메뉴 건너뛰기




Volumn , Issue , 2011, Pages 36-41

Traffic dispersion graph based anomaly detection

Author keywords

anomalous traffic detection; DDoS attacks; network monitoring and analysis; network security; traffic dispersion graphs

Indexed keywords

ANOMALY DETECTION; ATTACK PATTERNS; DDOS ATTACK; DEGREE DISTRIBUTIONS; DISPERSION GRAPH; IP NETWORKS; MAXIMUM DEGREE; MODEL NETWORKS; NETWORK MONITORING AND ANALYSIS; NETWORK TRAFFIC; THEORY CONCEPT; TRAFFIC DETECTION;

EID: 82955197456     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2069216.2069227     Document Type: Conference Paper
Times cited : (31)

References (24)
  • 3
    • 51349123114 scopus 로고    scopus 로고
    • Anomaly detection in data represented as graphs
    • 2007
    • Eberle, W. and Holder, L. 2007. Anomaly detection in data represented as graphs. Intelligent Data Analysis, 2007, vol. 11, pp. 663-689.
    • (2007) Intelligent Data Analysis , vol.11 , pp. 663-689
    • Eberle, W.1    Holder, L.2
  • 8
    • 68049121093 scopus 로고    scopus 로고
    • Anomaly detection: A survey
    • (July 2009), Article 15
    • Chandola, V., Banerjee, A. and Kumar, V. 2009. Anomaly detection: A survey. ACM Comput. Surv, (July 2009), Article 15, 58 pages. DOI= http://doi.acm.org/10.1145/1541880.1541882
    • (2009) ACM Comput. Surv , pp. 58
    • Chandola, V.1    Banerjee, A.2    Kumar, V.3
  • 13
    • 77954613479 scopus 로고    scopus 로고
    • Measurement-calibrated graph models for social network experiments
    • 2010
    • Sala, A., Cao, L., Wilson, C., Zablit, R., Zheng, H. and Zhao, B. 2010. Measurement-calibrated graph models for social network experiments. In WWW, 2010, pages 861-870.
    • (2010) WWW , pp. 861-870
    • Sala, A.1    Cao, L.2    Wilson, C.3    Zablit, R.4    Zheng, H.5    Zhao, B.6
  • 17
    • 4644303571 scopus 로고    scopus 로고
    • A (Sub)Graph isomorphism algorithm for matching large graphs
    • (October 2004), DOI
    • Cordella, L.P., Foggia, P., Sansone, C. and Vento, M. 2004. A (Sub)Graph isomorphism algorithm for matching large graphs. IEEE Trans. Pattern Anal. Mach. Intell. 26, 10 (October 2004), 1367-1372. DOI= http://dx.doi.org/10.1109/TPAMI. 2004.75
    • (2004) IEEE Trans. Pattern Anal. Mach. Intell. , vol.26 , Issue.10 , pp. 1367-1372
    • Cordella, L.P.1    Foggia, P.2    Sansone, C.3    Vento, M.4
  • 18
    • 2942673158 scopus 로고    scopus 로고
    • Internet traffic monitoring and analysis using NG-MON. POSTECH, Advanced Communication Technology
    • Hong, J.W. 2004. Internet traffic monitoring and analysis using NG-MON. POSTECH, Advanced Communication Technology. The 6th International Conference, 2004, Volume: 1, page(s): 100- 120. http://ieeexplore.ieee.org/iel5/9073/28786/ 01292840.pdf
    • (2004) The 6th International Conference, 2004 , vol.1 , pp. 100-120
    • Hong, J.W.1
  • 20
    • 82955205330 scopus 로고    scopus 로고
    • Basic Network Metrics
    • Whitney, D. 2008. Basic Network Metrics. Lecture note. http://ocw.mit.edu/courses/engineering-systems-division/esd- 342-network-representations-of-complex-engineeringsystems- spring- 2010/readings/MITESD-342S10-ntwk-metrics.pdf
    • (2008) Lecture Note
    • Whitney, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.