-
1
-
-
42549122173
-
Traffic-aware firewall optimization strategies
-
S. Acharya, J. Wang, Z. Ge, T. F. Znati, and A. Greenberg. Traffic-aware firewall optimization strategies. In Proc. International Conference on Communications, 2006.
-
(2006)
Proc. International Conference on Communications
-
-
Acharya, S.1
Wang, J.2
Ge, Z.3
Znati, T.F.4
Greenberg, A.5
-
2
-
-
36949005787
-
Estimating sums of arbitrary selections with few probes
-
N. Alon, N. G. Duffield, C. Lund, and M. Thorup. Estimating sums of arbitrary selections with few probes. In PODS, 2005.
-
(2005)
PODS
-
-
Alon, N.1
Duffield, N.G.2
Lund, C.3
Thorup, M.4
-
4
-
-
0042976157
-
Packet classification for core routers: Is there an alternative to CAMs?
-
F. Baboescu, S. Singh, and G. Varghese. Packet classification for core routers: Is there an alternative to CAMs? In Proc. IEEE INFOCOM, 2003.
-
(2003)
Proc. IEEE INFOCOM
-
-
Baboescu, F.1
Singh, S.2
Varghese, G.3
-
5
-
-
0003298911
-
Traffic flow measurement: Experiences with NeTraMet
-
N. Brownlee. Traffic Flow Measurement: Experiences with NeTraMet. RFC 2123, 1997.
-
(1997)
RFC 2123
-
-
Brownlee, N.1
-
7
-
-
0022769976
-
Graph-based algorithms for boolean function manipulation
-
R. E. Bryant. Graph-based algorithms for boolean function manipulation. IEEE Trans. Computers, 35(8), 1986.
-
(1986)
IEEE Trans. Computers
, vol.35
, Issue.8
-
-
Bryant, R.E.1
-
9
-
-
16344394506
-
Predicting resource usage and estimation accuracy in an IP flow measurement collection infrastructure
-
N. Duffield and C. Lund. Predicting resource usage and estimation accuracy in an IP flow measurement collection infrastructure. In Proc. Internet Measurement Conference, 2003.
-
(2003)
Proc. Internet Measurement Conference
-
-
Duffield, N.1
Lund, C.2
-
11
-
-
18544383616
-
Learn more, sample less: Control of volume and variance in network measurement
-
N. G. Duffield, C. Lund, and M. Thorup. Learn more, sample less: control of volume and variance in network measurement. IEEE Trans. Information Theory, 51, 2005.
-
IEEE Trans. Information Theory
, vol.51
-
-
Duffield, N.G.1
Lund, C.2
Thorup, M.3
-
14
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
C. Estan, S. Savage, and G. Varghese. Automatically inferring patterns of resource consumption in network traffic. In Proc. ACM SIGCOMM, 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
15
-
-
2442583610
-
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
-
C. Estan and G. Varghese. New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice. ACM Trans. Computer Systems, 2003.
-
(2003)
ACM Trans. Computer Systems
-
-
Estan, C.1
Varghese, G.2
-
16
-
-
0041904827
-
Deriving traffic demands for operational IP networks: Methodology and experience
-
A. Feldmann, A. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving traffic demands for operational IP networks: Methodology and experience. In Proc. ACM SIGCOMM, 2000.
-
(2000)
Proc. ACM SIGCOMM
-
-
Feldmann, A.1
Greenberg, A.2
Lund, C.3
Reingold, N.4
Rexford, J.5
True, F.6
-
19
-
-
33845682267
-
ACCEL-RATE: A faster mechanism for memory efficient per-flow traffic estimation
-
F. Hao, M. S. Kodialam, and T. V. Lakshman. ACCEL-RATE: a faster mechanism for memory efficient per-flow traffic estimation. In Proc. ACM SIGMETRICS, 2004.
-
(2004)
Proc. ACM SIGMETRICS
-
-
Hao, F.1
Kodialam, M.S.2
Lakshman, T.V.3
-
20
-
-
25844475315
-
Fast, memory-efficient traffic estimation by coincidence counting
-
F. Hao, M. S. Kodialam, T. V. Lakshman, and H. Zhang. Fast, memory-efficient traffic estimation by coincidence counting. In Proc. IEEE INFOCOM, 2005.
-
(2005)
Proc. IEEE INFOCOM
-
-
Hao, F.1
Kodialam, M.S.2
Lakshman, T.V.3
Zhang, H.4
-
24
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In Proc. IEEE Symp. Security & Privacy, Oakland, CA, 2004.
-
(2004)
Proc. IEEE Symp. Security & Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
25
-
-
8344244495
-
Runs bAsed traffic estimator (RATE): A simple, memory efficient scheme for per-flow rate estimation
-
M. Kodialam, T. Lakshman, and S. Mohanty. Runs bAsed Traffic Estimator (RATE): A simple, memory efficient scheme for per-flow rate estimation. In Proc. IEEE INFOCOM, 2004.
-
(2004)
Proc. IEEE INFOCOM
-
-
Kodialam, M.1
Lakshman, T.2
Mohanty, S.3
-
26
-
-
84876219825
-
-
version 2.4
-
J. Lind-Nielsen. BuDDy version 2.4. http://sourceforge.net/projects/ buddy, 2004.
-
(2004)
BuDDy
-
-
Lind-Nielsen, J.1
-
27
-
-
8344231659
-
InMon corporation's sFlow: A method for monitoring traffic in switched and routed networks
-
P. Phaal, S. Panchen, and N. McKee. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks. RFC 3176, 2001.
-
(2001)
RFC 3176
-
-
Phaal, P.1
Panchen, S.2
McKee, N.3
-
28
-
-
0141552473
-
FlowScan: A network traffic flow reporting and visualization tool
-
D. Plonka. FlowScan: A network traffic flow reporting and visualization tool. In Proc. USENIX LISA, 2000.
-
(2000)
Proc. USENIX LISA
-
-
Plonka, D.1
-
29
-
-
79951945289
-
-
Jan
-
Team Cymru. The Team Cymru Bogon List v3.4. http://www.cymru.com/ Documents/bogon-list.html, Jan 2007.
-
(2007)
The Team Cymru Bogon List V3.4
-
-
-
31
-
-
84876279382
-
-
AS names. http://bgp.potaroo.net/cidr/autnums.html.
-
AS Names
-
-
-
32
-
-
84876240947
-
-
Autofocus. http://ial.ucsd.edu/AutoFocus/.
-
Autofocus
-
-
-
34
-
-
36949003648
-
-
Jan
-
CIDR report. http://www.cidr-report.org/, Jan 2007.
-
(2007)
CIDR Report
-
-
-
35
-
-
84876279652
-
-
NetFlow v9 Export Format. http://www.cisco.com/univercd/cc/td/doc/ product/software/ios123/123newft/123-1/nfv9expf.htm.
-
NetFlow V9 Export Format
-
-
-
37
-
-
33751028760
-
FIREMAN: A toolkit for FIREwall modeling and ANalysis
-
L. Yuan, J. Mai, Z. Su, H. Chen, C.-N. Chuah, and P. Mohapatra. FIREMAN: A Toolkit for FIREwall Modeling and ANalysis. In Proc. IEEE Symp. Security & Privacy, 2006.
-
(2006)
Proc. IEEE Symp. Security & Privacy
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.-N.5
Mohapatra, P.6
-
38
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund. Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In Proc. Internet Measurement Conference, 2004.
-
(2004)
Proc. Internet Measurement Conference
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
|