메뉴 건너뛰기




Volumn 19 LNICST, Issue , 2009, Pages 91-100

Automated classification of network traffic anomalies

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED CLASSIFICATION; DATA SETS; DETECTION ALGORITHM; FALSE POSITIVE RATES; NETWORK OPERATOR; NETWORK TRAFFIC; PROJECT DATABASE; SIGNATURE-BASED APPROACH;

EID: 79956038780     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-05284-2_6     Document Type: Conference Paper
Times cited : (12)

References (17)
  • 2
    • 1642388108 scopus 로고    scopus 로고
    • Traffic data repository at the wide project
    • San Diego, California
    • Cho, K., Mitsuya, K., Kato, A.: Traffic data repository at the wide project. In: USENIX ATEC, San Diego, California (2000)
    • (2000) USENIX ATEC
    • Cho, K.1    Mitsuya, K.2    Kato, A.3
  • 3
    • 29844455221 scopus 로고    scopus 로고
    • What's new: Finding significant differences in network data streams
    • DOI 10.1109/TNET.2005.860096
    • Cormode, G., Muthukrishnan, S.: What's new: finding significant differences in network data streams. IEEE/ACM Trans. Netw. 13(6), 1219-1232 (2005) (Pubitemid 43034131)
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.6 , pp. 1219-1232
    • Cormode, G.1    Muthukrishnan, S.2
  • 4
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
    • Kyoto, Japan
    • Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., Cho, K.: Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Workshop on Large-Scale Attack Defense (LSAD), Kyoto, Japan (2007)
    • (2007) Workshop on Large-scale Attack Defense (LSAD)
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 5
    • 14944346102 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Karlsruhe
    • Estan, C., Savage, S., Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: ACM SIGCOMM, Karlsruhe (2003)
    • (2003) ACM SIGCOMM
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 6
    • 38549181478 scopus 로고    scopus 로고
    • A multi-scale tomographic algorithm for detecting and classifying traffic anomalies
    • Glasgow June
    • Farraposo, S., Owezarski, P., Monteiro, E.: A multi-scale tomographic algorithm for detecting and classifying traffic anomalies. In: IEEE ICC, Glasgow (June 2007)
    • (2007) IEEE ICC
    • Farraposo, S.1    Owezarski, P.2    Monteiro, E.3
  • 7
  • 8
    • 14844316210 scopus 로고    scopus 로고
    • A framework for classifying denial of service attacks
    • Karlsruhe
    • Hussain, A., Heidemann, J., Papadopoulos, C.: A framework for classifying denial of service attacks. In: ACM SIGCOMM, Karlsruhe (2003)
    • (2003) ACM SIGCOMM
    • Hussain, A.1    Heidemann, J.2    Papadopoulos, C.3
  • 9
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
    • Honolulu, Hawaii May
    • Jung, J., Krishnamurthy, B., Rabinovich, M.: Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites. In: WWW, Honolulu, Hawaii (May 2002)
    • (2002) WWW
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 11
    • 14944367267 scopus 로고    scopus 로고
    • Characterization of network-wide anomalies in traffic flows
    • Taormina, Italy
    • Lakhina, A., Crovella, M., Diot, C.: Characterization of network-wide anomalies in traffic flows. In: Internet Measurement Conference, Taormina, Italy (2004)
    • (2004) Internet Measurement Conference
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 12
    • 33746603312 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Philadelphia
    • Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM, Philadelphia (2005)
    • (2005) ACM SIGCOMM
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 14
    • 11144272176 scopus 로고    scopus 로고
    • A taxonomy of ddos attack and ddos defense mechanisms
    • Mirkovic, J., Reiher, P.: A taxonomy of ddos attack and ddos defense mechanisms. SIGCOMM Comput. Commun. Rev. 34(2), 39-53 (2004)
    • (2004) SIGCOMM Comput. Commun. Rev. , vol.34 , Issue.2 , pp. 39-53
    • Mirkovic, J.1    Reiher, P.2
  • 16
    • 38549109163 scopus 로고    scopus 로고
    • On the impact of dos attacks on internet traffic characteristics and qos
    • October
    • Owezarski, P.: On the impact of dos attacks on internet traffic characteristics and qos. In: ICCCN (October 2005)
    • (2005) ICCCN
    • Owezarski, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.