2007;145-152.
-
(2007)
ACM SIGCOMM 07: LSAD Workshop
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
10
-
-
43949111011
-
A two-layered anomaly detection technique based on multi-modal flow behavior models
-
April
-
Stoeklin MP, Boudec JYL, Kind A. A two-layered anomaly detection technique based on multi-modal flow behavior models. In PAM 2008, April 2008;212-221.
-
(2008)
PAM 2008
, pp. 212-221
-
-
Stoeklin, M.P.1
Boudec, J.Y.L.2
Kind, A.3
-
13
-
-
70449501437
-
An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm
-
June
-
Himura Y, Fukuda K, Cho K, Esaki H. An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm. In IEEE ICC 2009, June 2009;6.
-
(2009)
IEEE ICC 2009
, pp. 6
-
-
Himura, Y.1
Fukuda, K.2
Cho, K.3
Esaki, H.4
-
16
-
-
33847761464
-
Non-Gaussian and long memory statistical characterisations for internet traffic with anomalies
-
Scherre A, Larrieu N, Owezarski P, Borgnat P, Abry P. Non-Gaussian and long memory statistical characterisations for Internet traffic with anomalies. IEEE Transactions on Dependable and Secure Computing 2007;4(1):56-70.
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherre, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
18
-
-
33750305627
-
A day in the life of the internet: Proposed community-wide experiment
-
Claffy KC. A day in the life of the Internet: proposed community-wide experiment. In ACM SIGCOMM Computer Communication Review 2006;36(2):39-40.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.2
, pp. 39-40
-
-
Claffy, K.C.1
-
19
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
April
-
Borgnat P, Dewaele G, Fukuda K, Abry P, Cho K. Seven years and one day: sketching the evolution of Internet traffic. In IEEE INFOCOM 2009, April 2009;711-719.
-
(2009)
IEEE INFOCOM 2009
, pp. 711-719
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
20
-
-
77950464722
-
Evaluation of anomaly detection method based on pattern recognition
-
Fontugne R, Himura Y, Fukuda K. Evaluation of anomaly detection method based on pattern recognition. IEICE Transactions on Communications 2010; E93-B (2):328-335.
-
(2010)
IEICE Transactions on Communications
, vol.E93-B
, Issue.2
, pp. 328-335
-
-
Fontugne, R.1
Himura, Y.2
Fukuda, K.3
-
21
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
December
-
Kim H, Claffy KC, Fomenkov M, Barman D, Lee MFKY. Internet traffic classification demystified: myths, caveats, and the best practices. In ACM CoNEXT 2008, December 2008;12.
-
(2008)
ACM CoNEXT 2008
, pp. 12
-
-
Kim, H.1
Claffy, K.C.2
Fomenkov, M.3
Barman, D.4
Lee, M.F.K.Y.5
-
22
-
-
77956384695
-
Quantifying host-based application traffic with multi-scale gamma model
-
April, Online. Available
-
Himura Y, Fukuda K, Cho K, Esaki H. Quantifying host-based application traffic with multi-scale gamma model. In PAM2009 Student Workshop, April 2009;2. [Online]. Available: http://pam2009.kaist.ac.kr/workshop-paper/yourconf1- paper12pdf [11 July 2010].
-
(2009)
PAM2009 Student Workshop
, pp. 2
-
-
Himura, Y.1
Fukuda, K.2
Cho, K.3
Esaki, H.4
|