메뉴 건너뛰기




Volumn 37, Issue 1, 2014, Pages 194-205

Data summarization for network traffic monitoring

Author keywords

Clustering; Data mining; Frequent itemsets; Netork monitoring; Summarization

Indexed keywords

CLUSTERING; DATA SUMMARIZATIONS; INFORMATION LOSS; ITEM SETS; NETWORK TRAFFIC MONITORING; OBJECTIVE FUNCTIONS; SUMMARIZATION; TRAFFIC MONITORING;

EID: 84890428705     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.02.021     Document Type: Article
Times cited : (31)

References (46)
  • 4
    • 0034830709 scopus 로고    scopus 로고
    • SPARTAN: A model-based semantic compression system for massive data tables
    • S. Babu, M. Garofalakis, and R. Rastogi SPARTAN: a model-based semantic compression system for massive data tables ACM SIGMOD Record 30 June (2) 2001 283 294
    • (2001) ACM SIGMOD Record , vol.30 , Issue.JUNE 2 , pp. 283-294
    • Babu, S.1    Garofalakis, M.2    Rastogi, R.3
  • 5
    • 33750939148 scopus 로고    scopus 로고
    • The UCI KDD archive of large data sets for data mining research and experimentation
    • S.D. Bay, D. Kibler, M.J. Pazzani, and P. Smyth The UCI KDD archive of large data sets for data mining research and experimentation ACM SIGKDD Explorations Nesletter 2 December (2) 2000 81 85
    • (2000) ACM SIGKDD Explorations Nesletter , vol.2 , Issue.DECEMBER 2 , pp. 81-85
    • Bay, S.D.1    Kibler, D.2    Pazzani, M.J.3    Smyth, P.4
  • 7
    • 34547803269 scopus 로고    scopus 로고
    • Summarization - Compressing data into an informative representation
    • V. Chandola, and V. Kumar Summarization - compressing data into an informative representation Knoledge and Information Systems 12 October (3) 2006 355 378
    • (2006) Knoledge and Information Systems , vol.12 , Issue.OCTOBER 3 , pp. 355-378
    • Chandola, V.1    Kumar, V.2
  • 8
    • 0001940342 scopus 로고    scopus 로고
    • Internet groth: Is there a 'Moore's La' for data traffic?
    • J. Abello, P. Pardalos, R. Mauricio, Kluer Academic Publishers Dordrecht [Chapter 3]
    • K. Coffman, and A. Odlyzko Internet groth: Is there a 'Moore's La' for data traffic? J. Abello, P. Pardalos, R. Mauricio, Handbook of massive data sets 2002 Kluer Academic Publishers Dordrecht 47 93 [Chapter 3]
    • (2002) Handbook of Massive Data Sets , pp. 47-93
    • Coffman, K.1    Odlyzko, A.2
  • 9
    • 14844367057 scopus 로고    scopus 로고
    • An improved data stream summary the count-min sketch and its applications
    • G. Cormode, and S. Muthukrishnan An improved data stream summary the count-min sketch and its applications Journal of Algorithms 55 April (1) 2005 58 75
    • (2005) Journal of Algorithms , vol.55 , Issue.APRIL 1 , pp. 58-75
    • Cormode, G.1    Muthukrishnan, S.2
  • 12
    • 33749319347 scopus 로고    scopus 로고
    • Interestingness measures for data mining a survey
    • L. Geng, and H.J. Hamilton Interestingness measures for data mining a survey ACM Computing Surveys 38 September (3) 2006 1 32
    • (2006) ACM Computing Surveys , vol.38 , Issue.SEPTEMBER 3 , pp. 1-32
    • Geng, L.1    Hamilton, H.J.2
  • 19
    • 77950369345 scopus 로고    scopus 로고
    • Data clustering 50 years beyond K-means?
    • A.K. Jain Data clustering 50 years beyond K-means? Pattern Recognition Letters 31 June (8) 2010 651 666
    • (2010) Pattern Recognition Letters , vol.31 , Issue.JUNE 8 , pp. 651-666
    • Jain, A.K.1
  • 23
    • 33244458049 scopus 로고    scopus 로고
    • A robust system for accurate real-time summaries of internet traffic
    • June
    • Keys K, Moore D, Estan C. A robust system for accurate real-time summaries of internet traffic. In: ACM SIGMETRICS performance evaluation revie, vol. 33. June 2005. p. 85.
    • (2005) ACM SIGMETRICS Performance Evaluation Revie , vol.33 , pp. 85
    • Keys, K.1    Moore, D.2    Estan, C.3
  • 24
    • 84948977233 scopus 로고
    • The poer of decision tables
    • Lavrac N, robel S, editors Berlin, Heidelberg: Springer
    • Kohavi R. The poer of decision tables. In: Lavrac N, robel S, editors. Machine learning: ECML-95. Lecture notes in computer science, vol. 912. Berlin, Heidelberg: Springer; 1995. p. 174-89.
    • (1995) Machine Learning: ECML-95. Lecture Notes in Computer Science , vol.912 , pp. 174-189
    • Kohavi, R.1
  • 25
    • 84868695480 scopus 로고    scopus 로고
    • Unsupervised anomaly detection in network intrusion detection using clusters
    • Leung K, Leckie C. Unsupervised anomaly detection in network intrusion detection using clusters. In: Australasian computer science conference, vol. 38. 2005. p. 333-42.
    • (2005) Australasian Computer Science Conference , vol.38 , pp. 333-342
    • Leung, K.1    Leckie, C.2
  • 26
    • 61749100211 scopus 로고    scopus 로고
    • Efficient application identification and the temporal and spatial stability of classification schema
    • . Li, M. Canini, A.. Moore, and R. Bolla Efficient application identification and the temporal and spatial stability of classification schema Computer Netorks 53 April (6) 2009 790 809
    • (2009) Computer Netorks , vol.53 , Issue.APRIL 6 , pp. 790-809
    • Canini, M.1    Bolla, R.2
  • 29
    • 78049363467 scopus 로고    scopus 로고
    • Summarising data by clustering items
    • Berlin, Heidelberg: Springer-Verlag
    • Mampaey M, Vreeken J. Summarising data by clustering items. In: Machine learning and knoledge discovery in databases, vol. 6322. Berlin, Heidelberg: Springer-Verlag; 2010. p. 321-36.
    • (2010) Machine Learning and Knoledge Discovery in Databases , vol.6322 , pp. 321-336
    • Mampaey, M.1    Vreeken, J.2
  • 30
    • 28544452631 scopus 로고    scopus 로고
    • A survey of interestingness measures for knoledge discovery
    • K. McGarry A survey of interestingness measures for knoledge discovery The Knoledge Engineering Revie 20 December (01) 2005 39 61
    • (2005) The Knoledge Engineering Revie , vol.20 , Issue.DECEMBER 01 , pp. 39-61
    • McGarry, K.1
  • 32
    • 33244467936 scopus 로고    scopus 로고
    • Internet traffic classification using Bayesian analysis techniques
    • A.. Moore, and D. Zuev Internet traffic classification using Bayesian analysis techniques ACM SIGMETRICS Performance Evaluation Revie 33 June (1) 2005 50
    • (2005) ACM SIGMETRICS Performance Evaluation Revie , vol.33 , Issue.JUNE 1 , pp. 50
    • Zuev, D.1
  • 34
    • 79960922346 scopus 로고    scopus 로고
    • Monitoring abnormal network traffic based on blind source separation approach
    • T. Qin, X. Guan, . Li, P. ang, and Q. Huang Monitoring abnormal network traffic based on blind source separation approach Journal of Netork and Computer Applications 34 September (5) 2011 1732 1742
    • (2011) Journal of Netork and Computer Applications , vol.34 , Issue.SEPTEMBER 5 , pp. 1732-1742
    • Qin, T.1    Guan X.Ang, P.2    Huang, Q.3
  • 36
    • 33747335915 scopus 로고    scopus 로고
    • Data arehousing and data mining techniques for intrusion detection systems
    • A. Singhal, and S. Jajodia Data arehousing and data mining techniques for intrusion detection systems Distributed and Parallel Databases 20 July (2) 2006 149 166
    • (2006) Distributed and Parallel Databases , vol.20 , Issue.JULY 2 , pp. 149-166
    • Singhal, A.1    Jajodia, S.2
  • 37
    • 79251595062 scopus 로고    scopus 로고
    • Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification
    • M.-Y. Su Using clustering to improve the KNN-based classifiers for online anomaly network traffic identification Journal of Netork and Computer Applications 34 March (2) 2011 722 730
    • (2011) Journal of Netork and Computer Applications , vol.34 , Issue.MARCH 2 , pp. 722-730
    • Su, M.-Y.1
  • 39
    • 10844248429 scopus 로고    scopus 로고
    • Intelligent eb traffic mining and analysis
    • X. ang, A. Abraham, and K.a. Smith Intelligent eb traffic mining and analysis Journal of Netork and Computer Applications 28 April (2) 2005 147 165
    • (2005) Journal of Netork and Computer Applications , vol.28 , Issue.APRIL 2 , pp. 147-165
    • Ang, X.1    Abraham, A.2
  • 40
    • 79958127484 scopus 로고    scopus 로고
    • Summarizing transactional databases ith overlapped hyperrectangles
    • Y. Xiang, R. Jin, D. Fuhry, and F.F. Dragan Summarizing transactional databases ith overlapped hyperrectangles Data Mining and Knoledge Discovery 23 October (2) 2010 215 251
    • (2010) Data Mining and Knoledge Discovery , vol.23 , Issue.OCTOBER 2 , pp. 215-251
    • Xiang, Y.1    Jin, R.2    Fuhry, D.3    Dragan, F.F.4
  • 42
    • 0009518853 scopus 로고    scopus 로고
    • A scalable clustering technique for intrusion signature recognition
    • United States Military Academy, west Point, NY, Citeseer
    • Ye N, Li X. A scalable clustering technique for intrusion signature recognition. In: Proceedings of the 2001 IEEE, orkshop on information assurance and security, United States Military Academy, est Point, NY, Citeseer. 2001. p. 1-4.
    • (2001) Proceedings of the 2001 IEEE, Orkshop on Information Assurance and Security , pp. 1-4
    • Ye, N.1    Li, X.2
  • 44
    • 33644977630 scopus 로고    scopus 로고
    • On mining summaries by objective measures of interestingness
    • N. Zbidi, S. Faiz, and M. Limam On mining summaries by objective measures of interestingness Machine Learning 62 January (3) 2006 175 198
    • (2006) Machine Learning , vol.62 , Issue.JANUARY 3 , pp. 175-198
    • Zbidi, N.1    Faiz, S.2    Limam, M.3
  • 45
    • 79960929773 scopus 로고    scopus 로고
    • Intelligent rate control for supporting real-time traffic in LAN mesh networks
    • R. Zhu Intelligent rate control for supporting real-time traffic in LAN mesh networks Journal of Netork and Computer Applications 34 September (5) 2011 1449 1458
    • (2011) Journal of Netork and Computer Applications , vol.34 , Issue.SEPTEMBER 5 , pp. 1449-1458
    • Zhu, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.