-
1
-
-
84879666849
-
-
Cisco.com: release 12.4. September
-
Cisco.com: Cisco ios netflow configuration guide, release 12.4. (September 2010), http://www.cisco.com
-
(2010)
Cisco Ios Netflow Configuration Guide
-
-
-
2
-
-
34250642066
-
-
RFC 3917, Informational
-
Quittek, J., Zseby, T., Claise, B., Zander, S.: Requirements for IP Flow Information Export (IPFIX). RFC 3917, Informational (2004)
-
(2004)
Requirements for IP Flow Information Export (IPFIX)
-
-
Quittek, J.1
Zseby, T.2
Claise, B.3
Zander, S.4
-
3
-
-
77955469676
-
An overview of ip flow-based intrusion detection
-
Sperotto, A., Schaffrath, G., Sadre, R., Morariu, C., Pras, A., Stiller, B.: An overview of ip flow-based intrusion detection. IEEE Communications Surveys & Tutorials 12(3), 343-356 (2010)
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
4
-
-
84862147735
-
Autonomic parameter tuning of anomaly-based idss: An ssh case study
-
Sperotto, A., Mandjes, M.R.H., Sadre, R., de Boer, P.T., Pras, A.: Autonomic parameter tuning of anomaly-based idss: an ssh case study. IEEE Transactions on Network and Service Management 9, 128-141 (2012)
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, pp. 128-141
-
-
Sperotto, A.1
Mandjes, M.R.H.2
Sadre, R.3
De Boer, P.T.4
Pras, A.5
-
5
-
-
79955578061
-
M/G/∞ transience, and its applications to overload detection
-
Mandjes, M., Żuraniewski, P.: M/G/∞ transience, and its applications to overload detection. Performance Evaluation 68(6), 507-527 (2011)
-
(2011)
Performance Evaluation
, vol.68
, Issue.6
, pp. 507-527
-
-
Mandjes, M.1
Zuraniewski, P.2
-
6
-
-
84885053348
-
On Robust Covert Channels Inside DNS
-
Gritzalis, D., Lopez, J. (eds.) SEC 2009. Springer, Heidelberg
-
Nussbaum, L., Neyron, P., Richard, O.: On Robust Covert Channels Inside DNS. In: Gritzalis, D., Lopez, J. (eds.) SEC 2009. IFIP AICT, vol. 297, pp. 51-62. Springer, Heidelberg (2009)
-
(2009)
IFIP AICT
, vol.297
, pp. 51-62
-
-
Nussbaum, L.1
Neyron, P.2
Richard, O.3
-
8
-
-
38549174159
-
Detecting HTTP Tunnels with Statistical Mechanisms
-
June
-
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Detecting HTTP Tunnels with Statistical Mechanisms. In: IEEE International Conference on Communications (ICC 2007), pp. 6162-6168 (June 2007)
-
(2007)
IEEE International Conference on Communications (ICC 2007)
, pp. 6162-6168
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
9
-
-
56449109261
-
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
-
Dusi, M., Crotti, M., Gringoli, F., Salgarelli, L.: Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting. Computer Networks 53(1), 81-97 (2009)
-
(2009)
Computer Networks
, vol.53
, Issue.1
, pp. 81-97
-
-
Dusi, M.1
Crotti, M.2
Gringoli, F.3
Salgarelli, L.4
-
10
-
-
84864221133
-
DNSSM: A large scale passive DNS security monitoring framework
-
Marchal, S., Francois, J.,Wagner, C., State, R., Dulaunoy, A., Engel, T., Festor, O.: DNSSM: A large scale passive DNS security monitoring framework. In: IEEE Network Operations and Management Symposium (NOMS 2012), pp. 988-993 (2012)
-
(2012)
IEEE Network Operations and Management Symposium (NOMS 2012)
, pp. 988-993
-
-
Marchal, S.1
Francois, J.2
Wagner, C.3
State, R.4
Dulaunoy, A.5
Engel, T.6
Festor, O.7
-
11
-
-
50949121337
-
NIS04-2: Detection of DNS Anomalies using Flow Data Analysis
-
December
-
Karasaridis, A., Meier-Hellstern, K., Hoeflin, D.: NIS04-2: Detection of DNS Anomalies using Flow Data Analysis. In: IEEE International Conference on Global Telecommunications Conference (GLOBECOM 2006), pp. 1-6 (December 2006)
-
(2006)
IEEE International Conference on Global Telecommunications Conference (GLOBECOM 2006)
, pp. 1-6
-
-
Karasaridis, A.1
Meier-Hellstern, K.2
Hoeflin, D.3
-
12
-
-
84875951216
-
A methodological overview on anomaly detection
-
chapter to appear
-
Callegari, C., Coluccia, A., D'Alconzo, A., Ellens, W., Giordano, S., Mandjes, M., Pagano, M., Pepe, T., Ricciato, F., Żuraniewski, P.: A methodological overview on anomaly detection. COST-TMA Book chapter (to appear, 2013)
-
(2013)
COST-TMA Book
-
-
Callegari, C.1
Coluccia, A.2
D'Alconzo, A.3
Ellens, W.4
Giordano, S.5
Mandjes, M.6
Pagano, M.7
Pepe, T.8
Ricciato, F.9
Zuraniewski, P.10
-
14
-
-
77956961899
-
On the empirical determination of a distribution law (1933)
-
Shiryayev, A. (ed.) Selected Works of A.N. Kolmogorov. Springer Netherlands
-
Kolmogorov, A.: On the empirical determination of a distribution law (1933). In: Shiryayev, A. (ed.) Selected Works of A.N. Kolmogorov. Probability Theory and Mathematical Statistics, vol. II, pp. 139-146. Springer Netherlands (1992)
-
(1992)
Probability Theory and Mathematical Statistics
, vol.2
, pp. 139-146
-
-
Kolmogorov, A.1
|