메뉴 건너뛰기




Volumn , Issue , 2010, Pages 313-319

Combining sketch and wavelet models for anomaly detection

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTION; DATA SETS; DATA SUMMARIZATION TECHNIQUES; LOW-INTENSITY; MALICIOUS TRAFFIC; MALWARES; NETWORK DATA; OTHER ALGORITHMS; PRIOR KNOWLEDGE; RANDOM PROJECTIONS; TIME-SERIES DATA; TRAFFIC TRACES;

EID: 78650139152     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCP.2010.5606421     Document Type: Conference Paper
Times cited : (14)

References (17)
  • 1
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • November
    • Paul Barford, Jeffery Kline, David Plonka, and Amos Ron, "A signal analysis of network traffic anomalies," In IMW, pp. 71-82, November 2002.
    • (2002) IMW , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 3
    • 62349121593 scopus 로고    scopus 로고
    • LD2: A system for lightweight detection of denial-of-service attacks
    • Conventional Center, San Diego, CA, USA, 17-19 November
    • Sirikarn Pukkawanna, Panita Pongpaibool, and Vasaka Visoottiviseth, "LD2: A System for Lightweight Detection of Denial-Of-Service Attacks", In Proc. of MILCOM 2008, Conventional Center, San Diego, CA, USA, 17-19 November, 2008
    • (2008) Proc. of MILCOM 2008
    • Pukkawanna, S.1    Pongpaibool, P.2    Visoottiviseth, V.3
  • 7
    • 11844281602 scopus 로고    scopus 로고
    • Technical Report, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901, March
    • Matthew V. Mahoney, Philip K. Chan, and Muhammad H. Arshad, "A machine learning approach to anomaly detection", Technical Report, Department of Computer Science, Florida Institute of Technology Melbourne FL 32901, March 2003.
    • (2003) A Machine Learning Approach to Anomaly Detection
    • Mahoney, M.V.1    Chan, P.K.2    Arshad, M.H.3
  • 9
    • 78650098476 scopus 로고    scopus 로고
    • Sketch-based change detection: Methods, evaluation, and applications
    • October
    • B. Krishnamurty, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: Methods, evaluation, and applications," In ACM IMC, October 2003.
    • (2003) ACM IMC
    • Krishnamurty, B.1    Sen, S.2    Zhang, Y.3    Chen, Y.4
  • 10
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedure
    • August
    • G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, "Extracting Hidden Anomalies using Sketch and Non Gaussian Multiresolution Statistical Detection Procedure," In ACM SIGCOMM LSAD'07, pp. 145-152, August 2007.
    • (2007) ACM SIGCOMM LSAD'07 , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 11
    • 77954320174 scopus 로고    scopus 로고
    • Detection and identification of network anomalies using sketch subspaces
    • October
    • X. Li et al, "Detection and identification of network anomalies using sketch subspaces", In ACM IMC, October 2006.
    • (2006) ACM IMC
    • Li, X.1
  • 12
    • 38149030783 scopus 로고    scopus 로고
    • Nada - Network anomaly detection algorithm
    • S. Farraposo, P. Owezarski, and E. Monteiro, "Nada - network anomaly detection algorithm," In DSOM '07, 4785:191-194, 2007.
    • (2007) DSOM '07 , vol.4785 , pp. 191-194
    • Farraposo, S.1    Owezarski, P.2    Monteiro, E.3
  • 15
    • 78650127009 scopus 로고    scopus 로고
    • Sasser port
    • Sasser port, https://tools.cisco.com/security/center/viewAlert.x?alertId= 7608
  • 16
    • 78650146395 scopus 로고    scopus 로고
    • Worm port, http://en.wikipedia.org/wiki/Sasser-%28computer-worm%29
  • 17
    • 78650154485 scopus 로고    scopus 로고
    • Worm port
    • Worm port, http://reviews.cnet.com/4520-6600-7-5133023-1.html


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.