메뉴 건너뛰기




Volumn , Issue , 2011, Pages 2078-2086

Network-aware behavior clustering of Internet end hosts

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS BEHAVIOR; BIPARTITE GRAPHS; DENIAL OF SERVICE ATTACKS; INTERNET BACKBONE; MODEL NETWORKS; NETWORK BEHAVIORS; PROJECTION GRAPH; TRAFFIC CHARACTERISTICS; WORM PROPAGATION;

EID: 79960853919     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2011.5935017     Document Type: Conference Paper
Times cited : (47)

References (30)
  • 2
    • 33645792808 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • August
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Profiling Internet Backbone Traffic: Behavior Models and Applications," in Proceedings of ACM SIGCOMM, August 2005.
    • (2005) Proceedings of ACM SIGCOMM
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 3
    • 78649491247 scopus 로고    scopus 로고
    • Network prefix-level traffic profiling: Characterizing, modeling, and evaluation
    • H. Jiang, Z. Ge, S. Jin, and J. Wang, "Network Prefix-level Traffic Profiling: Characterizing, Modeling, and Evaluation," Computer Networks, 2010.
    • (2010) Computer Networks
    • Jiang, H.1    Ge, Z.2    Jin, S.3    Wang, J.4
  • 4
    • 70449686700 scopus 로고    scopus 로고
    • Unveiling core networkwide communication patterns through application traffic activity graph decomposition
    • June
    • Y. Jin, E. Sharafuddin, and Z.-L. Zhang, "Unveiling core networkwide communication patterns through application traffic activity graph decomposition," in Proceedings of ACM SIGMETRICS, June 2009.
    • (2009) Proceedings of ACM SIGMETRICS
    • Jin, Y.1    Sharafuddin, E.2    Zhang, Z.-L.3
  • 11
    • 4243878877 scopus 로고    scopus 로고
    • Cooperative Association for Internet Data Analysis (CAIDA), "Internet Traces," http://www.caida.org/data/passive/passive-2009- dataset.xml.
    • Internet Traces
  • 12
    • 4444266989 scopus 로고    scopus 로고
    • Prefix-preserving IP address anonymization: Measurement-based security evaluation and a new cryptography-based scheme
    • October
    • J. Fan, J. Xu, M. Ammar, and S. Moon, "Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme," Computer Networks, vol. 46, no. 2, pp. 253-272, October 2004.
    • (2004) Computer Networks , vol.46 , Issue.2 , pp. 253-272
    • Fan, J.1    Xu, J.2    Ammar, M.3    Moon, S.4
  • 13
    • 0012440707 scopus 로고    scopus 로고
    • University of Oregon
    • University of Oregon, "Route Views Project," http://www.routeviews.org/.
    • Route Views Project
  • 15
    • 4344627335 scopus 로고    scopus 로고
    • The spread of the witty worm
    • C. Shannon and D. Moore, "The spread of the witty worm," IEEE Security and Privacy, vol. 2, no. 4, pp. 46 - 50, 2004.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.4 , pp. 46-50
    • Shannon, C.1    Moore, D.2
  • 24
  • 28
    • 78149305170 scopus 로고    scopus 로고
    • Understanding block-level address usage in the visible internet
    • August
    • X. Cai, and J. Heidemann, "Understanding Block-level Address Usage in the Visible Internet," in Proceedings of ACM SIGCOMM, August 2010.
    • (2010) Proceedings of ACM SIGCOMM
    • Cai, X.1    Heidemann, J.2
  • 29
    • 84976851626 scopus 로고
    • Discovering shared interests using graph analysis
    • August
    • M. Schwartz, and D. Wood, "Discovering shared interests using graph analysis," Communications of the ACM, vol. 36, no. 8, pp. 78 - 89, August 1993.
    • (1993) Communications of the ACM , vol.36 , Issue.8 , pp. 78-89
    • Schwartz, M.1    Wood, D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.