-
2
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, C. Diot, Mining anomalies using traffic feature distributions, in: ACM SIGCOMM, 2005.
-
(2005)
ACM SIGCOMM
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
4
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, A. Lakhina, Detection and identification of network anomalies using sketch subspaces, in: Internet Measurement Conference (IMC), 2006.
-
(2006)
Internet Measurement Conference (IMC)
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
5
-
-
38149086666
-
Network anomaly detection using nonextensive entropy
-
A. Ziviani, M.L. Monsores, P.S.S. Rodrigues, and A.T.A. Gomes Network anomaly detection using nonextensive entropy IEEE Communications Letters 11 12 2007 1034 1036
-
(2007)
IEEE Communications Letters
, vol.11
, Issue.12
, pp. 1034-1036
-
-
Ziviani, A.1
Monsores, M.L.2
Rodrigues, P.S.S.3
Gomes, A.T.A.4
-
6
-
-
84872943210
-
Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics
-
B. Tellenbach, M. Burkhart, D. Sornette, T. Maillart, Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics, in: Passive and Active Measurement Conference (PAM), 2009.
-
(2009)
Passive and Active Measurement Conference (PAM)
-
-
Tellenbach, B.1
Burkhart, M.2
Sornette, D.3
Maillart, T.4
-
8
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
G. Nychis, V. Sekar, D.G. Andersen, H. Kim, H. Zhang, An empirical evaluation of entropy-based traffic anomaly detection, in: Internet Measurement Conference (IMC), 2008.
-
(2008)
Internet Measurement Conference (IMC)
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
13
-
-
70350070819
-
Entropy based worm and anomaly detection in fast IP networks
-
A. Wagner, B. Plattner, Entropy based worm and anomaly detection in fast IP networks, in: IEEE WET ICE, 2005.
-
(2005)
IEEE WET ICE
-
-
Wagner, A.1
Plattner, B.2
-
15
-
-
80052499660
-
Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone
-
T. Dübendorfer, A. Wagner, T. Hossmann, B. Plattner, Flow-level traffic analysis of the blaster and sobig worm outbreaks in an internet backbone, in: SIG SIDAR DIMVA, 2005.
-
(2005)
SIG SIDAR DIMVA
-
-
Dübendorfer, T.1
-
16
-
-
4344627335
-
The spread of the witty worm
-
doi: http://dx.doi.org/10.1109/MSP.2004.59
-
C. Shannon, and D. Moore The spread of the witty worm IEEE Security and Privacy 2 4 2004 46 50 doi: http://dx.doi.org/10.1109/MSP.2004.59
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
18
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
P. Barford, J. Kline, D. Plonka, A. Ron, A signal analysis of network traffic anomalies, in: Internet Measurement Workshop (IMW), 2002.
-
(2002)
Internet Measurement Workshop (IMW)
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
20
-
-
4944228528
-
-
Tech. rep., Department of Computer Science, National Taiwan University
-
C.-W. Hsu, C.-C. Chang, C.-J. Lin, A practical guide to support vector classification, Tech. rep., Department of Computer Science, National Taiwan University, 2009.
-
(2009)
A Practical Guide to Support Vector Classification
-
-
Hsu, C.-W.1
Chang, C.-C.2
Lin, C.-J.3
-
21
-
-
0000764772
-
The use of multiple measurements in taxonomic problems
-
R. Fisher The use of multiple measurements in taxonomic problems Annals of Eugenics 7 1936 179 188
-
(1936)
Annals of Eugenics
, vol.7
, pp. 179-188
-
-
Fisher, R.1
-
23
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage Inferring internet denial-of-service activity ACM Transactions on Computational System 24 2 2006 115 139
-
(2006)
ACM Transactions on Computational System
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
26
-
-
77953851706
-
Anomaly detection by finding feature distribution outliers
-
M. Stoecklin, Anomaly detection by finding feature distribution outliers, in: ACM CoNEXT, 2006.
-
(2006)
ACM CoNEXT
-
-
Stoecklin, M.1
-
28
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
B. Krishnamurthy, S. Sen, Y. Zhang, Y. Chen, Sketch-based change detection: methods, evaluation, and applications, in: Internet Measurement Conference (IMC), 2003.
-
(2003)
Internet Measurement Conference (IMC)
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
29
-
-
54049119163
-
The eternal sunshine of the sketch data structure
-
X. Dimitropoulos, M. Stoecklin, P. Hurley, and A. Kind The eternal sunshine of the sketch data structure Computer Networks 52 17 2008 3248 3257
-
(2008)
Computer Networks
, vol.52
, Issue.17
, pp. 3248-3257
-
-
Dimitropoulos, X.1
Stoecklin, M.2
Hurley, P.3
Kind, A.4
-
30
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, K. Cho, Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures, in: Workshop on Large Scale AttackDefense (LSAD), 2007.
-
(2007)
Workshop on Large Scale AttackDefense (LSAD)
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
31
-
-
80052468205
-
A relation between the renyi distance of order and the variational distance
-
doi:10.1109/ITS.1998.713125
-
M. Alencar, F. Assis, A relation between the renyi distance of order and the variational distance, in: Telecommunications Symposium, 1998, pp. 242-244 vol.1. doi:10.1109/ITS.1998.713125.
-
(1998)
Telecommunications Symposium
, vol.1
, pp. 242-244
-
-
Alencar, M.1
Assis, F.2
-
36
-
-
0242494209
-
Automatic detection of slight parameter changes associated to complex biomedical signals using multiresolution q-entropy
-
DOI 10.1016/S1350-4533(03)00080-8
-
M.E. Torres, M.M. An++ino, and G. Schlotthauer Automatic detection of slight parameter changes associated to complex biomedical signals using multiresolution q-entropy Medical Engineering & Physics 25 10 2003 859 867 (Pubitemid 37421348)
-
(2003)
Medical Engineering and Physics
, vol.25
, Issue.10
, pp. 859-867
-
-
Torres, M.E.1
Anino, M.M.2
Schlotthauer, G.3
-
37
-
-
18844456578
-
Power-law sensitivity to initial conditions in a time series with applications to epileptic seizure detection
-
DOI 10.1016/j.physa.2005.01.027, PII S0378437105000531
-
J. Gao, W.W. Tung, Y. Cao, J. Hu, and Y. Qi Power-law sensitivity to initial conditions in a time series with applications to epileptic seizure detection Physica A: Statistical Mechanics and its Applications 353 2005 613 624 (Pubitemid 40684326)
-
(2005)
Physica A: Statistical Mechanics and its Applications
, vol.353
, Issue.1-4
, pp. 613-624
-
-
Gao, J.1
Tung, W.-W.2
Cao, Y.3
Hu, J.4
Qi, Y.5
-
39
-
-
70349236182
-
The risk-utility tradeoff for IP address truncation
-
M. Burkhart, D. Brauckhoff, M. May, E. Boschi, The risk-utility tradeoff for IP address truncation, in: ACM workshop on Network Data Anonymization (NDA), 2008.
-
(2008)
ACM Sworkshop on Network Data Anonymization (NDA)
-
-
Burkhart, M.1
Brauckhoff, D.2
May, M.3
Boschi, E.4
|