메뉴 건너뛰기




Volumn 57, Issue 17, 2013, Pages 3446-3462

Distribution-based anomaly detection via generalized likelihood ratio test: A general Maximum Entropy approach

Author keywords

3G cellular networks; Anomaly detection; Generalized Likelihood Ratio Test (GLRT); Maximum Entropy (ME); Maximum Likelihood (ML); Network traffic

Indexed keywords

3G CELLULAR NETWORKS; ANOMALY DETECTION; EMPIRICAL DISTRIBUTIONS; GENERALIZED LIKELIHOOD RATIO TEST; GENERALIZED LIKELIHOOD-RATIO TESTS; MAXIMUM ENTROPY MODELS; MAXIMUM-ENTROPY APPROACHES; NETWORK TRAFFIC;

EID: 84887047298     PISSN: 13891286     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comnet.2013.07.028     Document Type: Article
Times cited : (41)

References (50)
  • 2
    • 84871061297 scopus 로고    scopus 로고
    • On attack causality in internet-connected cellular networks
    • August 2007
    • P. Traynor, P. McDaniel, T. La Porta. On attack causality in internet-connected cellular networks, in: USENIX Security'07, August 2007.
    • USENIX Security'07
    • Traynor, P.1    McDaniel, P.2    La Porta, T.3
  • 3
    • 74849109011 scopus 로고    scopus 로고
    • A review of DoS attack models for 3G cellular networks from a system-design perspective
    • Ricciato A review of DoS attack models for 3G cellular networks from a system-design perspective Computer Communications 33 5 2010
    • (2010) Computer Communications , vol.33 , Issue.5
    • Ricciato1
  • 4
    • 78650155254 scopus 로고    scopus 로고
    • Anomaly detection approaches for communication network
    • Springer London
    • M. Thottan, G. Liu, and C. Ji Anomaly detection approaches for communication network Algorithms for Next Generation Networks 2010 Springer London 239 261
    • (2010) Algorithms for Next Generation Networks , pp. 239-261
    • Thottan, M.1    Liu, G.2    Ji, C.3
  • 5
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 2007
    • (2007) Computer Networks , vol.51
    • Patcha, A.1    Park, J.M.2
  • 7
    • 0038011179 scopus 로고    scopus 로고
    • Specification-based anomaly detection: A new approach for detecting network intrusions
    • November 2002
    • R. Sekar et al., Specification-based anomaly detection: a new approach for detecting network intrusions, in: ACM CCS'02, November 2002.
    • ACM CCS'02
    • Sekar, R.1
  • 8
    • 0036343692 scopus 로고    scopus 로고
    • Detecting syn flooding attacks
    • Haining Wang, Danlu Zhang, Kang G. Shin, Detecting syn flooding attacks, in: INFOCOM 2002, vol. 3, 2002, pp. 23-27.
    • (2002) INFOCOM 2002 , vol.3 , pp. 23-27
    • Wang, H.1    Zhang, D.2    Shin, K.G.3
  • 9
    • 34548310426 scopus 로고    scopus 로고
    • On the Detection of signaling DoS attacks on 3G wireless networks
    • May 2007
    • Lee et al., On the Detection of signaling DoS attacks on 3G wireless networks, in: IEEE INFOCOM'07, May 2007.
    • IEEE INFOCOM'07
    • Lee1
  • 10
    • 21844462874 scopus 로고    scopus 로고
    • Structural analysis of network traffic flows
    • June 2004
    • Lakhina, Structural analysis of network traffic flows, in: ACM SIGMETRICS, June 2004.
    • ACM SIGMETRICS
    • Lakhina1
  • 18
    • 79551557610 scopus 로고    scopus 로고
    • An information-theoretic approach to detecting changes in multi-dimensional data streams
    • Dasu et al., An information-theoretic approach to detecting changes in multi-dimensional data streams, in: INTERFACE'06, 2006.
    • (2006) INTERFACE'06
    • Dasu1
  • 23
    • 84878701863 scopus 로고    scopus 로고
    • Detecting anomalies in network traffic using maximum entropy estimation
    • Y. Gu, A. McCallum, D. Towsley, Detecting anomalies in network traffic using maximum entropy estimation, in: IMC, 2005.
    • (2005) IMC
    • Gu, Y.1    McCallum, A.2    Towsley, D.3
  • 24
    • 1242330656 scopus 로고    scopus 로고
    • A signal analysis of network traffic anomalies
    • Barford et al., A signal analysis of network traffic anomalies, in: ACM SIGCOMM'02, 2002.
    • (2002) ACM SIGCOMM'02
    • Barford1
  • 30
    • 77956386014 scopus 로고    scopus 로고
    • On dominant characteristics of residential broadband internet traffic
    • G. Maier, A. Feldmann, V. Paxson, M. Allman, On dominant characteristics of residential broadband internet traffic, in: IEEE IMC, 2009.
    • (2009) IEEE IMC
    • Maier, G.1    Feldmann, A.2    Paxson, V.3    Allman, M.4
  • 36
    • 11944275853 scopus 로고
    • Information theory and statistical mechanics i/ii
    • E.T. Jaynes Information theory and statistical mechanics i/ii Physical Review 106/108 1957
    • (1957) Physical Review , vol.106-108
    • Jaynes, E.T.1
  • 37
    • 0020187981 scopus 로고
    • On the rationale of maximum-entropy methods
    • E.T. Jaynes On the rationale of maximum-entropy methods Proceedings of the IEEE 70 1982
    • (1982) Proceedings of the IEEE , vol.70
    • Jaynes, E.T.1
  • 39
    • 84976115094 scopus 로고
    • A discipline for the avoidance of unnecessary assumptions
    • L.H. Roberts A discipline for the avoidance of unnecessary assumptions ASTIN Bulletin 1971
    • (1971) ASTIN Bulletin
    • Roberts, L.H.1
  • 42
    • 0003723490 scopus 로고
    • Gibbs Measures and Phase Transitions
    • H.-O. Georgii Gibbs Measures and Phase Transitions de Gruyter 1988
    • (1988) De Gruyter
    • Georgii, H.-O.1
  • 47
    • 1042264823 scopus 로고    scopus 로고
    • A comparison of algorithms for maximum entropy parameter estimation
    • R. Malouf, A comparison of algorithms for maximum entropy parameter estimation, in: Sixth Conf. on Natural Language Learning, 2002.
    • (2002) Sixth Conf. on Natural Language Learning
    • Malouf, R.1
  • 50
    • 84878737375 scopus 로고    scopus 로고
    • Combining filtering and statistical methods for anomaly detection
    • A. Soule, K. Salamatian, N. Taft, Combining filtering and statistical methods for anomaly detection, in: IMC '05, 2005.
    • (2005) IMC '05
    • Soule, A.1    Salamatian, K.2    Taft, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.