-
1
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
Berkeley, CA, USA: USENIX Association
-
J. D. Brutlag, "Aberrant behavior detection in time series for network monitoring, " in LISA '00: Proceedings of the 14th USENIX conference on System administration. Berkeley, CA, USA: USENIX Association, 2000, pp. 139-146.
-
(2000)
LISA '00: Proceedings of the 14th USENIX Conference on System Administration
, pp. 139-146
-
-
Brutlag, J.D.1
-
2
-
-
0036967463
-
Use of spectral analysis in defense against dos attacks
-
Nov.
-
C.-M. Cheng, H. Kung, and K.-S. Tan, "Use of spectral analysis in defense against dos attacks, " in Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE, vol. 3, Nov. 2002, pp. 2143-2148 vol.3.
-
(2002)
Global Telecommunications Conference, 2002. GLOBECOM '02. IEEE
, vol.3
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.2
Tan, K.-S.3
-
3
-
-
0043166339
-
Anomaly detection in ip networks
-
Aug.
-
M. Thottan and C. Ji, "Anomaly detection in ip networks, " Signal Processing, IEEE Transactions on, vol.51, no.8, pp. 2191-2204, Aug. 2003.
-
(2003)
Signal Processing, IEEE Transactions on
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
5
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA, USA: USENIX Association
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation, " in IMC '05: Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement. Berkeley, CA, USA: USENIX Association, 2005, pp. 32-32
-
(2005)
IMC '05: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement
, pp. 32-32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
7
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
New York, NY, USA: ACM
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies, " in SIGCOMM '04: Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM, 2004, pp. 219-230.
-
(2004)
SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
8
-
-
77956476370
-
-
EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-2073, May
-
B. I. P. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-h. Lau, N. Taft, and D. Tygar, "Compromising pca-based anomaly detectors for network- wide traffic, " EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2008-2073, May 2008. [Online]. Available: http://www.eecs. berkeley.edu/Pubs/TechRpts/2008/EECS-2008-73.html
-
(2008)
Compromising Pca-based Anomaly Detectors for Network-wide Traffic
-
-
Rubinstein, B.I.P.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Taft, N.6
Tygar, D.7
-
9
-
-
36349029177
-
Sensitivity of pca for traffic anomaly detection
-
H Ringberg, A Soule, J Rexford, and C Diot, "Sensitivity of pca for traffic anomaly detection, " SIGMETRICS Perform. Eval. Rev., vol.35, no.1, pp. 109-120, 2007.
-
(2007)
SIGMETRICS Perform. Eval. Rev.
, vol.35
, Issue.1
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
10
-
-
0003254064
-
A non-instrusive, wavelet-based approach to detecting network performance problems
-
New York, NY, USA: ACM
-
P. Huang, A. Feldmann, and W. Willinger, "A non-instrusive, wavelet- based approach to detecting network performance problems, " in IMW '01: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement. New York, NY, USA: ACM, 2001, pp. 213-227.
-
(2001)
IMW '01: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
, pp. 213-227
-
-
Huang, P.1
Feldmann, A.2
Willinger, W.3
-
11
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
New York, NY, USA: ACM
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies, " in IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. New York, NY, USA: ACM, 2002, pp. 71-82.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
12
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
W. Lu and A. A. Ghorbani, "Network anomaly detection based on wavelet analysis, " EURASIP J. Adv. Signal Process, vol.2009, pp. 1-16, 2009.
-
(2009)
EURASIP J. Adv. Signal Process
, vol.2009
, pp. 1-16
-
-
Lu, W.1
Ghorbani, A.A.2
-
14
-
-
50949130514
-
Nis04-1: Wavelet-based detection of dos attacks
-
27 2006-Dec. 1
-
A. Dainotti, A. Pescape, and G. Ventre, "Nis04-1: Wavelet-based detection of dos attacks, " in Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE, 27 2006-Dec. 1 2006, pp. 1-6.
-
(2006)
Global Telecommunications Conference, 2006. GLOBECOM '06. IEEE
, pp. 1-6
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
15
-
-
62949245784
-
Wavelet-based unwanted traffic time series analysis
-
Dec.
-
K. Limthong, F. Kensuke, and P. Watanapongse, "Wavelet-based unwanted traffic time series analysis, " in Computer and Electrical Engineering, 2008. ICCEE 2008. International Conference on, Dec. 2008, pp. 445-449.
-
(2008)
Computer and Electrical Engineering 2008. ICCEE 2008. International Conference on
, pp. 445-449
-
-
Limthong, K.1
Kensuke, F.2
Watanapongse, P.3
-
16
-
-
11244259034
-
A wavelet-based framework for proactive detection of network misconfigurations
-
New York, NY, USA: ACM
-
A. Magnaghi, T. Hamada, and T. Katsuyama, "A wavelet-based framework for proactive detection of network misconfigurations, " in NetT '04: Proceedings of the ACM SIGCOMM workshop on Network troubleshooting. New York, NY, USA: ACM, 2004, pp. 253-258.
-
(2004)
NetT '04: Proceedings of the ACM SIGCOMM Workshop on Network Troubleshooting
, pp. 253-258
-
-
Magnaghi, A.1
Hamada, T.2
Katsuyama, T.3
-
17
-
-
27644518127
-
D-ward: A source-end defense against flooding denial-of-service attacks
-
July-Sept.
-
J. Mirkovic and P. Reiher, "D-ward: a source-end defense against flooding denial-of-service attacks, " Dependable and Secure Computing, IEEE Transactions on, vol.2, no.3, pp. 216-232, July-Sept. 2005.
-
(2005)
Dependable and Secure Computing, IEEE Transactions on
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
18
-
-
33646423315
-
Application of anomaly detection algorithms for detecting syn flooding attacks
-
iCON 2004 - 12th IEEE International Conference on Network 2004
-
V. A. Siris and F. Papagalou, "Application of anomaly detection algorithms for detecting syn flooding attacks, " Computer Communications, vol.29, no.9, pp. 1433 - 1442, 2006, iCON 2004 - 12th IEEE International Conference on Network 2004.
-
(2006)
Computer Communications
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
-
19
-
-
33947171900
-
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
-
Sept.
-
A. Tartakovsky, B. Rozovskii, R. Blazek, and H. Kim, "A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods, " Signal Processing, IEEE Transactions on, vol.54, no.9, pp. 3372-3382, Sept. 2006.
-
(2006)
Signal Processing, IEEE Transactions on
, vol.54
, Issue.9
, pp. 3372-3382
-
-
Tartakovsky, A.1
Rozovskii, B.2
Blazek, R.3
Kim, H.4
|