-
1
-
-
85092048938
-
-
Snort
-
Snort, http://www.snort.org.
-
-
-
-
2
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
December
-
V. Paxson, “Bro: A system for detecting network intruders in real-time,” Computer Networks, Vol. 31, Issue 23-24, December 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseille, France, October
-
P. Barford, J. Kline, D. Plonka, and A. Ron, “A signal analysis of network traffic anomalies,” in Proc. 2nd ACM SIGCOMM Workshop in Internet Measurement (IMW2002), Marseille, France, October 2002.
-
(2002)
Proc. 2nd ACM SIGCOMM Workshop in Internet Measurement (IMW2002)
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
4
-
-
68449093969
-
Finding cardinality heavy-hitters in massive traffic data and its application to anomaly detection
-
May
-
K. Ishibashi, T. Mori, R. Kawahara, Y. Hirokawa, A. Kobayashi, K. Yamamoto, H. Sakamoto, and S. Asano, “Finding cardinality heavy-hitters in massive traffic data and its application to anomaly detection,” IEICE Trans. Commun., Vol. E91-B, No. 5, pp.1331–1339, May 2008.
-
(2008)
IEICE Trans. Commun
, vol.E91-B
, Issue.5
, pp. 1331-1339
-
-
Ishibashi, K.1
Mori, T.2
Kawahara, R.3
Hirokawa, Y.4
Kobayashi, A.5
Yamamoto, K.6
Sakamoto, H.7
Asano, S.8
-
5
-
-
46349085574
-
A study on detecting network anomalies using sampled flow statistics
-
Jan
-
R. Kawahara, T. Mori, N. Kamiyama, S. Harada, and S. Asano, “A study on detecting network anomalies using sampled flow statistics,” Proc. IEEE SAINT 2007 Workshop, Jan. 2007.
-
(2007)
Proc. IEEE SAINT 2007 Workshop
-
-
Kawahara, R.1
Mori, T.2
Kamiyama, N.3
Harada, S.4
Asano, S.5
-
7
-
-
26844548971
-
-
Honeynet Project. March
-
Honeynet Project. Know your Enemy: Tracking Botnets, March 2005. http://www.honeynet.org/papers/bots.
-
(2005)
Know your Enemy: Tracking Botnets
-
-
-
8
-
-
85084097128
-
Measurements and mitigation of peer-to-peer based botnets: a case study on storm worm
-
San Francisco, USA, April
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, “Measurements and mitigation of peer-to-peer based botnets: a case study on storm worm,” Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, San Francisco, USA, April 2008.
-
(2008)
Proc. 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
9
-
-
46349110466
-
2-D bitmap for summarizing inter-host communication patterns
-
Jan
-
K. Ishibashi, T. Mori, R. Kawahara, and K. Toyama, “2-D bitmap for summarizing inter-host communication patterns,” Proc. SAINT 2007 Workshop, Jan. 2007.
-
(2007)
Proc. SAINT 2007 Workshop
-
-
Ishibashi, K.1
Mori, T.2
Kawahara, R.3
Toyama, K.4
-
11
-
-
70349686731
-
Network monitoring using traffic dispersion graphs (TDGs)
-
to appear in
-
M. Iliofotou, P. Pappu, G. Varghese, M. Faloutsos, M. Mitzenmacher, and S. Singh, “Network monitoring using traffic dispersion graphs (TDGs),” to appear in ACM IMC 2007.
-
(2007)
ACM IMC
-
-
Iliofotou, M.1
Pappu, P.2
Varghese, G.3
Faloutsos, M.4
Mitzenmacher, M.5
Singh, S.6
-
12
-
-
33846567585
-
Cluster structures in topology of large-scale social networks revealed by traffic data
-
December 2
-
M. Aida, K. Ishibashi, C. Takano, H. Miwa, K. Muranaka, and A. Miura, “Cluster structures in topology of large-scale social networks revealed by traffic data” Proc. IEEE GLOBECOM 2005, December 2, 2005.
-
(2005)
Proc. IEEE GLOBECOM 2005
-
-
Aida, M.1
Ishibashi, K.2
Takano, C.3
Miwa, H.4
Muranaka, K.5
Miura, A.6
-
15
-
-
34147206967
-
-
Birkhauser
-
H. Bunke, P. J. Dickinson, M. Kraetzl, and W. D. Wallis, “A graph-theoretic approach to enterprise network dynamics,” Birkhauser, 2006.
-
(2006)
A graph-theoretic approach to enterprise network dynamics
-
-
Bunke, H.1
Dickinson, P. J.2
Kraetzl, M.3
Wallis, W. D.4
-
17
-
-
33746192198
-
A graph-theoretic perspective on centrality
-
October
-
S. P. Borgatti and M. G. Everett, “A graph-theoretic perspective on centrality,” Elsevier Social Networks, Vol. 28, Issue 4, pp. 464–484, October 2006.
-
(2006)
Elsevier Social Networks
, vol.28
, Issue.4
, pp. 464-484
-
-
Borgatti, S. P.1
Everett, M. G.2
|