-
1
-
-
79951611663
-
-
MAWILab.
-
MAWILab. http://www.fukuda-lab.org/mawilab/.
-
-
-
-
2
-
-
0002221136
-
Fast algorithms for mining association rules in large databases
-
R. Agrawal and R. Srikant. Fast algorithms for mining association rules in large databases. In VLDB '94, pages 487-499, 1994.
-
(1994)
VLDB '94
, pp. 487-499
-
-
Agrawal, R.1
Srikant, R.2
-
3
-
-
77955347054
-
An information-theoretic combining method for multi-classifier anomaly detection systems
-
A. B. Ashfaq, M. Javed, S. A. Khayam, and H. Radha. An information-theoretic combining method for multi-classifier anomaly detection systems. ICC '10, page 5, 2010.
-
(2010)
ICC '10
, pp. 5
-
-
Ashfaq, A.B.1
Javed, M.2
Khayam, S.A.3
Radha, H.4
-
4
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
P. Barford, J. Kline, D. Plonka, and A. Ron. A signal analysis of network traffic anomalies. IMW '02, pages 71-82, 2002.
-
(2002)
IMW '02
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
7
-
-
70349684725
-
Seven years and one day: Sketching the evolution of internet traffic
-
P. Borgnat, G. Dewaele, K. Fukuda, P. Abry, and K. Cho. Seven years and one day: Sketching the evolution of internet traffic. INFOCOM '09, pages 711-719, 2009.
-
(2009)
INFOCOM '09
, pp. 711-719
-
-
Borgnat, P.1
Dewaele, G.2
Fukuda, K.3
Abry, P.4
Cho, K.5
-
8
-
-
77956376882
-
Anomaly extraction in backbone networks using association rules
-
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian. Anomaly extraction in backbone networks using association rules. IMC '09, pages 28-34, 2009.
-
(2009)
IMC '09
, pp. 28-34
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
10
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
H. chul Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee. Internet traffic classification demystified: Myths, caveats, and the best practices. CoNEXT '08, 2008.
-
(2008)
CoNEXT '08
-
-
Chul Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
11
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. SIGCOMM LSAD '07, pages 145-152, 2007.
-
(2007)
SIGCOMM LSAD '07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
12
-
-
0035416013
-
Difficulties in simulating the Internet
-
DOI 10.1109/90.944338, PII S1063669201068546
-
S. Floyd and V. Paxson. Difficulties in simulating the internet. IEEE/ACM Trans. Netw., 9(4):392-403, 2001. (Pubitemid 32933055)
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.4
, pp. 392-403
-
-
Floyd, S.1
Paxson, V.2
-
13
-
-
77952026726
-
Uncovering relations between traffic classifiers and anomaly detectors via graph theory
-
R. Fontugne, P. Borgnat, P. Abry, and K. Fukuda. Uncovering relations between traffic classifiers and anomaly detectors via graph theory. In International Workshop on Traffic Monitoring and Analysis (TMA '10), pages 101-114, 2010.
-
(2010)
International Workshop on Traffic Monitoring and Analysis (TMA '10)
, pp. 101-114
-
-
Fontugne, R.1
Borgnat, P.2
Abry, P.3
Fukuda, K.4
-
14
-
-
79951609999
-
A Hough-transform-based anomaly detector with an adaptive time interval
-
R. Fontugne and K. Fukuda. A Hough-transform-based anomaly detector with an adaptive time interval. ACM SAC '11, 2011.
-
(2011)
ACM SAC '11
-
-
Fontugne, R.1
Fukuda, K.2
-
15
-
-
74049087026
-
Community detection in graphs
-
S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75-174, 2010.
-
(2010)
Physics Reports
, vol.486
, Issue.3-5
, pp. 75-174
-
-
Fortunato, S.1
-
16
-
-
77953281376
-
A longitudinal study of small-time scaling behavior of internet traffic
-
H. Gupta, V. J. Ribeiro, and A. Mahanti. A longitudinal study of small-time scaling behavior of internet traffic. In Proceedings of NETWORKING 2010, pages 83-95, 2010.
-
(2010)
Proceedings of Networking 2010
, pp. 83-95
-
-
Gupta, H.1
Ribeiro, V.J.2
Mahanti, A.3
-
17
-
-
70449501437
-
An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm
-
Y. Himura, K. Fukuda, K. Cho, and H. Esaki. An automatic and dynamic parameter tuning of a statistics-based anomaly detection algorithm. ICC '09, page 6, 2009.
-
(2009)
ICC '09
, pp. 6
-
-
Himura, Y.1
Fukuda, K.2
Cho, K.3
Esaki, H.4
-
18
-
-
79551647326
-
An evaluation of anomaly detection based on sketch and PCA
-
Y. Kanda, K. Fukuda, and T. Sugawara. An evaluation of anomaly detection based on sketch and PCA. GLOBECOM '10, 2010.
-
(2010)
GLOBECOM '10
-
-
Kanda, Y.1
Fukuda, K.2
Sugawara, T.3
-
21
-
-
21844451952
-
Diagnosing networkwide traffic anomalies
-
A. Lakhina, M. Crovella, and C. Diot. Diagnosing networkwide traffic anomalies. SIGCOMM '04, pages 219-230, 2004.
-
(2004)
SIGCOMM '04
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
22
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot. Mining anomalies using traffic feature distributions. SIGCOMM '05, pages 217-228, 2005.
-
(2005)
SIGCOMM '05
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
23
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina. Detection and identification of network anomalies using sketch subspaces. IMC '06, pages 147-152, 2006.
-
(2006)
IMC '06
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
24
-
-
0034301517
-
The 1999 darpa off-line intrusion detection evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. The 1999 darpa off-line intrusion detection evaluation. Computer Networks, 34(4):579-595, 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
25
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. Mchugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3(4):262-294, 2000.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, Issue.4
, pp. 262-294
-
-
Mchugh, J.1
-
26
-
-
0032661927
-
Using correspondence analysis to combine classifiers
-
C. J. Merz. Using correspondence analysis to combine classifiers. Mach. Learn., 36(1-2):33-58, 1999.
-
(1999)
Mach. Learn.
, vol.36
, Issue.1-2
, pp. 33-58
-
-
Merz, C.J.1
-
27
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang. An empirical evaluation of entropy-based traffic anomaly detection. IMC '08, pages 151-156, 2008.
-
(2008)
IMC '08
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
29
-
-
78650720508
-
The need for simulation in evaluating anomaly detectors
-
H. Ringberg, M. Roughan, and J. Rexford. The need for simulation in evaluating anomaly detectors. SIGCOMM Comput. Commun. Rev., 38(1):55-59, 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.1
, pp. 55-59
-
-
Ringberg, H.1
Roughan, M.2
Rexford, J.3
-
30
-
-
36349029177
-
Sensitivity of PCA for traffic anomaly detection
-
DOI 10.1145/1269899.1254895, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
-
H. Ringberg, A. Soule, J. Rexford, and C. Diot. Sensitivity of PCA for traffic anomaly detection. SIGMETRICS Perform. Eval. Rev., 35(1):109-120, 2007. (Pubitemid 350158077)
-
(2007)
Performance Evaluation Review
, vol.35
, Issue.1
, pp. 109-120
-
-
Ringberg, H.1
Soule, A.2
Rexford, J.3
Diot, C.4
-
31
-
-
84877775237
-
Antidote: Understanding and defending against poisoning of anomaly detectors
-
B. I. Rubinstein, B. Nelson, L. Huang, A. D. Joseph, S.-h. Lau, S. Rao, N. Taft, and J. D. Tygar. Antidote: understanding and defending against poisoning of anomaly detectors. IMC '09, pages 1-14, 2009.
-
(2009)
IMC '09
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.-H.5
Rao, S.6
Taft, N.7
Tygar, J.D.8
-
32
-
-
33847761464
-
Non-Gaussian and Long Memory Statistical Characterisations for Internet Traffic with Anomalies
-
02
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry. Non-Gaussian and Long Memory Statistical Characterisations for Internet Traffic with Anomalies. IEEE Transaction on Dependable and Secure Computing, 4(1):56-70, 02 2007.
-
(2007)
IEEE Transaction on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
33
-
-
65249105995
-
Accurate anomaly detection through parallelism
-
S. Shanbhag and T. Wolf. Accurate anomaly detection through parallelism. Netwrk. Mag. of Global Internetwkg., 23(1):22-28, 2009.
-
(2009)
Netwrk. Mag. of Global Internetwkg.
, vol.23
, Issue.1
, pp. 22-28
-
-
Shanbhag, S.1
Wolf, T.2
-
34
-
-
77950575061
-
A detailed analysis of the kdd cup 99 data set
-
M. Tavallaee, E. Bagheri, W. Lu, and A. A. Ghorbani. A detailed analysis of the kdd cup 99 data set. IEEE international conference on Computational intelligence for security and defense applications (CISDA '09), pages 53-58, 2009.
-
(2009)
IEEE International Conference on Computational Intelligence for Security and Defense Applications (CISDA '09)
, pp. 53-58
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
35
-
-
85008008496
-
Internet traffic behavior profiling for network security monitoring
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya. Internet traffic behavior profiling for network security monitoring. IEEE/ACM Trans. Netw., 16(6):1241-1252, 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1241-1252
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
|