메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1298-1303

Detecting Heavy Change in the Heavy Hitter distribution of network traffic

Author keywords

Anomaly Detection; Heavy Change; Heavy Hitter; Sketch

Indexed keywords

ANOMALY DETECTION; EXPERIMENTAL EVALUATION; HEAVY CHANGE; HEAVY-HITTER; IP NETWORKS; NETWORK ANOMALY DETECTION; NETWORK ATTACK; NETWORK OPERATOR; NETWORK TRAFFIC; NOVEL METHODS; PERFORMANCE ANALYSIS; SKETCH;

EID: 80052448261     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWCMC.2011.5982727     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 4
    • 2442443820 scopus 로고    scopus 로고
    • Approximate frequency counts over data streams
    • G. S. Manku and R. Motwani, "Approximate frequency counts over data streams," in VLDB, pp. 346-357, 2002.
    • (2002) VLDB , pp. 346-357
    • Manku, G.S.1    Motwani, R.2
  • 6
    • 2442583610 scopus 로고    scopus 로고
    • New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
    • C. Estan and G. Varghese, "New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice," ACM Transactions on Computer Systems, vol. 21, pp. 270-313, 2003.
    • (2003) ACM Transactions on Computer Systems , vol.21 , pp. 270-313
    • Estan, C.1    Varghese, G.2
  • 7
    • 2442443820 scopus 로고    scopus 로고
    • Approximate frequency counts over data streams
    • G. S. Manku and R. Motwani, "Approximate frequency counts over data streams," in VLDB, pp. 346-357, 2002.
    • (2002) VLDB , pp. 346-357
    • Manku, G.S.1    Motwani, R.2
  • 8
    • 85012186650 scopus 로고    scopus 로고
    • Finding hierarchical heavy hitters in data streams
    • G. Cormode, S. Muthukrishnan, and D. Srivastava, "Finding hierarchical heavy hitters in data streams," in In Proc. of VLDB, pp. 464-475, 2003.
    • (2003) Proc. of VLDB , pp. 464-475
    • Cormode, G.1    Muthukrishnan, S.2    Srivastava, D.3
  • 10
    • 0012292276 scopus 로고
    • A neural network approach towards intrusion detection
    • Information Systems Security. Standards - the Key to the Future
    • K. L. Fox, R. R. Henning, J. H. Reed, and R. P. Simonian, "A neural network approach towards intrusion detection," in In Proc. 13th National Computer Security Conference. Information Systems Security. Standards - the Key to the Future, Vol. I, pp. 124-134, 1990.
    • (1990) Proc. 13th National Computer Security Conference , vol.1 , pp. 124-134
    • Fox, K.L.1    Henning, R.R.2    Reed, J.H.3    Simonian, R.P.4
  • 14
    • 8344272783 scopus 로고    scopus 로고
    • What's new: Finding significant differences in network data streams
    • G. Cormode and S. Muthukrishnan, "What's new: Finding significant differences in network data streams," in in Proc. of IEEE Infocom, pp. 1534-1545, 2004.
    • (2004) Proc. of IEEE Infocom , pp. 1534-1545
    • Cormode, G.1    Muthukrishnan, S.2
  • 15
  • 16
    • 14844367057 scopus 로고    scopus 로고
    • An improved data stream summary: The count-min sketch and its applications
    • G. Cormode and S. Muthukrishnan, "An improved data stream summary: the count-min sketch and its applications," Journal of Algorithms, vol. 55, no. 1, pp. 58 - 75, 2005.
    • (2005) Journal of Algorithms , vol.55 , Issue.1 , pp. 58-75
    • Cormode, G.1    Muthukrishnan, S.2
  • 17
    • 1842435123 scopus 로고    scopus 로고
    • Tabulation based 4-universal hashing with applications to second moment estimation
    • (Philadelphia, PA, USA) Society for Industrial and Applied Mathematics
    • M. Thorup and Y. Zhang, "Tabulation based 4-universal hashing with applications to second moment estimation," in SODA '04: Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (Philadelphia, PA, USA), pp. 615-624, Society for Industrial and Applied Mathematics, 2004.
    • (2004) SODA '04: Proceedings of the Fifteenth Annual ACM-SIAM Symposium on Discrete Algorithms , pp. 615-624
    • Thorup, M.1    Zhang, Y.2
  • 18
    • 77955158454 scopus 로고    scopus 로고
    • Cisco systems NetFlow services export version 9
    • Oct.
    • B. Claise, "Cisco Systems NetFlow Services Export Version 9." RFC 3954 (Informational), Oct. 2004.
    • (2004) RFC 3954 (Informational)
    • Claise, B.1
  • 20
    • 0034301517 scopus 로고    scopus 로고
    • The 1999 DARPA off-line intrusion detection evaluation
    • R. Lippmann, J. Haines, D. Fried, J. Korba, and K. Das, "The 1999 DARPA off-line intrusion detection evaluation," Computer Networks, vol. 34, no. 4, pp. 579-595, 2000.
    • (2000) Computer Networks , vol.34 , Issue.4 , pp. 579-595
    • Lippmann, R.1    Haines, J.2    Fried, D.3    Korba, J.4    Das, K.5
  • 22
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," SIGCOMM Comput. Commun. Rev., vol. 35, no. 4, pp. 217-228, 2005.
    • (2005) SIGCOMM Comput. Commun. Rev. , vol.35 , Issue.4 , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.