-
3
-
-
76649121504
-
Using NetFlow/IPFIX for Network Management
-
A. Pras, R. Sadre, A. Sperotto, T. Fioreze, D. Hausheer, and J. Schoenwaelder, "Using NetFlow/IPFIX for Network Management," Journal of Network and Systems Management, vol. 17, no. 4, p. 6, 2009.
-
(2009)
Journal of Network and Systems Management
, vol.17
, Issue.4
, pp. 6
-
-
Pras, A.1
Sadre, R.2
Sperotto, A.3
Fioreze, T.4
Hausheer, D.5
Schoenwaelder, J.6
-
4
-
-
77955469676
-
An Overview of IP Flow-Based Intrusion Detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, "An Overview of IP Flow-Based Intrusion Detection," IEEE Communications Surveys & Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
5
-
-
80052304527
-
-
Ph.D. dissertation, University of Twente, October
-
A. Sperotto, "Flow-based intrusion detection," Ph.D. dissertation, University of Twente, October 2010.
-
(2010)
Flow-based Intrusion Detection
-
-
Sperotto, A.1
-
6
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ser.
-
D. Brauckhoff, B. Tellenbach, A. Wagner, M. May, and A. Lakhina, "Impact of packet sampling on anomaly detection metrics," in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ser. IMC '06, 2006, pp. 159-164.
-
(2006)
IMC '06
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
7
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ser.
-
J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang, "Is sampled data sufficient for anomaly detection?" in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ser. IMC '06, 2006, pp. 165-176.
-
(2006)
IMC '06
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
8
-
-
77953234751
-
HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency
-
Z. Li, Y. Gao, and Y. Chen, "HiFIND: A high-speed flow-level intrusion detection approach with DoS resiliency," Computer Networks, vol. 54, no. 8, pp. 1282-1299, 2010.
-
(2010)
Computer Networks
, vol.54
, Issue.8
, pp. 1282-1299
-
-
Li, Z.1
Gao, Y.2
Chen, Y.3
-
9
-
-
33745266078
-
Design principles and algorithms for effective high-speed IP flow monitoring
-
M. Molina, A. Chiosi, S. D'Antonio, and G. Ventre, "Design principles and algorithms for effective high-speed IP flow monitoring," Computer Communications, vol. 29, no. 10, pp. 1653-1664, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.10
, pp. 1653-1664
-
-
Molina, M.1
Chiosi, A.2
D'Antonio, S.3
Ventre, G.4
-
11
-
-
21844468041
-
Building a better NetFlow
-
C. Estan, K. Keys, D. Moore, and G. Varghese, "Building a better NetFlow," SIGCOMM Comput. Commun. Rev., vol. 34, pp. 245-256, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, pp. 245-256
-
-
Estan, C.1
Keys, K.2
Moore, D.3
Varghese, G.4
-
12
-
-
34250746319
-
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
-
Y. Hu, D. M. Chiu, and J. C. Lui, "Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks," in In IEEE/IFIP Network Operations and Management Symposium (NOMS '06), 2006, pp. 424-435.
-
(2006)
In IEEE/IFIP Network Operations and Management Symposium (NOMS '06)
, pp. 424-435
-
-
Hu, Y.1
Chiu, D.M.2
Lui, J.C.3
-
13
-
-
34250338058
-
A queueing analysis for the denial of service (DoS) attacks in computer networks
-
August
-
Y. Wang, C. Lin, Q.-L. Li, and Y. Fang, "A queueing analysis for the denial of service (DoS) attacks in computer networks," Computer Networks, vol. 51, pp. 3564-3573, August 2007.
-
(2007)
Computer Networks
, vol.51
, pp. 3564-3573
-
-
Wang, Y.1
Lin, C.2
Li, Q.-L.3
Fang, Y.4
-
14
-
-
20344364652
-
Denial of service attacks on network-based control systems: Impact and mitigation
-
M. Long, C.-H. Wu, and J. Hung, "Denial of service attacks on network-based control systems: impact and mitigation," IEEE Transactions on Industrial Informatics, vol. 1, no. 2, pp. 85-96, 2005.
-
(2005)
IEEE Transactions on Industrial Informatics
, vol.1
, Issue.2
, pp. 85-96
-
-
Long, M.1
Wu, C.-H.2
Hung, J.3
-
19
-
-
0002944976
-
An efficient and accurate decomposition method for open finite- And infinite-buffer queueing networks
-
R. Sadre, B. Haverkort, and A. Ost, "An efficient and accurate decomposition method for open finite- and infinite-buffer queueing networks," in Proc. 3rd Int. Workshop on Numerical Solution of Markov Chains, 1999, pp. 1-20.
-
Proc. 3rd Int. Workshop on Numerical Solution of Markov Chains, 1999
, pp. 1-20
-
-
Sadre, R.1
Haverkort, B.2
Ost, A.3
-
21
-
-
84864198018
-
-
Tcpdump.org, May
-
Tcpdump.org, "TCPDUMP & LIBPCAP," http://www.tcpdump.org/, May 2011.
-
(2011)
TCPDUMP & LIBPCAP
-
-
-
22
-
-
84864235768
-
Peeling Away Timing Error in NetFlow Data
-
B. Trammell, B. Tellenbach, D. Schatzmann, and M. Burkhart, "Peeling Away Timing Error in NetFlow Data," in Passive and Active Measurement conference (PAM 2011), March 2011.
-
Passive and Active Measurement Conference (PAM 2011), March 2011
-
-
Trammell, B.1
Tellenbach, B.2
Schatzmann, D.3
Burkhart, M.4
|