메뉴 건너뛰기




Volumn , Issue , 2010, Pages

MAWILab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALY DETECTOR; COMBINATION STRATEGIES; DIMENSIONALITY REDUCTION; FALSE POSITIVE; GRAPH-BASED; GROUND TRUTH; PERFORMANCE BENCHMARKING; TRAFFIC FEATURES; TRAFFIC MONITORING; TRAFFIC TRACES;

EID: 79951608572     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1921168.1921179     Document Type: Conference Paper
Times cited : (203)

References (35)
  • 1
    • 79951611663 scopus 로고    scopus 로고
    • MAWILab.
    • MAWILab. http://www.fukuda-lab.org/mawilab/.
  • 2
    • 0002221136 scopus 로고
    • Fast algorithms for mining association rules in large databases
    • R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB '94, pages 487-499, 1994.
    • (1994) VLDB '94 , pp. 487-499
    • Agrawal, R.1    Srikant, R.2
  • 3
    • 77955347054 scopus 로고    scopus 로고
    • An information-theoretic combining method for multi-classifier anomaly detection systems
    • A. B. Ashfaq, M. Javed, S. A. Khayam, and H. Radha. An information-theoretic combining method for multi-classifier anomaly detection systems. ICC '10, page 5, 2010.
    • (2010) ICC '10 , pp. 5
    • Ashfaq, A.B.1    Javed, M.2    Khayam, S.A.3    Radha, H.4
  • 4
    • 0141427794 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. IMW '02, pages 71-82, 2002.
    • (2002) IMW '02 , pp. 71-82
    • Barford, P.1    Kline, J.2    Plonka, D.3    Ron, A.4
  • 7
    • 70349684725 scopus 로고    scopus 로고
    • Seven years and one day: Sketching the evolution of internet traffic
    • P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho. Seven years and one day: Sketching the evolution of internet traffic. INFOCOM '09, pages 711-719, 2009.
    • (2009) INFOCOM '09 , pp. 711-719
    • Borgnat, P.1    Dewaele, G.2    Fukuda, K.3    Abry, P.4    Cho, K.5
  • 8
    • 77956376882 scopus 로고    scopus 로고
    • Anomaly extraction in backbone networks using association rules
    • D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly extraction in backbone networks using association rules. IMC '09, pages 28-34, 2009.
    • (2009) IMC '09 , pp. 28-34
    • Brauckhoff, D.1    Dimitropoulos, X.2    Wagner, A.3    Salamatian, K.4
  • 11
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
    • G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. SIGCOMM LSAD '07, pages 145-152, 2007.
    • (2007) SIGCOMM LSAD '07 , pp. 145-152
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 12
    • 0035416013 scopus 로고    scopus 로고
    • Difficulties in simulating the Internet
    • DOI 10.1109/90.944338, PII S1063669201068546
    • S. Floyd and V. Paxson. Difficulties in simulating the internet. IEEE/ACM Trans. Netw., 9(4):392-403, 2001. (Pubitemid 32933055)
    • (2001) IEEE/ACM Transactions on Networking , vol.9 , Issue.4 , pp. 392-403
    • Floyd, S.1    Paxson, V.2
  • 14
    • 79951609999 scopus 로고    scopus 로고
    • A Hough-transform-based anomaly detector with an adaptive time interval
    • R. Fontugne and K. Fukuda. A Hough-transform-based anomaly detector with an adaptive time interval. ACM SAC '11, 2011.
    • (2011) ACM SAC '11
    • Fontugne, R.1    Fukuda, K.2
  • 15
    • 74049087026 scopus 로고    scopus 로고
    • Community detection in graphs
    • S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75-174, 2010.
    • (2010) Physics Reports , vol.486 , Issue.3-5 , pp. 75-174
    • Fortunato, S.1
  • 16
    • 77953281376 scopus 로고    scopus 로고
    • A longitudinal study of small-time scaling behavior of internet traffic
    • H. Gupta, V. J. Ribeiro, and A. Mahanti. A longitudinal study of small-time scaling behavior of internet traffic. In Proceedings of NETWORKING 2010, pages 83-95, 2010.
    • (2010) Proceedings of Networking 2010 , pp. 83-95
    • Gupta, H.1    Ribeiro, V.J.2    Mahanti, A.3
  • 17
    • 70449501437 scopus 로고    scopus 로고
    • An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm
    • Y. Himura, K. Fukuda, K. Cho, and H. Esaki. An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm. ICC '09, page 6, 2009.
    • (2009) ICC '09 , pp. 6
    • Himura, Y.1    Fukuda, K.2    Cho, K.3    Esaki, H.4
  • 18
    • 79551647326 scopus 로고    scopus 로고
    • An evaluation of anomaly detection based on sketch and PCA
    • Y. Kanda, K. Fukuda, and T. Sugawara. An evaluation of anomaly detection based on sketch and PCA. GLOBECOM '10, 2010.
    • (2010) GLOBECOM '10
    • Kanda, Y.1    Fukuda, K.2    Sugawara, T.3
  • 21
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing networkwide traffic anomalies
    • A. Lakhina, M. Crovella, and C. Diot. Diagnosing networkwide traffic anomalies. SIGCOMM '04, pages 219-230, 2004.
    • (2004) SIGCOMM '04 , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 22
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. SIGCOMM '05, pages 217-228, 2005.
    • (2005) SIGCOMM '05 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 25
    • 85019691440 scopus 로고    scopus 로고
    • Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
    • J. Mchugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3(4):262-294, 2000.
    • (2000) ACM Trans. Inf. Syst. Secur. , vol.3 , Issue.4 , pp. 262-294
    • Mchugh, J.1
  • 26
    • 0032661927 scopus 로고    scopus 로고
    • Using correspondence analysis to combine classifiers
    • C. J. Merz. Using correspondence analysis to combine classifiers. Mach. Learn., 36(1-2):33-58, 1999.
    • (1999) Mach. Learn. , vol.36 , Issue.1-2 , pp. 33-58
    • Merz, C.J.1
  • 27
    • 63049084484 scopus 로고    scopus 로고
    • An empirical evaluation of entropy-based traffic anomaly detection
    • G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang. An empirical evaluation of entropy-based traffic anomaly detection. IMC '08, pages 151-156, 2008.
    • (2008) IMC '08 , pp. 151-156
    • Nychis, G.1    Sekar, V.2    Andersen, D.G.3    Kim, H.4    Zhang, H.5
  • 29
    • 78650720508 scopus 로고    scopus 로고
    • The need for simulation in evaluating anomaly detectors
    • H. Ringberg, M. Roughan, and J. Rexford. The need for simulation in evaluating anomaly detectors. SIGCOMM Comput. Commun. Rev., 38(1):55-59, 2008.
    • (2008) SIGCOMM Comput. Commun. Rev. , vol.38 , Issue.1 , pp. 55-59
    • Ringberg, H.1    Roughan, M.2    Rexford, J.3
  • 30
    • 36349029177 scopus 로고    scopus 로고
    • Sensitivity of PCA for traffic anomaly detection
    • DOI 10.1145/1269899.1254895, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
    • H. Ringberg, A. Soule, J. Rexford, and C. Diot. Sensitivity of PCA for traffic anomaly detection. SIGMETRICS Perform. Eval. Rev., 35(1):109-120, 2007. (Pubitemid 350158077)
    • (2007) Performance Evaluation Review , vol.35 , Issue.1 , pp. 109-120
    • Ringberg, H.1    Soule, A.2    Rexford, J.3    Diot, C.4
  • 33
    • 65249105995 scopus 로고    scopus 로고
    • Accurate anomaly detection through parallelism
    • S. Shanbhag and T. Wolf. Accurate anomaly detection through parallelism. Netwrk. Mag. of Global Internetwkg., 23(1):22-28, 2009.
    • (2009) Netwrk. Mag. of Global Internetwkg. , vol.23 , Issue.1 , pp. 22-28
    • Shanbhag, S.1    Wolf, T.2
  • 35
    • 85008008496 scopus 로고    scopus 로고
    • Internet traffic behavior profiling for network security monitoring
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya. Internet traffic behavior profiling for network security monitoring. IEEE/ACM Trans. Netw., 16(6):1241-1252, 2008.
    • (2008) IEEE/ACM Trans. Netw. , vol.16 , Issue.6 , pp. 1241-1252
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.