-
1
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseille November
-
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Internet Measurment Workshop, Marseille (November 2002)
-
(2002)
Internet Measurment Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
2
-
-
1642388108
-
Traffic data repository at the wide project
-
San Diego, California
-
Cho, K., Mitsuya, K., Kato, A.: Traffic data repository at the wide project. In: USENIX ATEC, San Diego, California (2000)
-
(2000)
USENIX ATEC
-
-
Cho, K.1
Mitsuya, K.2
Kato, A.3
-
3
-
-
29844455221
-
What's new: Finding significant differences in network data streams
-
DOI 10.1109/TNET.2005.860096
-
Cormode, G., Muthukrishnan, S.: What's new: finding significant differences in network data streams. IEEE/ACM Trans. Netw. 13(6), 1219-1232 (2005) (Pubitemid 43034131)
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.6
, pp. 1219-1232
-
-
Cormode, G.1
Muthukrishnan, S.2
-
4
-
-
62949129764
-
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
-
Kyoto, Japan
-
Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., Cho, K.: Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Workshop on Large-Scale Attack Defense (LSAD), Kyoto, Japan (2007)
-
(2007)
Workshop on Large-scale Attack Defense (LSAD)
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
5
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Karlsruhe
-
Estan, C., Savage, S., Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: ACM SIGCOMM, Karlsruhe (2003)
-
(2003)
ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
6
-
-
38549181478
-
A multi-scale tomographic algorithm for detecting and classifying traffic anomalies
-
Glasgow June
-
Farraposo, S., Owezarski, P., Monteiro, E.: A multi-scale tomographic algorithm for detecting and classifying traffic anomalies. In: IEEE ICC, Glasgow (June 2007)
-
(2007)
IEEE ICC
-
-
Farraposo, S.1
Owezarski, P.2
Monteiro, E.3
-
8
-
-
14844316210
-
A framework for classifying denial of service attacks
-
Karlsruhe
-
Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks. In: ACM SIGCOMM, Karlsruhe (2003)
-
(2003)
ACM SIGCOMM
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
9
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
Honolulu, Hawaii May
-
Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites. In: WWW, Honolulu, Hawaii (May 2002)
-
(2002)
WWW
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
10
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
Seoul April
-
Kim, M.-S., Kong, H.-J., Hong, S.-C., Chung, S.-H., Hong, J.: A flow-based method for abnormal network traffic detection. In: IEEE/IFIP Network Operations and Management Symposium, Seoul (April 2004)
-
(2004)
IEEE/IFIP Network Operations and Management Symposium
-
-
Kim, M.-S.1
Kong, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.5
-
11
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
Taormina, Italy
-
Lakhina, A., Crovella, M., Diot, C.: Characterization of network-wide anomalies in traffic flows. In: Internet Measurement Conference, Taormina, Italy (2004)
-
(2004)
Internet Measurement Conference
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
12
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
Philadelphia
-
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM, Philadelphia (2005)
-
(2005)
ACM SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
13
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
Rio de Janeiro, Brazil
-
Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: Internet Measurement Conference, Rio de Janeiro, Brazil (2006)
-
(2006)
Internet Measurement Conference
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
14
-
-
11144272176
-
A taxonomy of ddos attack and ddos defense mechanisms
-
Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39-53 (2004)
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.2
, pp. 39-53
-
-
Mirkovic, J.1
Reiher, P.2
-
15
-
-
85084161486
-
-
USENIX SSYM, Washington, DC
-
Moore, D., Voelker, G.M., Savage, S.: Inferring internet denial-of-service activity. In: USENIX SSYM, Washington, DC (2001)
-
(2001)
Inferring Internet Denial-of-service Activity
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
16
-
-
38549109163
-
On the impact of dos attacks on internet traffic characteristics and qos
-
October
-
Owezarski, P.: On the impact of dos attacks on internet traffic characteristics and qos. In: ICCCN (October 2005)
-
(2005)
ICCCN
-
-
Owezarski, P.1
-
17
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies
-
DOI 10.1109/TDSC.2007.12
-
Scherrer, A., Larrieu, N., Owezarski, P., Borgnat, P., Abry, P.: Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans. Dependable Secur. Comput. 4(1), 56-70 (2007) (Pubitemid 46384621)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
|