메뉴 건너뛰기




Volumn , Issue , 2010, Pages

A wavelet-based anomaly detection for outbound network traffic

Author keywords

Anomaly detection; Network traffic; Outbound; Statistical distance; Time series; Wavelet

Indexed keywords

ANOMALY DETECTION; NETWORK TRAFFIC; OUTBOUND; STATISTICAL DISTANCE; WAVELET;

EID: 77956471727     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 1
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • Berkeley, CA, USA: USENIX Association
    • J. D. Brutlag, "Aberrant behavior detection in time series for network monitoring, " in LISA '00: Proceedings of the 14th USENIX conference on System administration. Berkeley, CA, USA: USENIX Association, 2000, pp. 139-146.
    • (2000) LISA '00: Proceedings of the 14th USENIX Conference on System Administration , pp. 139-146
    • Brutlag, J.D.1
  • 3
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in ip networks
    • Aug.
    • M. Thottan and C. Ji, "Anomaly detection in ip networks, " Signal Processing, IEEE Transactions on, vol.51, no.8, pp. 2191-2204, Aug. 2003.
    • (2003) Signal Processing, IEEE Transactions on , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 4
    • 38549119585 scopus 로고    scopus 로고
    • Spectral analysis of tcp flows for defense against reduction-of-quality attacks
    • June
    • Y. Chen and K. Hwang, "Spectral analysis of tcp flows for defense against reduction-of-quality attacks, " in Communications, 2007. ICC '07. IEEE International Conference on, June 2007, pp. 1203-1210.
    • (2007) Communications 2007. ICC '07. IEEE International Conference on , pp. 1203-1210
    • Chen, Y.1    Hwang, K.2
  • 12
    • 59949095579 scopus 로고    scopus 로고
    • Network anomaly detection based on wavelet analysis
    • W. Lu and A. A. Ghorbani, "Network anomaly detection based on wavelet analysis, " EURASIP J. Adv. Signal Process, vol.2009, pp. 1-16, 2009.
    • (2009) EURASIP J. Adv. Signal Process , vol.2009 , pp. 1-16
    • Lu, W.1    Ghorbani, A.A.2
  • 17
    • 27644518127 scopus 로고    scopus 로고
    • D-ward: A source-end defense against flooding denial-of-service attacks
    • July-Sept.
    • J. Mirkovic and P. Reiher, "D-ward: a source-end defense against flooding denial-of-service attacks, " Dependable and Secure Computing, IEEE Transactions on, vol.2, no.3, pp. 216-232, July-Sept. 2005.
    • (2005) Dependable and Secure Computing, IEEE Transactions on , vol.2 , Issue.3 , pp. 216-232
    • Mirkovic, J.1    Reiher, P.2
  • 18
    • 33646423315 scopus 로고    scopus 로고
    • Application of anomaly detection algorithms for detecting syn flooding attacks
    • iCON 2004 - 12th IEEE International Conference on Network 2004
    • V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting syn flooding attacks, " Computer Communications, vol.29, no.9, pp. 1433 - 1442, 2006, iCON 2004 - 12th IEEE International Conference on Network 2004.
    • (2006) Computer Communications , vol.29 , Issue.9 , pp. 1433-1442
    • Siris, V.A.1    Papagalou, F.2
  • 19
    • 33947171900 scopus 로고    scopus 로고
    • A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
    • Sept.
    • A. Tartakovsky, B. Rozovskii, R. Blazek, and H. Kim, "A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods, " Signal Processing, IEEE Transactions on, vol.54, no.9, pp. 3372-3382, Sept. 2006.
    • (2006) Signal Processing, IEEE Transactions on , vol.54 , Issue.9 , pp. 3372-3382
    • Tartakovsky, A.1    Rozovskii, B.2    Blazek, R.3    Kim, H.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.