-
2
-
-
84874719593
-
Setting a worm attack warning by using machine learning to classify netflow data
-
S.A. Abdulla, S. Ramadass, A. Altaher, and A.A. Nassiri Setting a worm attack warning by using machine learning to classify netflow data International Journal of Computer Applications 36 December (2) 2011 49 56
-
(2011)
International Journal of Computer Applications
, vol.36
, Issue.DECEMBER 2
, pp. 49-56
-
-
Abdulla, S.A.1
Ramadass, S.2
Altaher, A.3
Nassiri, A.A.4
-
3
-
-
20444447760
-
Home-centric visualization of network traffic for security administration
-
VizSEC/DMSEC '04. New York, NY, USA: ACM
-
Ball R, Fink GA, North C. Home-centric visualization of network traffic for security administration. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security, VizSEC/DMSEC '04. New York, NY, USA: ACM; 2004. p. 55-64.
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security
, pp. 55-64
-
-
Ball, R.1
Fink, G.A.2
North, C.3
-
4
-
-
79952438076
-
Analysis of the impact of sampling on NetFlow traffic classification
-
P. Barlet-ros, and A. Cabellos-aparicio Analysis of the impact of sampling on NetFlow traffic classification Methodology 55 5 2010 1083 1099
-
(2010)
Methodology
, vol.55
, Issue.5
, pp. 1083-1099
-
-
Barlet-Ros, P.1
Cabellos-Aparicio, A.2
-
8
-
-
39649109444
-
A NetFlow based flow analysis and monitoring system in enterprise networks
-
L. Bin, L. Chuang, Q. Jian, H. Jianping, and P. Ungsunan A NetFlow based flow analysis and monitoring system in enterprise networks Computer Networks 52 5 2008 1074 1092
-
(2008)
Computer Networks
, vol.52
, Issue.5
, pp. 1074-1092
-
-
Bin, L.1
Chuang, L.2
Jian, Q.3
Jianping, H.4
Ungsunan, P.5
-
9
-
-
74549160954
-
P2P flows identification method based on listening port
-
IC-BNMT '09, 2009
-
Bo X, Ming C, Fei L, Na W. P2P flows identification method based on listening port. In: 2nd IEEE international conference on broadband network multimedia technology, 2009. IC-BNMT '09, 2009. p. 296-300.
-
(2009)
2nd IEEE International Conference on Broadband Network Multimedia Technology
, pp. 296-300
-
-
Bo, X.1
Ming, C.2
Fei, L.3
Na, W.4
-
11
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
Brauckhoff D, Tellenbach B, Wagner A, May M, Lakhina A. Impact of packet sampling on anomaly detection metrics. In: Proceedings of the 6th ACM SIGCOMM on Internet measurement IMC 06, 2006. p. 159.
-
(2006)
Proceedings of the 6th ACM SIGCOMM on Internet Measurement IMC 06
, pp. 159
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
12
-
-
51249100061
-
Mining semantic relations using NetFlow
-
BDIM 2008, April
-
Caracas A, Kind A, Gantenbein D, Fussenegger S, Dechouniotis D. Mining semantic relations using NetFlow. In: 3rd IEEE/IFIP international workshop on business-driven IT management, 2008. BDIM 2008, April 2008. p. 110-1.
-
(2008)
3rd IEEE/IFIP International Workshop on Business-driven IT Management, 2008
, pp. 110-111
-
-
Caracas, A.1
Kind, A.2
Gantenbein, D.3
Fussenegger, S.4
Dechouniotis, D.5
-
13
-
-
77955142474
-
Traffic classification with sampled netflow
-
Carela-Espanol V, Barlet-Ros P, Solé-Pareta J. Traffic classification with sampled netflow. Technical Report 2, Technical report, Universitat Politecnica de Catalunya, 2009.
-
(2009)
Technical Report 2, Technical Report, Universitat Politecnica de Catalunya
-
-
Carela-Espanol, V.1
Barlet-Ros, P.2
Solé-Pareta, J.3
-
14
-
-
85013082890
-
Malware detection from the network perspective using netflow data
-
Čeleda P, Vykopal J, Plesník T, Trunečka M, Krmíček V. Malware detection from the network perspective using netflow data. In: 3rd NMRG workshop on NetFlow/IPFIX usage in network management, 2010.
-
(2010)
3rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management
-
-
Čeleda, P.1
Vykopal, J.2
Plesník, T.3
Trunečka, M.4
Krmíček, V.5
-
17
-
-
79960870812
-
A first look at inter-data center traffic characteristics via yahoo! Datasets
-
April 2011
-
Chen Y, Jain S, Adhikari V, Zhang Z-L, Xu K. A first look at inter-data center traffic characteristics via yahoo! datasets. In: INFOCOM, 2011 Proceedings IEEE, April 2011. p. 1620-8.
-
INFOCOM, 2011 Proceedings IEEE
, pp. 1620-1628
-
-
Chen, Y.1
Jain, S.2
Adhikari, V.3
Zhang, Z.-L.4
Xu, K.5
-
18
-
-
34548009809
-
A resource-efficient flow monitoring system
-
G. Cheng, and J. Gong A resource-efficient flow monitoring system Communications Letters, IEEE 11 June (6) 2007 558 560
-
(2007)
Communications Letters, IEEE
, vol.11
, Issue.JUNE 6
, pp. 558-560
-
-
Cheng, G.1
Gong, J.2
-
20
-
-
67349158355
-
Fast detection and visualization of network attacks on parallel coordinates
-
H. Choi, H. Lee, and H. Kim Fast detection and visualization of network attacks on parallel coordinates Computers Security 28 5 2009 276 288
-
(2009)
Computers Security
, vol.28
, Issue.5
, pp. 276-288
-
-
Choi, H.1
Lee, H.2
Kim, H.3
-
21
-
-
57349186526
-
Confident estimation for multistage measurement sampling and aggregation
-
Cohen E, Duffield N, Lund C, Thorup M. Confident estimation for multistage measurement sampling and aggregation. In: Proceedings of the 2008 ACM SIGMETRICS international conference on measurement and modeling of computer systems SIGMETRICS 08, (i), 2008. p. 109.
-
(2008)
Proceedings of the 2008 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems SIGMETRICS 08, (I)
, pp. 109
-
-
Cohen, E.1
Duffield, N.2
Lund, C.3
Thorup, M.4
-
23
-
-
84874674897
-
-
Deri L. ntop. Retrieved June 3, 2012
-
Deri L. ntop. 〈 http://www.ntop.org 〉. Retrieved June 3, 2012.
-
-
-
-
28
-
-
16344383315
-
Sampling for passive internet measurement a review
-
N. Duffield Sampling for passive internet measurement a review Statistical Science 19 2004 472 498
-
(2004)
Statistical Science
, vol.19
, pp. 472-498
-
-
Duffield, N.1
-
30
-
-
1542330197
-
Charging from sampled network usage
-
New York, NY, USA: ACM
-
Duffield N, Lund C, Thorup M. Charging from sampled network usage. In: Proceedings of the 1st ACM SIGCOMM workshop on internet measurement, IMW '01. New York, NY, USA: ACM; 2001. p. 245-56.
-
(2001)
Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement, IMW '01
, pp. 245-256
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
31
-
-
0141762497
-
Properties and prediction of flow statistics from sampled packet streams
-
New York, NY, USA: ACM
-
Duffield N, Lund C, Thorup M. Properties and prediction of flow statistics from sampled packet streams. In: Proceedings of the 2nd ACM SIGCOMM workshop on Internet measurement, IMW '02. New York, NY, USA: ACM; 2002. p. 159-71.
-
(2002)
Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, IMW '02
, pp. 159-171
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
33
-
-
21844468041
-
Building a better NetFlow
-
C. Estan, K. Keys, D. Moore, and G. Varghese Building a better NetFlow ACM SIGCOMM Computer Communication Review 34 4 2004 245
-
(2004)
ACM SIGCOMM Computer Communication Review
, vol.34
, Issue.4
, pp. 245
-
-
Estan, C.1
Keys, K.2
Moore, D.3
Varghese, G.4
-
34
-
-
70449356588
-
Self-management of hybrid networks: Can we trust netflow data?
-
Fioreze T, Granville LZ, Pras A, Sperotto A, Sadre R. Self-management of hybrid networks: Can we trust netflow data? In: IM09 IFIPIEEE international symposium on integrated network management 2009, 2009. p. 577-84.
-
(2009)
IM09 IFIPIEEE International Symposium on Integrated Network Management 2009
, pp. 577-584
-
-
Fioreze, T.1
Granville, L.Z.2
Pras, A.3
Sperotto, A.4
Sadre, R.5
-
35
-
-
84874680077
-
Large-scale network monitoring for visual analysis of attacks
-
Cambridge, MA, USA, September 15
-
Fischer F, Mansmann F, Keim DA, Pietzko S. Large-scale network monitoring for visual analysis of attacks. In: Visualization for computer security 5th international workshop VizSec 2008, 2008 proceedings, vol. 72(1-3), Cambridge, MA, USA, September 15, 2008. p. 1-8.
-
(2008)
Visualization for Computer Security 5th International Workshop VizSec 2008, 2008 Proceedings
, vol.72
, Issue.1-3
, pp. 1-8
-
-
Fischer, F.1
Mansmann, F.2
Keim, D.A.3
Pietzko, S.4
-
38
-
-
84863031076
-
BotCloud: Detecting botnets using MapReduce
-
Francois J, Wang S, Bronzi W, State R, Engel T. BotCloud: detecting botnets using MapReduce. In: 2011 IEEE international workshop on information forensics and security (WIFS), 2011. p. 1-6.
-
(2011)
2011 IEEE International Workshop on Information Forensics and Security (WIFS)
, pp. 1-6
-
-
Francois, J.1
Wang, S.2
Bronzi, W.3
State, R.4
Engel, T.5
-
39
-
-
77950814614
-
A network access control mechanism based on behavior profiles
-
ACSAC '09. Annual, 2009
-
Frias-Martinez V, Sherrick J, Stolfo SJ, Keromytis AD. A network access control mechanism based on behavior profiles. In: Computer security applications conference, 2009. ACSAC '09. Annual, 2009. p. 3-12.
-
(2009)
Computer Security Applications Conference
, pp. 3-12
-
-
Frias-Martinez, V.1
Sherrick, J.2
Stolfo, S.J.3
Keromytis, A.D.4
-
41
-
-
83255176962
-
FlowInfra: A fault-resilient scalable infrastructure for network-wide flow level measurement
-
Gao L, Yang J, Zhang H, Zhang B, Qin D. FlowInfra: a fault-resilient scalable infrastructure for network-wide flow level measurement. In: Network operations and management symposium (APNOMS), 2011 13th Asia-Pacific, 2011. p. 1-8.
-
(2011)
Network Operations and Management Symposium (APNOMS), 2011 13th Asia-Pacific
, pp. 1-8
-
-
Gao, L.1
Yang, J.2
Zhang, H.3
Zhang, B.4
Qin, D.5
-
42
-
-
33947634049
-
A DoS resilient flow-level intrusion detection approach for high-speed networks
-
ICDCS 2006
-
Gao Y, Li Z, Chen Y. A DoS resilient flow-level intrusion detection approach for high-speed networks. In: 26th IEEE international conference on distributed computing systems, 2006, ICDCS 2006, 2006. p. 39.
-
(2006)
26th IEEE International Conference on Distributed Computing Systems, 2006
, pp. 39
-
-
Gao, Y.1
Li, Z.2
Chen, Y.3
-
43
-
-
33845446718
-
Behavior-based network security goes mainstream
-
D. Geer Behavior-based network security goes mainstream Computer 39 March (3) 2006 14 17
-
(2006)
Computer
, vol.39
, Issue.MARCH 3
, pp. 14-17
-
-
Geer, D.1
-
47
-
-
58049166177
-
Revisiting the issues on netflow sample and export performance
-
ChinaCom 2008
-
Haddadi H, Landa R, Moore AW, Bhatti S, Rio M, Che X. Revisiting the issues on netflow sample and export performance. In: Third international conference on communications and networking in China, 2008. ChinaCom 2008. 2008. p. 442-6.
-
(2008)
Third International Conference on Communications and Networking in China, 2008
, pp. 442-446
-
-
Haddadi, H.1
Landa, R.2
Moore, A.W.3
Bhatti, S.4
Rio, M.5
Che, X.6
-
48
-
-
44249127526
-
PFlours: A new packet and flow gathering tool
-
ICACT 2008
-
Han B-J, Lee J-H, Sohn S-G, Ryu J-H, Chung T-M. pFlours: a new packet and flow gathering tool. In: 10th international conference on advanced communication technology, 2008. ICACT 2008, vol. 1, 2008. p. 731-6.
-
(2008)
10th International conference on advanced communication technology
, vol.1
, pp. 731-736
-
-
Han, B.-J.1
Lee, J.-H.2
Sohn, S.-G.3
Ryu, J.-H.4
Chung, T.-M.5
-
50
-
-
37549065086
-
Fast memory efficient flow rate estimation using runs
-
F. Hao, M. Kodialam, T.V. Lakshman, and S. Mohanty Fast memory efficient flow rate estimation using runs IEEE/ACM Transactions on Networking 15 6 2007 1467 1477
-
(2007)
IEEE/ACM Transactions on Networking
, vol.15
, Issue.6
, pp. 1467-1477
-
-
Hao, F.1
Kodialam, M.2
Lakshman, T.V.3
Mohanty, S.4
-
52
-
-
67650175988
-
Entropy based adaptive flow aggregation
-
Y. Hu, D.-m. Chiu, J.C.S. Lui, and S. Member Entropy based adaptive flow aggregation IEEE/ACM Transactions on Networking 17 3 2009 698 711
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.3
, pp. 698-711
-
-
Hu, Y.1
Chiu, D.-M.2
Lui, J.C.S.3
Member, S.4
-
53
-
-
84874695116
-
-
Retrieved June 3
-
Internet Traffic Classification. 〈 http://www.caida.org/research/ traffic-analysis/classification-overview/ 〉. Retrieved June 3, 2012.
-
(2012)
Internet Traffic Classification
-
-
-
54
-
-
70349446395
-
-
Retrieved June 3
-
Introduction to Cisco IOS ® NetFlow - a technical overview. 〈 http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6555/ps6601/ prod-white-paper0900aecd80406232.html 〉. Retrieved June 3, 2012.
-
(2012)
Introduction to Cisco IOS ® NetFlow - A Technical Overview
-
-
-
55
-
-
84874710347
-
-
IPFIX. Retrieved September 13
-
IPFIX. 〈 http://datatracker.ietf.org/wg/ipfix/ 〉. Retrieved September 13, 2012.
-
(2012)
-
-
-
56
-
-
78649491247
-
Network prefix-level traffic profiling characterizing, modeling, and evaluation
-
H. Jiang, Z. Ge, S. Jin, and J. Wang Network prefix-level traffic profiling characterizing, modeling, and evaluation Computer Networks 54 December (18) 2010 3327 3340
-
(2010)
Computer Networks
, vol.54
, Issue.DECEMBER 18
, pp. 3327-3340
-
-
Jiang, H.1
Ge, Z.2
Jin, S.3
Wang, J.4
-
57
-
-
70450037559
-
Lightweight application classification for network management
-
Jiang H, Moore AW, Ge Z, Jin S, Wang J. Lightweight application classification for network management. In: Proceedings of the 2007 SIGCOMM workshop on Internet network management INM 07, 2007. p. 299.
-
(2007)
Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management INM 07
, pp. 299
-
-
Jiang, H.1
Moore, A.W.2
Ge, Z.3
Jin, S.4
Wang, J.5
-
58
-
-
70449414284
-
P2P traffic identification based on NetFlow TCP flag
-
ICFCC 2009. April
-
Jinsong W, Weiwei L, Yan Z, Tao L, Zilong W. P2P traffic identification based on NetFlow TCP flag. In: International conference on future computer and communication, 2009. ICFCC 2009. April 2009. p. 700-3.
-
(2009)
International Conference on Future Computer and Communication, 2009
, pp. 700-703
-
-
Jinsong, W.1
Weiwei, L.2
Yan, Z.3
Tao, L.4
Zilong, W.5
-
63
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
New York, NY, USA: ACM 1-12
-
Kim H, Claffy KC, Fomenkov M, Barman D, Faloutsos M, Lee K. Internet traffic classification demystified: myths, caveats, and the best practices. In: Proceedings of the 2008 ACM CoNEXT conference, CoNEXT '08, New York, NY, USA: ACM; 2008. p. 11:1-12.
-
(2008)
Proceedings of the 2008 ACM CoNEXT Conference, CoNEXT '08
, pp. 11
-
-
Kim, H.1
Claffy, K.C.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
64
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
NOMS 2004. IEEE/IFIP, vol. 1, April 2004
-
Kim M-S, Kong H-J, Hong S-C, Chung S-H, Hong JW. A flow-based method for abnormal network traffic detection. In: Network operations and management symposium, 2004. NOMS 2004. IEEE/IFIP, vol. 1, April 2004. p. 599-612.
-
Network Operations and Management Symposium, 2004
, pp. 599-612
-
-
Kim, M.-S.1
Kong, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
65
-
-
33847107591
-
2006 Relationship discovery with netflow to enable business-driven IT management
-
BDIM '06, April 2006
-
Kind A, Gantenbein D, Etoh H. 2006 Relationship discovery with netflow to enable business-driven IT management. In: The first IEEE/IFIP international workshop on business-driven IT management, 2006, BDIM '06, April 2006. p. 63-70.
-
(2006)
The First IEEE/IFIP International Workshop on Business-driven IT Management
, pp. 63-70
-
-
Kind, A.1
Gantenbein, D.2
Etoh, H.3
-
67
-
-
79952910428
-
One-way delay measurement based on flow data: Quantification and compensation of errors by exporter profiling
-
Köandgel J. One-way delay measurement based on flow data: quantification and compensation of errors by exporter profiling. In: 2011 International conference on information networking (ICOIN), 2011. p. 25-30.
-
(2011)
2011 International Conference on Information Networking (ICOIN)
, pp. 25-30
-
-
Köandgel, J.1
-
71
-
-
58649109363
-
An architectural framework for accurate characterization of network traffic
-
S.R. Kundu, S. Pal, K. Basu, and S.K. Das An architectural framework for accurate characterization of network traffic IEEE Transactions on Parallel and Distributed Systems 20 1 2009 111 123
-
(2009)
IEEE Transactions on Parallel and Distributed Systems
, vol.20
, Issue.1
, pp. 111-123
-
-
Kundu, S.R.1
Pal, S.2
Basu, K.3
Das, S.K.4
-
73
-
-
8344255864
-
Structural analysis of network traffic flows
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E.D. Kolaczyk, and N. Taft Structural analysis of network traffic flows SIGMETRICS Performance Evaluation Review 32 June (1) 2004 61 72
-
(2004)
SIGMETRICS Performance Evaluation Review
, vol.32
, Issue.JUNE 1
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
75
-
-
4243116400
-
The spinning cube of potential doom
-
S. Lau The spinning cube of potential doom Communications of the ACM 47 June (6) 2004 25 26
-
(2004)
Communications of the ACM
, vol.47
, Issue.JUNE 6
, pp. 25-26
-
-
Lau, S.1
-
77
-
-
79960855780
-
RelSamp: Preserving application structure in sampled flow measurements
-
April 2011
-
Lee M, Hajjat M, Kompella RR, Rao S. RelSamp: preserving application structure in sampled flow measurements. In: INFOCOM, 2011 Proceedings IEEE, April 2011. p. 2354-62.
-
INFOCOM, 2011 Proceedings IEEE
, pp. 2354-2362
-
-
Lee, M.1
Hajjat, M.2
Kompella, R.R.3
Rao, S.4
-
79
-
-
79955118081
-
A hadoop-based packet trace processing tool
-
Berlin, Heidelberg: Springer-Verlag
-
Lee Y, Kang W, Lee Y. A hadoop-based packet trace processing tool. In: Proceedings of the third international conference on traffic monitoring and analysis, TMA'11. Berlin, Heidelberg: Springer-Verlag; 2011. p. 51-63.
-
(2011)
Proceedings of the Third International Conference on Traffic Monitoring and Analysis, TMA'11
, pp. 51-63
-
-
Lee, Y.1
Kang, W.2
Lee, Y.3
-
81
-
-
84863063180
-
Fast application-level traffic classification using Net Flow records
-
C. Liang, and G. Jian Fast application-level traffic classification using Net Flow records Journal on Communications 33 1 2012 145 152
-
(2012)
Journal on Communications
, vol.33
, Issue.1
, pp. 145-152
-
-
Liang, C.1
Jian, G.2
-
83
-
-
38049051221
-
Heterogeneous multi-sensor data fusion with multi-class support vector machines: Creating network security situation awareness
-
Liu X-W, Wang H-Q, Liang Y, Lai J-B. Heterogeneous multi-sensor data fusion with multi-class support vector machines: creating network security situation awareness. In: 2007 international conference on machine learning and cybernetics, vol. 5, 2007. p. 2689-94.
-
(2007)
2007 International Conference on Machine Learning and Cybernetics
, vol.5
, pp. 2689-2694
-
-
Liu, X.-W.1
Wang, H.-Q.2
Liang, Y.3
Lai, J.-B.4
-
84
-
-
84898842146
-
Visualization of host behavior for network security
-
Mansman F, Meier L, Keim DA. Visualization of host behavior for network security. Network Security 2007:187-202.
-
(2007)
Network Security
, pp. 187-202
-
-
Mansman, F.1
Meier, L.2
Keim, D.A.3
-
85
-
-
84874674099
-
Interactive analysis of netflows for misuse detection in large IP networks
-
Müller P, Neumair B, Rodosek GD, editors GI
-
Mansmann F, Fischer F, Keim DA, Pietzko S, Waldvogel M. Interactive analysis of netflows for misuse detection in large IP networks. In: Müller P, Neumair B, Rodosek GD, editors. DFN-Forum Kommunikationstechnologien, LNI, vol. 149, GI, 2009. p. 115-24.
-
(2009)
DFN-Forum Kommunikationstechnologien, LNI
, vol.149
, pp. 115-124
-
-
Mansmann, F.1
Fischer, F.2
Keim, D.A.3
Pietzko, S.4
Waldvogel, M.5
-
86
-
-
20444495766
-
PortVis: A tool for port-based detection of security events
-
ACM: New York, NY, USA
-
McPherson J, Ma K-L, Krystosk P, Bartoletti T, Christensen M. PortVis: a tool for port-based detection of security events. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security, VizSEC/DMSEC '04, ACM: New York, NY, USA; 2004. p. 73-81.
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC '04
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
87
-
-
77954869647
-
Cybermetrics: User identification through network flow analysis
-
Stiller B, De Turck F, editors. Mechanisms for autonomous management of networks and services Berlin, Heidelberg: Springer
-
Melnikov N, Schönwälder J. Cybermetrics: user identification through network flow analysis. In: Stiller B, De Turck F, editors. Mechanisms for autonomous management of networks and services. Lecture notes in computer science, vol. 6155. Berlin, Heidelberg: Springer; 2010. p. 167-70.
-
(2010)
Lecture Notes in Computer Science
, vol.6155
, pp. 167-170
-
-
Melnikov Schönwälder N, J.1
-
89
-
-
70849127416
-
Improving host profiling with bidirectional flows
-
Minarik P, Vykopal J, Krmicek V. Improving host profiling with bidirectional flows. In: International conference on computational science and engineering, 2009. CSE '09, vol. 3, 2009. p. 231-7.
-
(2009)
International Conference on Computational Science and Engineering, 2009. CSE '09
, vol.3
, pp. 231-237
-
-
Minarik, P.1
Vykopal, J.2
Krmicek, V.3
-
94
-
-
77954868433
-
Distributed architecture for real-time traffic analysis
-
Springer-Verlag: Berlin, Heidelberg
-
Morariu C, Stiller B. Distributed architecture for real-time traffic analysis. In: Proceedings of the mechanisms for autonomous management of networks and services, and 4th international conference on autonomous infrastructure, management and security, AIMS'10. Springer-Verlag: Berlin, Heidelberg; 2010. p. 171-4.
-
(2010)
Proceedings of the Mechanisms for Autonomous Management of Networks and Services, and 4th International Conference on Autonomous Infrastructure, Management and Security, AIMS'10
, pp. 171-174
-
-
Morariu, C.1
Stiller, B.2
-
97
-
-
52649166702
-
Efficient aggregate computation over data streams
-
April
-
Nagaraj K, Naidu KVM, Rastogi R, Satkin S. Efficient aggregate computation over data streams. In: IEEE 24th international conference on data engineering, 2008. ICDE 2008. April 2008. p. 1382-4.
-
(2008)
IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008
, pp. 1382-1384
-
-
Nagaraj, K.1
Kvm, N.2
Rastogi, R.3
Satkin, S.4
-
98
-
-
84874755487
-
-
Retrieved September 13
-
NetFlow applications 〈 http://netflow.caligare.com/applications.htm 〉. Retrieved September 13, 2012.
-
(2012)
NetFlow Applications
-
-
-
99
-
-
84874742511
-
-
Retrieved September 13
-
NFSen - Netflow Sensor. 〈 http://nfsen.sourceforge.net/ 〉. Retrieved September 13, 2012.
-
(2012)
NFSen - Netflow Sensor
-
-
-
100
-
-
62849120844
-
A survey of techniques for Internet traffic classification using machine learning
-
T.T.T. Nguyen, and G. Armitage A survey of techniques for Internet traffic classification using machine learning Communications Surveys Tutorials, IEEE 10 4 2008 56 76
-
(2008)
Communications Surveys Tutorials, IEEE
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.T.T.1
Armitage, G.2
-
101
-
-
84855807951
-
Towards a flow-based internet traffic classification for bandwidth optimization
-
S.M. Nor, and A.B. Mohd Towards a flow-based internet traffic classification for bandwidth optimization International Journal of Computer Science and Security 3 3 2009 146
-
(2009)
International Journal of Computer Science and Security
, vol.3
, Issue.3
, pp. 146
-
-
Nor, S.M.1
Mohd, A.B.2
-
102
-
-
34250776964
-
Flamingo: Visualizing internet traffic. In: Network operations and management symposium, 2006
-
April
-
Oberheide J, Goff M, Karir M. Flamingo: visualizing internet traffic. In: Network operations and management symposium, 2006. NOMS 2006. 10th IEEE/IFIP, April 2006. p. 150-61.
-
(2006)
NOMS 2006. 10th IEEE/IFIP
, pp. 150-161
-
-
Oberheide, J.1
Goff, M.2
Karir, M.3
-
105
-
-
80052708742
-
Flow signatures of popular applications
-
Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors
-
Perelman V, Melnikov N, Schönwälder J. Flow signatures of popular applications. In: Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors. Integrated network management, IEEE; 2011. p. 9-16.
-
(2011)
Integrated Network Management, IEEE
, pp. 9-16
-
-
Perelman, V.1
Melnikov, N.2
Schönwälder, J.3
-
106
-
-
84870637005
-
FlowScan: A network traffic flow reporting and visualization tool
-
Berkeley, CA, USA: USENIX Association
-
Plonka D. FlowScan: a network traffic flow reporting and visualization tool. In: Proceedings of the 14th USENIX conference on system administration. Berkeley, CA, USA: USENIX Association; 2000. p. 305-18.
-
(2000)
Proceedings of the 14th USENIX Conference on System Administration
, pp. 305-318
-
-
Plonka, D.1
-
107
-
-
78650597637
-
Statistical model applied to netflow for network intrusion detection
-
A. Proto, L.A. Alexandre, M.L. Batista, I.L. Oliveira, and A.M. Cansian Statistical model applied to netflow for network intrusion detection Transactions on Computational Science 11 2010 179 191
-
(2010)
Transactions on Computational Science
, vol.11
, pp. 179-191
-
-
Proto, A.1
Alexandre, L.A.2
Batista, M.L.3
Oliveira, I.L.4
Cansian, A.M.5
-
108
-
-
80054885005
-
Novelty P2P flow analysis system
-
Qun W, Xiuyue D, Lu H. Novelty P2P flow analysis system. In: 7th International conference on wireless communications, networking and mobile computing (WiCOM), 2011, 2011. p. 1-4.
-
(2011)
7th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), 2011
, pp. 1-4
-
-
Qun, W.1
Xiuyue, D.2
Lu, H.3
-
109
-
-
84899941508
-
Multi-agent approach to network intrusion detection
-
Rehak M, Pechoucek M, Celeda P, Krmicek V, Grill M, Bartos K. Multi-agent approach to network intrusion detection. In: Proceedings of the 7th international joint conference on autonomous agents and multiagent systems demo papers. International foundation for autonomous agents and multiagent systems, 2008. p. 1695-6.
-
(2008)
Proceedings of the 7th International Joint Conference on Autonomous Agents and Multiagent Systems Demo Papers. International Foundation for Autonomous Agents and Multiagent Systems
, pp. 1695-1696
-
-
Rehak, M.1
Pechoucek, M.2
Celeda, P.3
Krmicek, V.4
Grill, M.5
Bartos, K.6
-
111
-
-
33645238804
-
IDGraphs intrusion detection and analysis using stream compositing
-
P. Ren, Y. Gao, Z. Li, Y. Chen, and B. Watson IDGraphs intrusion detection and analysis using stream compositing Computer Graphics and Applications IEEE 26 2 2006 28 39
-
(2006)
Computer Graphics and Applications IEEE
, vol.26
, Issue.2
, pp. 28-39
-
-
Ren, P.1
Gao, Y.2
Li, Z.3
Chen, Y.4
Watson, B.5
-
113
-
-
57349098619
-
Enhanced Netflow version 9 (e-Netflow v9) for network mediation: Structure, experiment and analysis
-
Rohmad MS, Azmat F, Manaf M, Manan J-l. Enhanced Netflow version 9 (e-Netflow v9) for network mediation: structure, experiment and analysis. In: International symposium on information technology, 2008. ITSim 2008, vol. 3, 2008. p. 1-6.
-
(2008)
International Symposium on Information Technology, 2008. ITSim 2008
, vol.3
, pp. 1-6
-
-
Rohmad, M.S.1
Azmat, F.2
Manaf, M.3
Manan, J.-L.4
-
115
-
-
84874708025
-
-
sFlow Collectors. Retrieved September 13, 2012
-
sFlow Collectors. 〈 http://www.sflow.org/products/collectors.php 〉. Retrieved September 13, 2012.
-
-
-
-
117
-
-
79952918906
-
FACT: Flow-based approach for connectivity tracking
-
Spring N, Riley GF, editors. PAM Springer
-
Schatzmann D, Leinen S, Kögel J, Mühlbauer W. FACT: flow-based approach for connectivity tracking. In: Spring N, Riley GF, editors. PAM, Lecture notes in computer science, vol. 6579. Springer; 2011. p. 214-23.
-
(2011)
Lecture Notes in Computer Science
, vol.6579
, pp. 214-223
-
-
Schatzmann, D.1
Leinen, S.2
Kögel, J.3
Mühlbauer, W.4
-
118
-
-
78650901973
-
Digging into HTTPS: Flow-based classification of webmail traffic
-
New York, NY, USA: ACM
-
Schatzmann D, Mühlbauer W, Spyropoulos T, Dimitropoulos X. Digging into HTTPS: flow-based classification of webmail traffic. In: Proceedings of the 10th annual conference on internet measurement, IMC '10. New York, NY, USA: ACM; 2010. p. 322-7.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC '10
, pp. 322-327
-
-
Schatzmann, D.1
Mühlbauer, W.2
Spyropoulos, T.3
Dimitropoulos, X.4
-
119
-
-
84999424855
-
CSamp: A system for network-wide flow monitoring
-
San Francisco, CA, April
-
Sekar V, Reiter MK, Willinger W, Zhang H, Kompella RR, Andersen DG. cSamp: a system for network-wide flow monitoring. In: Proceedings of the 5th USENIX NSDI, San Francisco, CA, April 2008.
-
(2008)
Proceedings of the 5th USENIX NSDI
-
-
Sekar, V.1
Reiter, M.K.2
Willinger, W.3
Zhang, H.4
Kompella, R.R.5
Andersen, D.G.6
-
120
-
-
84859108931
-
Gerbilsphere inner sphere network visualization
-
D.S. Shelley, and M.H. Gunes Gerbilsphere inner sphere network visualization Computer Networks 56 3 2012 1016 1028
-
(2012)
Computer Networks
, vol.56
, Issue.3
, pp. 1016-1028
-
-
Shelley, D.S.1
Gunes, M.H.2
-
121
-
-
70449978649
-
Observations of IPv6 traffic
-
CCCM 2009
-
Shen W, Chen Y, Zhang Q, Chen Y, Deng B, Li X, et al. Observations of IPv6 traffic. In: ISECS international colloquium on computing, communication, control, and management, 2009. CCCM 2009, vol. 2, 2009. p. 278-82.
-
(2009)
ISECS International Colloquium on Computing, Communication, Control, and Management, 2009
, vol.2
, pp. 278-282
-
-
Shen, W.1
Chen, Y.2
Zhang, Q.3
Chen, Y.4
Deng, B.5
Li, X.6
-
122
-
-
76249132355
-
Visualization of flow data based on clustering technique for identifying network anomalies
-
Singh MP, Subramanian N, Rajamenakshi R. Visualization of flow data based on clustering technique for identifying network anomalies. In: IEEE symposium on industrial electronics applications, 2009. ISIEA 2009, vol. 2, 2009. p. 973-8.
-
(2009)
IEEE Symposium on Industrial Electronics Applications, 2009. ISIEA 2009
, vol.2
, pp. 973-978
-
-
Singh, M.P.1
Subramanian, N.2
Rajamenakshi, R.3
-
125
-
-
77955209381
-
Outside the closed world: On using machine learning for network intrusion detection
-
Sommer R, Paxson V. Outside the closed world: on using machine learning for network intrusion detection. In: 2010 IEEE symposium on security and privacy, 2010. p. 305-16.
-
(2010)
2010 IEEE Symposium on Security and Privacy
, pp. 305-316
-
-
Sommer, R.1
Paxson, V.2
-
126
-
-
77950921112
-
Machine learning algorithms for accurate flow-based network traffic classification evaluation and comparison
-
M. Soysal, and E.G. Schmidt Machine learning algorithms for accurate flow-based network traffic classification evaluation and comparison Performance Evaluation 67 June (6) 2010 451 467
-
(2010)
Performance Evaluation
, vol.67
, Issue.JUNE 6
, pp. 451-467
-
-
Soysal, M.1
Schmidt, E.G.2
-
127
-
-
80052768358
-
Flow-based intrusion detection
-
Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors
-
Sperotto A, Pras A. Flow-based intrusion detection. In: Agoulmine N, Bartolini C, Pfeifer T, O'Sullivan D, editors. Integrated network management. IEEE; 2011. p. 958-63.
-
(2011)
Integrated Network Management. IEEE
, pp. 958-963
-
-
Sperotto, A.1
Pras, A.2
-
128
-
-
77955469676
-
An overview of ip flow-based intrusion detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller An overview of ip flow-based intrusion detection Communications Surveys Tutorials, IEEE 12 3 2010 343 356
-
(2010)
Communications Surveys Tutorials, IEEE
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
129
-
-
78649236114
-
Masquerade detection in network environments
-
July 2010
-
Strasburg C, Krishnan S, Dorman K, Basu S, Wong JS. Masquerade detection in network environments. In: 10th IEEE/IPSJ international symposium on applications and the Internet (SAINT), 2010, July 2010. p. 38-44.
-
(2010)
10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT)
, pp. 38-44
-
-
Strasburg, C.1
Krishnan, S.2
Dorman, K.3
Basu, S.4
Wong, J.S.5
-
131
-
-
82955223310
-
Active flows in diagnostic of troubleshooting on backbone links
-
abs/0911.2
-
Sukhov AM, Sidelnikov DI, Galtsev AA, Platonov AP, Strizhov MV. Active flows in diagnostic of troubleshooting on backbone links. CoRR, abs/0911.2, 2009.
-
(2009)
CoRR
-
-
Sukhov, A.M.1
Sidelnikov, D.I.2
Galtsev, A.A.3
Platonov, A.P.4
Strizhov, M.V.5
-
132
-
-
77949348071
-
NetBytes viewer: An entity-based NetFlow visualization utility for identifying intrusive behavior
-
Taylor T, Brooks S, McHugh J. NetBytes viewer: an entity-based NetFlow visualization utility for identifying intrusive behavior. VizSEC 2007, 2008. p. 101-14.
-
(2008)
VizSEC 2007
, pp. 101-114
-
-
Taylor, T.1
Brooks, S.2
McHugh, J.3
-
133
-
-
66249140932
-
FloVis: Flow visualization system
-
March
-
Taylor T, Paterson D, Glanfield J, Gates C, Brooks S, McHugh J. FloVis: flow visualization system. In: Conference for homeland security, 2009. CATCH '09. Cybersecurity applications technology, March 2009. p. 186-98.
-
(2009)
Conference for Homeland Security, 2009. CATCH '09. Cybersecurity Applications Technology
, pp. 186-198
-
-
Taylor, T.1
Paterson, D.2
Glanfield, J.3
Gates, C.4
Brooks, S.5
McHugh, J.6
-
134
-
-
79952950177
-
Peeling away timing error in netflow data
-
Spring N, Riley GF, editors. PAM Springer
-
Trammell B, Tellenbach B, Schatzmann D, Burkhart M. Peeling away timing error in netflow data. In: Spring N, Riley GF, editors. PAM, Lecture notes in computer science, vol. 6579. Springer; 2011. p. 194-203.
-
(2011)
Lecture Notes in Computer Science
, vol.6579
, pp. 194-203
-
-
Trammell, B.1
Tellenbach, B.2
Schatzmann, D.3
Burkhart, M.4
-
135
-
-
70350501463
-
A heuristic method of finding heavy hitter prefix pairs in IP traffic
-
P. Truong, and F. Guillemin A heuristic method of finding heavy hitter prefix pairs in IP traffic Communications Letters, IEEE 13 October (10) 2009 803 805
-
(2009)
Communications Letters, IEEE
, vol.13
, Issue.OCTOBER 10
, pp. 803-805
-
-
Truong, P.1
Guillemin, F.2
-
139
-
-
40949122371
-
Flow-based identification of P2P heavy-hitters
-
Wagner A, Dubendorfer T, Hammerle L, Plattner B. Flow-based identification of P2P heavy-hitters. International conference on internet surveillance and protection, 00(c), 2006. p. 15.
-
(2006)
International Conference on Internet Surveillance and Protection, 00(c)
, pp. 15
-
-
Wagner, A.1
Dubendorfer, T.2
Hammerle, L.3
Plattner, B.4
-
140
-
-
79956058361
-
Machine learning approach for IP-flow record anomaly detection
-
Berlin, Heidelberg: Springer-Verlag
-
Wagner C, François J, State R, Engel T. Machine learning approach for IP-flow record anomaly detection. In: Proceedings of the 10th international IFIP TC 6 conference on Networking - volume part I, NETWORKING'11. Berlin, Heidelberg: Springer-Verlag; 2011. p. 28-39.
-
(2011)
Proceedings of the 10th International IFIP TC 6 Conference on Networking - Volume Part I, NETWORKING'11
, pp. 28-39
-
-
Wagner, C.1
François, J.2
State, R.3
Engel, T.4
-
141
-
-
81055155520
-
DANAK: Finding the odd!
-
Wagner C, Francois J, State R, Engel T. DANAK: finding the odd! In: 5th International conference on network and system security (NSS), 2011, 2011. p. 161-8.
-
(2011)
5th International Conference on Network and System Security (NSS), 2011
, pp. 161-168
-
-
Wagner, C.1
Francois, J.2
State, R.3
Engel, T.4
-
142
-
-
79951667746
-
Game theory driven monitoring of spatial-aggregated IP-Flow records
-
Wagner C, Wagener G, State R, Engel T, Dulaunoy A. Game theory driven monitoring of spatial-aggregated IP-Flow records. In: 2010 International conference on network and service management (CNSM), 2010. p. 463-8.
-
(2010)
2010 International Conference on Network and Service Management (CNSM)
, pp. 463-468
-
-
Wagner, C.1
Wagener, G.2
State, R.3
Engel, T.4
Dulaunoy, A.5
-
144
-
-
70449469997
-
Profiling and clustering internet hosts
-
Wei S, Mirkovic J, Kissel E. Profiling and clustering internet hosts. In: DMIN'06, 2006. p. 269-75.
-
(2006)
DMIN'06
, pp. 269-275
-
-
Wei, S.1
Mirkovic, J.2
Kissel, E.3
-
145
-
-
84856261742
-
The machine that would predict the future
-
D. Weinberger The machine that would predict the future Scientific American 305 6 2011 52 57
-
(2011)
Scientific American
, vol.305
, Issue.6
, pp. 52-57
-
-
Weinberger, D.1
-
146
-
-
84874696134
-
Botnet detection using netflow information finding new botnets based on client connections
-
Weststrate H. Botnet detection using netflow information finding new botnets based on client connections. In: Structure, 2009.
-
(2009)
Structure
-
-
Weststrate, H.1
-
147
-
-
79952826624
-
Inductive intrusion detection in flow-based network data using one-class support vector machines
-
Winter P, Hermann E, Zeilinger M. Inductive intrusion detection in flow-based network data using one-class support vector machines. In: 4th IFIP international conference on new technologies, mobility and security (NTMS), 2011, 2011. p. 1-5.
-
(2011)
4th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 2011
, pp. 1-5
-
-
Winter, P.1
Hermann, E.2
Zeilinger, M.3
-
149
-
-
79960853919
-
Network-aware behavior clustering of Internet end hosts
-
April
-
Xu K, Wang F, Gu L. Network-aware behavior clustering of Internet end hosts. In: INFOCOM, 2011 Proceedings IEEE, April 2011. p. 2078-86.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 2078-2086
-
-
Xu, K.1
Wang, F.2
Gu, L.3
-
150
-
-
33750711125
-
Profiling Internet backbone traffic behavior models and applications
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya Profiling Internet backbone traffic behavior models and applications SIGCOMM Computer Communication Review 35 August (4) 2005 169 180
-
(2005)
SIGCOMM Computer Communication Review
, vol.35
, Issue.AUGUST 4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
152
-
-
13944256121
-
VisFlowConnect: Netflow visualizations of link relationships for security situational awareness
-
Yin X, Yurcik W, Treaster M, Li Y, Lakkaraju K. VisFlowConnect: netflow visualizations of link relationships for security situational awareness. In: Proceedings of the 2004 ACM workshop on visualization and data mining for computer security, VizSEC/DMSEC '04. ACM; 2004. p. 26-34.
-
(2004)
Proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC '04. ACM
, pp. 26-34
-
-
Yin, X.1
Yurcik, W.2
Treaster, M.3
Li, Y.4
Lakkaraju, K.5
-
156
-
-
84874719821
-
Study on the TOPN abnormal detection based on the netflow data set
-
H. Zhang Study on the TOPN abnormal detection based on the netflow data set Computer and Information Science 2 3 2009 103 108
-
(2009)
Computer and Information Science
, vol.2
, Issue.3
, pp. 103-108
-
-
Zhang, H.1
-
157
-
-
80052318907
-
A design of NetFlow traffic statistic and analysis system for process of the transition of commercialization of IPV6
-
June
-
Zhang J, Meng S. A design of NetFlow traffic statistic and analysis system for process of the transition of commercialization of IPV6. In: 2011 International conference on computer science and service system (CSSS), June 2011. p. 963-5.
-
(2011)
2011 International Conference on Computer Science and Service System (CSSS)
, pp. 963-965
-
-
Zhang, J.1
Meng, S.2
-
161
-
-
51949093835
-
Botnet research survey
-
Zhu Z, Lu G, Chen Y, Fu ZJ, Roberts P, Han K. Botnet research survey. In: Computer software and applications, 2008. COMPSAC '08. 32nd annual IEEE international, 2008. p. 967-72.
-
(2008)
Computer Software and Applications, 2008. COMPSAC '08. 32nd Annual IEEE International
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.J.4
Roberts, P.5
Han, K.6
|