-
1
-
-
85039557495
-
-
Flexible Netflow. http://www.cisco.com/en/US/products/ps6965/products- ios-protocol-option-home.html,.
-
Flexible Netflow
-
-
-
2
-
-
85167537099
-
-
Juniper cflowd. http://www.juniper.net/techpubs/software/junos/junos91/ swconfig-policy/cflowd.html.
-
Juniper Cflowd
-
-
-
4
-
-
77956268717
-
-
NetFlow Input Filters. http://www.cisco.com/en/US/docs/ios/12-3t/12-3t4/ feature/guide/gtnfinpf.html.
-
NetFlow Input Filters
-
-
-
5
-
-
33144483813
-
-
Packet Sampling, IETFWorking Group Charter. http://www.ietf.org/html. charters/psamp/charter/.
-
Packet Sampling
-
-
-
6
-
-
48349100653
-
Loss and delay accountability for the internet
-
K. Argyraki, P. Maniatis, O. Irzak, S. Ashish, and S. Shenker. Loss and Delay Accountability for the Internet. In Proc. ICNP, 2007.
-
(2007)
Proc. ICNP
-
-
Argyraki, K.1
Maniatis, P.2
Irzak, O.3
Ashish, S.4
Shenker, S.5
-
7
-
-
78650918072
-
Impact of traffic sampling on anomaly detection metrics
-
D. Brauckhoff, B. Tellenbach, A. Wagner, A. Lakhina, and M. May. Impact of Traffic Sampling on Anomaly Detection Metrics. In Proc. IMC, 2006.
-
(2006)
Proc. IMC
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
Lakhina, A.4
May, M.5
-
9
-
-
77953861458
-
Reformulating the monitor placement problem: Optimal network-wide sampling
-
G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran. Reformulating the Monitor Placement problem: Optimal Network-Wide Sampling. In Proc. CoNeXT, 2006.
-
(2006)
Proc. CoNeXT
-
-
Cantieni, G.R.1
Iannaccone, G.2
Barakat, C.3
Diot, C.4
Thiran, P.5
-
10
-
-
84880086639
-
PLUG: Flexible lookup modules for rapid deployment of new protocols in high-speed routers
-
L. D. Carli, Y. Pan, A. Kumar, C. Estan, and K. Sankaralingam. PLUG: Flexible Lookup Modules for Rapid Deployment of New Protocols in High-speed Routers. In Proc. SIGCOMM, 2010.
-
(2010)
Proc. SIGCOMM
-
-
Carli, L.D.1
Pan, Y.2
Kumar, A.3
Estan, C.4
Sankaralingam, K.5
-
11
-
-
33746913393
-
Cisco systems netflow services export version 9
-
B. Claise. Cisco Systems NetFlow Services Export Version 9. RFC 3954.
-
RFC 3954
-
-
Claise, B.1
-
12
-
-
44449130555
-
Finding peer-to-peer file-sharing using coarse network behaviors
-
M. P. Collins and M. K. Reiter. Finding Peer-to-Peer File-sharing using Coarse Network Behaviors. In Proc. ESORICS, 2006.
-
(2006)
Proc. ESORICS
-
-
Collins, M.P.1
Reiter, M.K.2
-
13
-
-
14844367057
-
An improved data stream summary: The count-min sketch and its applications
-
G. Cormode and S. Muthukrishnan. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms, 55, 2005.
-
(2005)
Journal of Algorithms
, vol.55
-
-
Cormode, G.1
Muthukrishnan, S.2
-
17
-
-
0141440878
-
New directions in traffic measurement and accounting
-
C. Estan and G. Varghese. New Directions in Traffic Measurement and Accounting. In Proc. ACM SIGCOMM, 2002.
-
(2002)
Proc. ACM SIGCOMM
-
-
Estan, C.1
Varghese, G.2
-
18
-
-
0041904827
-
Deriving traffic demands for operational IP networks: Methodology and experience
-
A. Feldmann, A. G. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving Traffic Demands for Operational IP Networks: Methodology and Experience. In Proc. ACM SIGCOMM, 2000.
-
(2000)
Proc. ACM SIGCOMM
-
-
Feldmann, A.1
Greenberg, A.G.2
Lund, C.3
Reingold, N.4
Rexford, J.5
True, F.6
-
21
-
-
19544362049
-
Inverting sampled traffic
-
N. Hohn and D. Veitch. Inverting Sampled Traffic. In Proc. IMC, 2003.
-
(2003)
Proc. IMC
-
-
Hohn, N.1
Veitch, D.2
-
23
-
-
35448978150
-
A robust system for accurate real-time summaries of internet traffic
-
K. Keys, D. Moore, and C. Estan. A Robust System for Accurate Real-time Summaries of Internet Traffic. In Proc. SIGMETRICS, 2005.
-
(2005)
Proc. SIGMETRICS
-
-
Keys, K.1
Moore, D.2
Estan, C.3
-
24
-
-
84878744709
-
The power of slicing in internet flow measurement
-
R. Kompella and C. Estan. The Power of Slicing in Internet Flow Measurement. In Proc. IMC, 2005.
-
(2005)
Proc. IMC
-
-
Kompella, R.1
Estan, C.2
-
25
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen. Sketch-based change detection: Methods, evaluation, and applications. In Proc. ACM IMC, 2003.
-
(2003)
Proc. ACM IMC
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
26
-
-
17644366974
-
Data streaming algorithms for efficient and accurate estimation of flow distribution
-
A. Kumar, M. Sung, J. Xu, and J. Wang. Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Distribution. In Proc. ACM SIGMETRICS, 2004.
-
(2004)
Proc. ACM SIGMETRICS
-
-
Kumar, A.1
Sung, M.2
Xu, J.3
Wang, J.4
-
27
-
-
33845633068
-
Sketch guided sampling - Using on-line estimates of flow size for adaptive data collection
-
A. Kumar and J. Xu. Sketch Guided Sampling - Using On-Line Estimates of Flow Size for Adaptive Data Collection. In Proc. IEEE Infocom, 2006.
-
(2006)
Proc. IEEE Infocom
-
-
Kumar, A.1
Xu, J.2
-
30
-
-
34748907928
-
Data streaming algorithms for estimating entropy of network traffic
-
A. Lall, V. Sekar, J. Xu, M. Ogihara, and H. Zhang. Data Streaming Algorithms for Estimating Entropy of Network Traffic. In Proc. ACM SIGMETRICS, 2006.
-
(2006)
Proc. ACM SIGMETRICS
-
-
Lall, A.1
Sekar, V.2
Xu, J.3
Ogihara, M.4
Zhang, H.5
-
31
-
-
57349116869
-
Counter braids: A novel counter architecture for per-flow measurement
-
Y. Lu, A. Montanari, B. Prabhakar, S. Dharmapurikar, and A. Kabbani. Counter Braids: A Novel Counter Architecture for Per-Flow Measurement. In Proc. SIGMETRICS, 2008.
-
(2008)
Proc. SIGMETRICS
-
-
Lu, Y.1
Montanari, A.2
Prabhakar, B.3
Dharmapurikar, S.4
Kabbani, A.5
-
32
-
-
70349659455
-
Hit-listworm detection and bot identification in large networks using protocol graphs
-
M. P. Collins and M. K. Reiter. Hit-listWorm Detection and Bot Identification in Large Networks Using Protocol Graphs. In Proc. RAID, 2007.
-
(2007)
Proc. RAID
-
-
Collins, M.P.1
Reiter, M.K.2
-
33
-
-
63049129490
-
A generic language for application-specific flow sampling
-
Apr.
-
H. Madhyastha and B. Krishnamurthy. A Generic Language for Application-Specific Flow Sampling. ACM CCR, 38(2):7-15, Apr. 2008.
-
(2008)
ACM CCR
, vol.38
, Issue.2
, pp. 7-15
-
-
Madhyastha, H.1
Krishnamurthy, B.2
-
34
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang. Is Sampled Data Sufficient for Anomaly Detection? In Proc. IMC, 2006.
-
(2006)
Proc. IMC
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
36
-
-
34547402403
-
Fisher information of sampled packets: An application to flow size estimation
-
B. Ribeiro, D. Towsley, T. Ye, and J. Bolot. Fisher information of sampled packets: an application to flow size estimation. In Proc. IMC, 2006.
-
(2006)
Proc. IMC
-
-
Ribeiro, B.1
Towsley, D.2
Ye, T.3
Bolot, J.4
-
37
-
-
36949037456
-
Segmented hash: An efficient hash table implementation for high performance networking subsystems
-
S. Kumar and P. Crowley. Segmented Hash: An Efficient Hash Table Implementation for High Performance Networking Subsystems. In Proc. ACM ANCS, 2005.
-
(2005)
Proc. ACM ANCS
-
-
Kumar, S.1
Crowley, P.2
-
38
-
-
79955747674
-
LADS: Large-scale automated DDoS detection system
-
V. Sekar, N. Duffield, K. van der Merwe, O. Spatscheck, and H. Zhang. LADS: Large-scale Automated DDoS Detection System. In Proc. USENIX ATC, 2006.
-
(2006)
Proc. USENIX ATC
-
-
Sekar, V.1
Duffield, N.2
Van Der Merwe, K.3
Spatscheck, O.4
Zhang, H.5
-
39
-
-
84999424855
-
CSamp: A system for network-wide flow monitoring
-
V. Sekar, M. K. Reiter,W. Willinger, H. Zhang, R. Kompella, and D. G. Andersen. cSamp: A System for Network-Wide Flow Monitoring. In Proc. NSDI, 2008.
-
(2008)
Proc. NSDI
-
-
Sekar, V.1
Reiter, M.K.2
Willinger, W.3
Zhang, H.4
Kompella, R.5
Andersen, D.G.6
-
40
-
-
77952205400
-
Coordinated sampling sans origin-destination identifiers: Algorithms and analysis
-
V. Sekar, A. Gupta, M. K. Reiter and H. Zhang. Coordinated Sampling sans Origin-Destination Identifiers: Algorithms and Analysis. In Proc. COMSNSETS, 2010.
-
(2010)
Proc. COMSNSETS
-
-
Sekar, V.1
Gupta, A.2
Reiter, M.K.3
Zhang, H.4
-
42
-
-
27544495684
-
Worm origin identification using random moonwalks
-
Y. Xie, V. Sekar, D. A. Maltz, M. K. Reiter, and H. Zhang. Worm Origin Identification Using Random Moonwalks. In Proc. IEEE Symposium on Security and Privacy, 2005.
-
(2005)
Proc. IEEE Symposium on Security and Privacy
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.A.3
Reiter, M.K.4
Zhang, H.5
-
43
-
-
33645792808
-
Profiling internet backbone traffic: Behavior models and applications
-
K. Xu, Z.-L. Zhang, and S. Bhattacharya. Profiling Internet Backbone Traffic: Behavior Models and Applications. In Proc. ACM SIGCOMM, 2005.
-
(2005)
Proc. ACM SIGCOMM
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharya, S.3
-
44
-
-
85167536084
-
Detecting stealthy attacks using online histograms
-
Y. Gao, Y. Zhao, R. Schweller, S. Venkataraman, Y. Chen, D. Song and M.-Y. Kao. Detecting Stealthy Attacks Using Online Histograms. In Proc. IWQoS, 2007.
-
(2007)
Proc. IWQoS
-
-
Gao, Y.1
Zhao, Y.2
Schweller, R.3
Venkataraman, S.4
Chen, Y.5
Song, D.6
Kao, M.-Y.7
-
46
-
-
34548304199
-
Design of a novel statistics counter architecture with optimal space and time efficiency
-
Q. Zhao, J. Xu, and Z. Liu. Design of a novel statistics counter architecture with optimal space and time efficiency. In Proc. ACM SIGMETRICS, 2006.
-
(2006)
Proc. ACM SIGMETRICS
-
-
Zhao, Q.1
Xu, J.2
Liu, Z.3
|