-
2
-
-
8344219844
-
Combining routing and traffic data for detection of IP forwarding anomalies
-
M. Roughan, T. Griffin, M. Mao, A. Greenberg, and B. Freeman, "Combining routing and traffic data for detection of IP forwarding anomalies", ACM SIGMETRICS Performance Evaluation Rev., vol. 32, no. 1, pp. 416-417, 2004.
-
(2004)
ACM SIGMETRICS Performance Evaluation Rev.
, vol.32
, Issue.1
, pp. 416-417
-
-
Roughan, M.1
Griffin, T.2
Mao, M.3
Greenberg, A.4
Freeman, B.5
-
3
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
Seoul, Korea
-
M. S. Kim, H. J. Kang, C. S. Hong, H. S. Chung, and J. W. Hong, "A flow-based method for abnormal network traffic detection", in Proc. IEEE/IFIP Network Operations and Management Symp., Seoul, Korea, 2004, pp. 599-612.
-
(2004)
Proc. IEEE/IFIP Network Operations and Management Symp.
, pp. 599-612
-
-
Kim, M.S.1
Kang, H.J.2
Hong, C.S.3
Chung, H.S.4
Hong, J.W.5
-
4
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseilles, France
-
P. Barford, J. Kline, and D. Plonka, "A signal analysis of network traffic anomalies", in Proc. ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, 2002, pp. 71-82.
-
(2002)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
-
5
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
Melbourne, FL
-
M. V. Mahoney, "Network traffic anomaly detection based on packet bytes", in Proc. ACM-SAC 2003, Melbourne, FL, 2003, pp. 346-350.
-
(2003)
Proc. ACM-SAC 2003
, pp. 346-350
-
-
Mahoney, M.V.1
-
6
-
-
57049156059
-
Detection of anomalous behaviors in networks from traffic measurements
-
Dec
-
G. Giorgi and C. Narduzzi, "Detection of anomalous behaviors in networks from traffic measurements", IEEE Trans. Instrum. Meas., vol. 57, no. 12, pp. 2782-2791, Dec. 2008.
-
(2008)
IEEE Trans. Instrum. Meas.
, vol.57
, Issue.12
, pp. 2782-2791
-
-
Giorgi, G.1
Narduzzi, C.2
-
7
-
-
24344452007
-
A study of analyzing network traffic as images in real-time
-
Miami, FL
-
S. Kim and A. Reddy, "A study of analyzing network traffic as images in real-time", in Proc. IEEE INFOCOM, Miami, FL, 2005, pp. 2056-2067.
-
(2005)
Proc. IEEE INFOCOM
, pp. 2056-2067
-
-
Kim, S.1
Reddy, A.2
-
8
-
-
42149086458
-
Analysis of internet backbone traffic and header anomalies observed
-
San Diego, CA
-
W. John and S. Tafvelin, "Analysis of internet backbone traffic and header anomalies observed", in Proc. 7th ACM SIGCOMM Conf. Internet Measurement, San Diego, CA, 2007, pp. 111-116.
-
(2007)
Proc. 7th ACM SIGCOMM Conf. Internet Measurement
, pp. 111-116
-
-
John, W.1
Tafvelin, S.2
-
9
-
-
33947198115
-
Observed structure of addresses in IP traffic
-
Dec
-
E. Kohler, J. Li, V. Paxson, and S. Shenker, "Observed structure of addresses in IP traffic", IEEE/ACM Trans. Netw., vol. 14, no. 6, pp. 1207-1218, Dec. 2006.
-
(2006)
IEEE/ACM Trans. Netw.
, vol.14
, Issue.6
, pp. 1207-1218
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
10
-
-
85077580912
-
Role classification of hosts within enterprise networks based on connection patterns
-
Washington, DC
-
G. Tan, M. Poletto, F. Kaashoek, and J. Guttag, "Role classification of hosts within enterprise networks based on connection patterns", in Proc. 2003 USENIX Annu. Tech. Conf., Washington, DC, 2003, pp. 15-28.
-
(2003)
Proc. 2003 USENIX Annu. Tech. Conf.
, pp. 15-28
-
-
Tan, G.1
Poletto, M.2
Kaashoek, F.3
Guttag, J.4
-
11
-
-
85081774740
-
Enterprise security: A community of interest based approach
-
California
-
P. McDaniel, S. Sen, and O. Spatscheck, "Enterprise security: A community of interest based approach", in Proc. 3th Annu. Network and Distributed System Security Symp., California, 2006, pp. 1-15.
-
(2006)
Proc. 3th Annu. Network and Distributed System Security Symp.
, pp. 1-15
-
-
McDaniel, P.1
Sen, S.2
Spatscheck, O.3
-
12
-
-
24344488334
-
Analysis of communities of interest in data networks
-
Boston, MA
-
W. Aiello, C. Kalmanek, P. McDaniel, S. Sen, and O. Spatscheck, "Analysis of communities of interest in data networks", in Proc. Passive and Active Network Measurement, Boston, MA, 2005, pp. 83-96.
-
(2005)
Proc. Passive and Active Network Measurement
, pp. 83-96
-
-
Aiello, W.1
Kalmanek, C.2
McDaniel, P.3
Sen, S.4
Spatscheck, O.5
-
13
-
-
84871993728
-
-
Online. Available
-
CISCO NetFlow [Online]. Available: http://www.cisco.com/en/US/products/ ps6601/products-white-paper09186a00800a3db9.shtml
-
CISCO NetFlow
-
-
-
14
-
-
0037333205
-
Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
-
Mar
-
N. Ye, S. Vilbert, and Q. Chen, "Computer intrusion detection through EWMA for autocorrelated and uncorrelated data", IEEE Trans. Reliability, vol. 52, no. 1, pp. 75-82, Mar. 2003.
-
(2003)
IEEE Trans. Reliability
, vol.52
, Issue.1
, pp. 75-82
-
-
Ye, N.1
Vilbert, S.2
Chen, Q.3
-
15
-
-
0043166339
-
Anomaly detection in IP networks
-
Aug
-
M. Thottan and C. Ji, "Anomaly detection in IP networks", IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
16
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Oakland, CA
-
W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection", in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2001, pp. 130-143.
-
(2001)
Proc. IEEE Symp. Security and Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
17
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
DOI 10.1145/1090191.1080112
-
K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling internet backbone traffic: Behavior models and applications", ACM SIGCOMM Computer Communication Rev., vol. 35, no. 4, pp. 169-180, 2005. (Pubitemid 46323502)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
18
-
-
84878715338
-
An information-theoretic approach to network monitoring and measurement
-
Berkeley, CA
-
Y. Liu, D. Towsley, T. Ye, and J. Bolot, "An information-theoretic approach to network monitoring and measurement", in Proc. 5th ACM SIGCOMM Internet Measurement Conf., Berkeley, CA, 2005, pp. 1-14.
-
(2005)
Proc. 5th ACM SIGCOMM Internet Measurement Conf.
, pp. 1-14
-
-
Liu, Y.1
Towsley, D.2
Ye, T.3
Bolot, J.4
-
19
-
-
3543096392
-
Fast port scan detection using sequential hypothesis testing
-
California
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, "Fast port scan detection using sequential hypothesis testing", in Proc. IEEE Symp. Security and Privacy, California, 2004, pp. 211-225.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
20
-
-
28044469549
-
The monitoring and early detection of internet worms
-
Oct
-
C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of internet worms", IEEE/ACM Trans. Netw., vol. 13, no. 5, pp. 961-974, Oct. 2005.
-
(2005)
IEEE/ACM Trans. Netw.
, vol.13
, Issue.5
, pp. 961-974
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
Gao, L.4
-
21
-
-
70449485630
-
Worm detection using local networks
-
Riviera, France
-
X. Qin, D. Dagon, G. Gu, W. Lee, M. Warfield, and P. Allor, "Worm detection using local networks", in Proc. Recent Advances of Intrusion Detection, Riviera, France, 2004, pp. 1-18.
-
(2004)
Proc. Recent Advances of Intrusion Detection
, pp. 1-18
-
-
Qin, X.1
Dagon, D.2
Gu, G.3
Lee, W.4
Warfield, M.5
Allor, P.6
-
22
-
-
47249148662
-
Passive measurement of one-way and two-way flow lifetimes
-
D. Lee and N. Brownlee, "Passive measurement of one-way and two-way flow lifetimes", ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 3, pp. 17-28, 2007.
-
(2007)
ACM SIGCOMM Comput. Commun. Rev.
, vol.37
, Issue.3
, pp. 17-28
-
-
Lee, D.1
Brownlee, N.2
-
23
-
-
0032677326
-
End-to-end internet packet dynamics
-
Jun
-
V. Paxson, "End-to-end internet packet dynamics", IEEE/ACM Trans. Netw., vol. 7, no. 3, pp. 277-292, Jun. 1999.
-
(1999)
IEEE/ACM Trans. Netw.
, vol.7
, Issue.3
, pp. 277-292
-
-
Paxson, V.1
-
24
-
-
24344461274
-
Traffic classification using a statistical approach
-
D. Zuev and A. Moore, "Traffic classification using a statistical approach", Lecture Notes Comput. Sci., vol. 3431, pp. 321-324, 2005.
-
(2005)
Lecture Notes Comput. Sci.
, vol.3431
, pp. 321-324
-
-
Zuev, D.1
Moore, A.2
-
25
-
-
47749101236
-
A peer-to-peer traffic identification method using machine learning
-
Guilin, China
-
H. Liu, W. Feng, Y. Huang, and X. Li, "A peer-to-peer traffic identification method using machine learning", in Proc. Networking, Architecture, and Storage, Guilin, China, 2007, pp. 155-160.
-
(2007)
Proc. Networking, Architecture, and Storage
, pp. 155-160
-
-
Liu, H.1
Feng, W.2
Huang, Y.3
Li, X.4
-
26
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, and I. Akodkenou, "Traffic classification on the fly", Comput. Commun. Rev., vol. 36, no. 2, pp. 23-26, 2006.
-
(2006)
Comput. Commun. Rev.
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
-
27
-
-
84878704906
-
Network anomography
-
Berkeley, CA
-
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan, "Network anomography", in Proc. 5th ACM SIGCOMM Conf. Internet Measurement, Berkeley, CA, pp. 317-330.
-
Proc. 5th ACM SIGCOMM Conf. Internet Measurement
, pp. 317-330
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
-
28
-
-
1242287693
-
Estimating flow distributions from sampled flow statistics
-
Karlsruhe, Germany
-
N. G. Duffield, C. Lund, and M. Thorup, "Estimating flow distributions from sampled flow statistics", in Proc. ACM SIGCOMM, Karlsruhe, Germany, 2003, pp. 325-336.
-
(2003)
Proc. ACM SIGCOMM
, pp. 325-336
-
-
Duffield, N.G.1
Lund, C.2
Thorup, M.3
-
29
-
-
0141762497
-
Properties and prediction of flow statistics from sampled packet streams
-
Marseilles, France
-
N. Duffield, C. Lund, and M. Thorup, "Properties and prediction of flow statistics from sampled packet streams", in Proc. ACM SIG-COMM Internet Measurement Workshop, Marseilles, France, 2002, pp. 159-171.
-
(2002)
Proc. ACM SIG-COMM Internet Measurement Workshop
, pp. 159-171
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
30
-
-
8344289246
-
Flow sampling under hard resource constraints
-
New York
-
N. Duffield, C. Lund, and M. Thorup, "Flow sampling under hard resource constraints", in Proc. ACM SIGMETRICS, New York, 2004, pp. 85-96.
-
(2004)
Proc. ACM SIGMETRICS
, pp. 85-96
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
31
-
-
34547464544
-
Impact of traffic sampling on anomaly detection metrics
-
Janeriro, Brazil
-
D. Brauckhoff, B. Tellenbach, A. Wagner, A. Lakhina, and M. May, "Impact of traffic sampling on anomaly detection metrics", in Proc. Internet Measurement Conf., Janeriro, Brazil, 2006, pp. 159-164.
-
(2006)
Proc. Internet Measurement Conf.
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
Lakhina, A.4
May, M.5
-
32
-
-
34547488856
-
Is sampled data sufficient for anomaly detection
-
Janeriro, Brazil
-
J. Mai, C. Chuah, A. Sridharan, T. Ye, and H. Zang, "Is sampled data sufficient for anomaly detection", in Proc. ACM SIGCOMM Internet Measurement Conf., Janeriro, Brazil, 2006, pp. 165-176.
-
(2006)
Proc. ACM SIGCOMM Internet Measurement Conf.
, pp. 165-176
-
-
Mai, J.1
Chuah, C.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
33
-
-
36148989956
-
Reversible sketches: Enabling monitoring and analysis over high-speed data streams
-
Oct
-
R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P. Dinda, M. Kao, and G. Memik, "Reversible sketches: Enabling monitoring and analysis over high-speed data streams", IEEE/ACM Trans. Netw., vol. 15, no. 5, pp. 1059-1072, Oct. 2007.
-
(2007)
IEEE/ACM Trans. Netw.
, vol.15
, Issue.5
, pp. 1059-1072
-
-
Schweller, R.1
Li, Z.2
Chen, Y.3
Gao, Y.4
Gupta, A.5
Zhang, Y.6
Dinda, P.7
Kao, M.8
Memik, G.9
-
34
-
-
35048819960
-
An improved data stream summary: The count-min sketch and its applications
-
Buenos Aires, Argentina
-
G. Cormode and S. Muthukrishnan, "An improved data stream summary: The count-min sketch and its applications", in Proc. Latin American Theoretical Informatics, Buenos Aires, Argentina, 2004, pp. 29-38.
-
(2004)
Proc. Latin American Theoretical Informatics
, pp. 29-38
-
-
Cormode, G.1
Muthukrishnan, S.2
-
35
-
-
0020828424
-
Probabilistic counting algorithms for data base applications
-
P. Flajolet and G. Martin, "Probabilistic counting algorithms for data base applications", J. Comput. Syst. Sci., vol. 31, no. 2, pp. 182-209, 1985.
-
(1985)
J. Comput. Syst. Sci.
, vol.31
, Issue.2
, pp. 182-209
-
-
Flajolet, P.1
Martin, G.2
-
36
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Miami, FL
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: Methods, evaluation, and applications", in Proc. ACM SIGCOMM Internet Measurement Conf., Miami, FL, 2003, pp. 234-247.
-
(2003)
Proc. ACM SIGCOMM Internet Measurement Conf.
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
37
-
-
14944367267
-
Characterization of networkwide anomalies in traffic flows
-
Taormina, Italy
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of networkwide anomalies in traffic flows", in Proc. 4th ACM SIGCOMM Internet Measurement Conf., Taormina, Italy, 2004, pp. 201-206.
-
(2004)
Proc. 4th ACM SIGCOMM Internet Measurement Conf.
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
38
-
-
8344255864
-
Structural analysis of network traffic flows
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. Kolaczyk, and N. Taft, "Structural analysis of network traffic flows", ACM SIGMET-RICS, vol. 32, no. 1, pp. 61-72, 2004.
-
(2004)
ACM SIGMET-RICS
, vol.32
, Issue.1
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.5
Taft, N.6
-
39
-
-
50249125390
-
Dynamic features measurement and analysis for large-scale networks
-
Beijing, China
-
T. Qin, X. Guan, W. Li, and P. Wang, "Dynamic features measurement and analysis for large-scale networks", in Proc. 2008 IEEE Int. Conf. Communication Workshops, Beijing, China, 2008, pp. 212-216.
-
(2008)
Proc. 2008 IEEE Int. Conf. Communication Workshops
, pp. 212-216
-
-
Qin, T.1
Guan, X.2
Li, W.3
Wang, P.4
-
40
-
-
84878681501
-
Geographic locality of IP prefixes
-
Berkeley, CA
-
M. Freedman, M. Vutukuru, N. Feamster, and H. Balakrishnan, "Geographic locality of IP prefixes", in Proc. ACM Internet Measurement Conf. 2005, Berkeley, CA, 2005, pp. 153-158.
-
(2005)
Proc. ACM Internet Measurement Conf. 2005
, pp. 153-158
-
-
Freedman, M.1
Vutukuru, M.2
Feamster, N.3
Balakrishnan, H.4
-
41
-
-
0345568550
-
The architecture of the CoralReef: Internet traffic monitoring software suite
-
Amsterdam, The Netherlands
-
K. Keys, D. Moore, R. Koga, E. Lagache, M. Tesch, and K. Claffy, "The architecture of the CoralReef: Internet traffic monitoring software suite", in Proc. 2nd Passive and Active Measurement Workshop, Amsterdam, The Netherlands, 2001.
-
(2001)
Proc. 2nd Passive and Active Measurement Workshop
-
-
Keys, K.1
Moore, D.2
Koga, R.3
Lagache, E.4
Tesch, M.5
Claffy, K.6
-
42
-
-
50249158852
-
Measuring network change: Renyi cross entropy and the second order degree distribution
-
Adelaide, Australia, Apr
-
F. H. Edward, "Measuring network change: Renyi cross entropy and the second order degree distribution", in Proc. Passive and Active Measurement Conf. 2006, Adelaide, Australia, Apr. 2006.
-
(2006)
Proc. Passive and Active Measurement Conf. 2006
-
-
Edward, F.H.1
-
43
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
Vouliagmeni, Greece
-
G. Nychis, V. Sekar, D. Andersen, H. Kim, and H. Zhang, "An empirical evaluation of entropy-based traffic anomaly detection", in Proc. 8th ACM SIGCOMM Internet Measurement Conf., Vouliagmeni, Greece, 2008, pp. 151-156.
-
(2008)
Proc. 8th ACM SIGCOMM Internet Measurement Conf.
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.3
Kim, H.4
Zhang, H.5
-
44
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
Berkeley, CA
-
Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation", in Proc. 5th ACM SIGCOMM Conf. Internet Measurement, Berkeley, CA, 2005, pp. 32-37.
-
(2005)
Proc. 5th ACM SIGCOMM Conf. Internet Measurement
, pp. 32-37
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
45
-
-
47249154789
-
A methodology for finding significant network hosts
-
Dublin, Ireland
-
D. Lee and N. Brownlee, "A methodology for finding significant network hosts", in Proc. 32nd IEEE Conf. Local Computer Networks, Dublin, Ireland, 2007, pp. 981-988.
-
(2007)
Proc. 32nd IEEE Conf. Local Computer Networks
, pp. 981-988
-
-
Lee, D.1
Brownlee, N.2
|