메뉴 건너뛰기




Volumn 5, Issue 4, 2010, Pages 905-919

Dynamic feature analysis and measurement for large-scale network traffic monitoring

Author keywords

Correlation analysis; dynamic changes; network traffic monitoring; regional flow model; Renyi cross entropy

Indexed keywords

CORRELATION ANALYSIS; CROSS ENTROPY; DYNAMIC CHANGES; FLOW MODEL; NETWORK TRAFFIC;

EID: 78649408044     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2010.2066970     Document Type: Article
Times cited : (19)

References (45)
  • 5
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Melbourne, FL
    • M. V. Mahoney, "Network traffic anomaly detection based on packet bytes", in Proc. ACM-SAC 2003, Melbourne, FL, 2003, pp. 346-350.
    • (2003) Proc. ACM-SAC 2003 , pp. 346-350
    • Mahoney, M.V.1
  • 6
    • 57049156059 scopus 로고    scopus 로고
    • Detection of anomalous behaviors in networks from traffic measurements
    • Dec
    • G. Giorgi and C. Narduzzi, "Detection of anomalous behaviors in networks from traffic measurements", IEEE Trans. Instrum. Meas., vol. 57, no. 12, pp. 2782-2791, Dec. 2008.
    • (2008) IEEE Trans. Instrum. Meas. , vol.57 , Issue.12 , pp. 2782-2791
    • Giorgi, G.1    Narduzzi, C.2
  • 7
    • 24344452007 scopus 로고    scopus 로고
    • A study of analyzing network traffic as images in real-time
    • Miami, FL
    • S. Kim and A. Reddy, "A study of analyzing network traffic as images in real-time", in Proc. IEEE INFOCOM, Miami, FL, 2005, pp. 2056-2067.
    • (2005) Proc. IEEE INFOCOM , pp. 2056-2067
    • Kim, S.1    Reddy, A.2
  • 8
    • 42149086458 scopus 로고    scopus 로고
    • Analysis of internet backbone traffic and header anomalies observed
    • San Diego, CA
    • W. John and S. Tafvelin, "Analysis of internet backbone traffic and header anomalies observed", in Proc. 7th ACM SIGCOMM Conf. Internet Measurement, San Diego, CA, 2007, pp. 111-116.
    • (2007) Proc. 7th ACM SIGCOMM Conf. Internet Measurement , pp. 111-116
    • John, W.1    Tafvelin, S.2
  • 9
    • 33947198115 scopus 로고    scopus 로고
    • Observed structure of addresses in IP traffic
    • Dec
    • E. Kohler, J. Li, V. Paxson, and S. Shenker, "Observed structure of addresses in IP traffic", IEEE/ACM Trans. Netw., vol. 14, no. 6, pp. 1207-1218, Dec. 2006.
    • (2006) IEEE/ACM Trans. Netw. , vol.14 , Issue.6 , pp. 1207-1218
    • Kohler, E.1    Li, J.2    Paxson, V.3    Shenker, S.4
  • 10
    • 85077580912 scopus 로고    scopus 로고
    • Role classification of hosts within enterprise networks based on connection patterns
    • Washington, DC
    • G. Tan, M. Poletto, F. Kaashoek, and J. Guttag, "Role classification of hosts within enterprise networks based on connection patterns", in Proc. 2003 USENIX Annu. Tech. Conf., Washington, DC, 2003, pp. 15-28.
    • (2003) Proc. 2003 USENIX Annu. Tech. Conf. , pp. 15-28
    • Tan, G.1    Poletto, M.2    Kaashoek, F.3    Guttag, J.4
  • 13
    • 84871993728 scopus 로고    scopus 로고
    • Online. Available
    • CISCO NetFlow [Online]. Available: http://www.cisco.com/en/US/products/ ps6601/products-white-paper09186a00800a3db9.shtml
    • CISCO NetFlow
  • 14
    • 0037333205 scopus 로고    scopus 로고
    • Computer intrusion detection through EWMA for autocorrelated and uncorrelated data
    • Mar
    • N. Ye, S. Vilbert, and Q. Chen, "Computer intrusion detection through EWMA for autocorrelated and uncorrelated data", IEEE Trans. Reliability, vol. 52, no. 1, pp. 75-82, Mar. 2003.
    • (2003) IEEE Trans. Reliability , vol.52 , Issue.1 , pp. 75-82
    • Ye, N.1    Vilbert, S.2    Chen, Q.3
  • 15
    • 0043166339 scopus 로고    scopus 로고
    • Anomaly detection in IP networks
    • Aug
    • M. Thottan and C. Ji, "Anomaly detection in IP networks", IEEE Trans. Signal Process., vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
    • (2003) IEEE Trans. Signal Process. , vol.51 , Issue.8 , pp. 2191-2204
    • Thottan, M.1    Ji, C.2
  • 16
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • Oakland, CA
    • W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection", in Proc. IEEE Symp. Security and Privacy, Oakland, CA, 2001, pp. 130-143.
    • (2001) Proc. IEEE Symp. Security and Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 17
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • DOI 10.1145/1090191.1080112
    • K. Xu, Z. Zhang, and S. Bhattacharyya, "Profiling internet backbone traffic: Behavior models and applications", ACM SIGCOMM Computer Communication Rev., vol. 35, no. 4, pp. 169-180, 2005. (Pubitemid 46323502)
    • (2005) Computer Communication Review , vol.35 , Issue.4 , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 20
    • 28044469549 scopus 로고    scopus 로고
    • The monitoring and early detection of internet worms
    • Oct
    • C. Zou, W. Gong, D. Towsley, and L. Gao, "The monitoring and early detection of internet worms", IEEE/ACM Trans. Netw., vol. 13, no. 5, pp. 961-974, Oct. 2005.
    • (2005) IEEE/ACM Trans. Netw. , vol.13 , Issue.5 , pp. 961-974
    • Zou, C.1    Gong, W.2    Towsley, D.3    Gao, L.4
  • 22
    • 47249148662 scopus 로고    scopus 로고
    • Passive measurement of one-way and two-way flow lifetimes
    • D. Lee and N. Brownlee, "Passive measurement of one-way and two-way flow lifetimes", ACM SIGCOMM Comput. Commun. Rev., vol. 37, no. 3, pp. 17-28, 2007.
    • (2007) ACM SIGCOMM Comput. Commun. Rev. , vol.37 , Issue.3 , pp. 17-28
    • Lee, D.1    Brownlee, N.2
  • 23
    • 0032677326 scopus 로고    scopus 로고
    • End-to-end internet packet dynamics
    • Jun
    • V. Paxson, "End-to-end internet packet dynamics", IEEE/ACM Trans. Netw., vol. 7, no. 3, pp. 277-292, Jun. 1999.
    • (1999) IEEE/ACM Trans. Netw. , vol.7 , Issue.3 , pp. 277-292
    • Paxson, V.1
  • 24
    • 24344461274 scopus 로고    scopus 로고
    • Traffic classification using a statistical approach
    • D. Zuev and A. Moore, "Traffic classification using a statistical approach", Lecture Notes Comput. Sci., vol. 3431, pp. 321-324, 2005.
    • (2005) Lecture Notes Comput. Sci. , vol.3431 , pp. 321-324
    • Zuev, D.1    Moore, A.2
  • 25
    • 47749101236 scopus 로고    scopus 로고
    • A peer-to-peer traffic identification method using machine learning
    • Guilin, China
    • H. Liu, W. Feng, Y. Huang, and X. Li, "A peer-to-peer traffic identification method using machine learning", in Proc. Networking, Architecture, and Storage, Guilin, China, 2007, pp. 155-160.
    • (2007) Proc. Networking, Architecture, and Storage , pp. 155-160
    • Liu, H.1    Feng, W.2    Huang, Y.3    Li, X.4
  • 28
    • 1242287693 scopus 로고    scopus 로고
    • Estimating flow distributions from sampled flow statistics
    • Karlsruhe, Germany
    • N. G. Duffield, C. Lund, and M. Thorup, "Estimating flow distributions from sampled flow statistics", in Proc. ACM SIGCOMM, Karlsruhe, Germany, 2003, pp. 325-336.
    • (2003) Proc. ACM SIGCOMM , pp. 325-336
    • Duffield, N.G.1    Lund, C.2    Thorup, M.3
  • 29
    • 0141762497 scopus 로고    scopus 로고
    • Properties and prediction of flow statistics from sampled packet streams
    • Marseilles, France
    • N. Duffield, C. Lund, and M. Thorup, "Properties and prediction of flow statistics from sampled packet streams", in Proc. ACM SIG-COMM Internet Measurement Workshop, Marseilles, France, 2002, pp. 159-171.
    • (2002) Proc. ACM SIG-COMM Internet Measurement Workshop , pp. 159-171
    • Duffield, N.1    Lund, C.2    Thorup, M.3
  • 30
    • 8344289246 scopus 로고    scopus 로고
    • Flow sampling under hard resource constraints
    • New York
    • N. Duffield, C. Lund, and M. Thorup, "Flow sampling under hard resource constraints", in Proc. ACM SIGMETRICS, New York, 2004, pp. 85-96.
    • (2004) Proc. ACM SIGMETRICS , pp. 85-96
    • Duffield, N.1    Lund, C.2    Thorup, M.3
  • 33
    • 36148989956 scopus 로고    scopus 로고
    • Reversible sketches: Enabling monitoring and analysis over high-speed data streams
    • Oct
    • R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, Y. Zhang, P. Dinda, M. Kao, and G. Memik, "Reversible sketches: Enabling monitoring and analysis over high-speed data streams", IEEE/ACM Trans. Netw., vol. 15, no. 5, pp. 1059-1072, Oct. 2007.
    • (2007) IEEE/ACM Trans. Netw. , vol.15 , Issue.5 , pp. 1059-1072
    • Schweller, R.1    Li, Z.2    Chen, Y.3    Gao, Y.4    Gupta, A.5    Zhang, Y.6    Dinda, P.7    Kao, M.8    Memik, G.9
  • 34
    • 35048819960 scopus 로고    scopus 로고
    • An improved data stream summary: The count-min sketch and its applications
    • Buenos Aires, Argentina
    • G. Cormode and S. Muthukrishnan, "An improved data stream summary: The count-min sketch and its applications", in Proc. Latin American Theoretical Informatics, Buenos Aires, Argentina, 2004, pp. 29-38.
    • (2004) Proc. Latin American Theoretical Informatics , pp. 29-38
    • Cormode, G.1    Muthukrishnan, S.2
  • 35
    • 0020828424 scopus 로고
    • Probabilistic counting algorithms for data base applications
    • P. Flajolet and G. Martin, "Probabilistic counting algorithms for data base applications", J. Comput. Syst. Sci., vol. 31, no. 2, pp. 182-209, 1985.
    • (1985) J. Comput. Syst. Sci. , vol.31 , Issue.2 , pp. 182-209
    • Flajolet, P.1    Martin, G.2
  • 39
  • 42
    • 50249158852 scopus 로고    scopus 로고
    • Measuring network change: Renyi cross entropy and the second order degree distribution
    • Adelaide, Australia, Apr
    • F. H. Edward, "Measuring network change: Renyi cross entropy and the second order degree distribution", in Proc. Passive and Active Measurement Conf. 2006, Adelaide, Australia, Apr. 2006.
    • (2006) Proc. Passive and Active Measurement Conf. 2006
    • Edward, F.H.1
  • 44
    • 84878701863 scopus 로고    scopus 로고
    • Detecting anomalies in network traffic using maximum entropy estimation
    • Berkeley, CA
    • Y. Gu, A. McCallum, and D. Towsley, "Detecting anomalies in network traffic using maximum entropy estimation", in Proc. 5th ACM SIGCOMM Conf. Internet Measurement, Berkeley, CA, 2005, pp. 32-37.
    • (2005) Proc. 5th ACM SIGCOMM Conf. Internet Measurement , pp. 32-37
    • Gu, Y.1    McCallum, A.2    Towsley, D.3
  • 45
    • 47249154789 scopus 로고    scopus 로고
    • A methodology for finding significant network hosts
    • Dublin, Ireland
    • D. Lee and N. Brownlee, "A methodology for finding significant network hosts", in Proc. 32nd IEEE Conf. Local Computer Networks, Dublin, Ireland, 2007, pp. 981-988.
    • (2007) Proc. 32nd IEEE Conf. Local Computer Networks , pp. 981-988
    • Lee, D.1    Brownlee, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.