-
1
-
-
79952623310
-
Periodicity-based anomalies in self-similar network traffic flow measurements
-
T. Akgül, S. Baykut, M.E. Kantarci, and S.F. Oktug Periodicity-based anomalies in self-similar network traffic flow measurements IEEE Trans Instrum Meas 60 4 2011 1358 1366
-
(2011)
IEEE Trans Instrum Meas
, vol.60
, Issue.4
, pp. 1358-1366
-
-
Akgül, T.1
Baykut, S.2
Kantarci, M.E.3
Oktug, S.F.4
-
4
-
-
77953294708
-
A signal processing view on packet sampling and anomaly detection
-
Brauckhoff D, Salamatian K, May M. A signal processing view on packet sampling and anomaly detection. In: Proceedings of INFOCOM; 2010. p. 1-9.
-
(2010)
Proceedings of INFOCOM
, pp. 1-9
-
-
Brauckhoff, D.1
Salamatian, K.2
May, M.3
-
5
-
-
77955428024
-
Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements
-
P. Casas, S. Vaton, L. Fillatre, and I. Nikiforov Optimal volume anomaly detection and isolation in large-scale IP networks using coarse-grained measurements Comput Netw 54 11 2010 1750 1766
-
(2010)
Comput Netw
, vol.54
, Issue.11
, pp. 1750-1766
-
-
Casas, P.1
Vaton, S.2
Fillatre, L.3
Nikiforov, I.4
-
6
-
-
77952616174
-
Predictive network anomaly detection and visualization
-
M. Celenk, T. Conley, J. Willis, and J. Graham Predictive network anomaly detection and visualization IEEE Trans Inf Forensics Secur 5 2 2010 288 299
-
(2010)
IEEE Trans Inf Forensics Secur
, vol.5
, Issue.2
, pp. 288-299
-
-
Celenk, M.1
Conley, T.2
Willis, J.3
Graham, J.4
-
7
-
-
51349141856
-
Distributed spatial anomaly detection
-
Chhabra P, Scott C, Kolaczyk E, Crovella M. Distributed spatial anomaly detection. In: Proceedings of INFOCOM, Phoenix, AZ; 2008. p. 2378-86.
-
(2008)
Proceedings of INFOCOM, Phoenix, AZ
, pp. 2378-2386
-
-
Chhabra, P.1
Scott, C.2
Kolaczyk, E.3
Crovella, M.4
-
8
-
-
78650894357
-
Basisdetect: A model-based network event detection framework
-
Eriksson B, Barford P, Bowden R, Duffield N, Sommers J, Roughan M. Basisdetect: a model-based network event detection framework. In: Proceedings of IMC; 2010. p. 451-64.
-
(2010)
Proceedings of IMC
, pp. 451-464
-
-
Eriksson, B.1
Barford, P.2
Bowden, R.3
Duffield, N.4
Sommers, J.5
Roughan, M.6
-
9
-
-
79957586137
-
Anomaly detection in network traffic based on statistical inference and α-stable modeling
-
S. Federico, I.A. Juan, C. Pablo, M. Martin-Fernandez, I.A. Dimitriadis, and C. Alberola-Lopez Anomaly detection in network traffic based on statistical inference and α-stable modeling IEEE Trans Dependable Secur Comput 8 4 2011 494 509
-
(2011)
IEEE Trans Dependable Secur Comput
, vol.8
, Issue.4
, pp. 494-509
-
-
Federico, S.1
Juan, I.A.2
Pablo, C.3
Martin-Fernandez, M.4
Dimitriadis, I.A.5
Alberola-Lopez, C.6
-
10
-
-
78649408044
-
Dynamic feature analysis and measurement for large-scale network traffic monitoring
-
X. Guan, T. Qin, W. Li, and P. Wang Dynamic feature analysis and measurement for large-scale network traffic monitoring IEEE Trans Inf Forensics Secur 5 4 2010 905 919
-
(2010)
IEEE Trans Inf Forensics Secur
, vol.5
, Issue.4
, pp. 905-919
-
-
Guan, X.1
Qin, T.2
Li, W.3
Wang, P.4
-
11
-
-
34247507717
-
LSSP: A novel local segment-shared protection for multi-domain optical mesh networks
-
DOI 10.1016/j.comcom.2007.02.010, PII S0140366407000813
-
L. Guo LSSP: a novel local segment-shared protection for multi-domain optical mesh networks Comput Commun 30 8 2007 1794 1801 (Pubitemid 46659751)
-
(2007)
Computer Communications
, vol.30
, Issue.8
, pp. 1794-1801
-
-
Guo, L.1
-
12
-
-
33644997621
-
Path-based routing provisioning with mixed shared protection in WDM mesh networks
-
L. Guo, J. Cao, H Yu, and L Li Path-based routing provisioning with mixed shared protection in WDM mesh networks J Lightwave Technol 24 3 2006 1129 1141
-
(2006)
J Lightwave Technol
, vol.24
, Issue.3
, pp. 1129-1141
-
-
Guo, L.1
Cao, J.2
Yu, H.3
Li, L.4
-
13
-
-
36348978761
-
Diagnosing network disruptions with network-wide analysis
-
DOI 10.1145/1269899.1254890, SIGMETRICS'07 - Proceedings of the 2007 International Conference on Measurement and Modeling of Computer Systems
-
Huang Y, Feamster N, Lakhina A, Xu J. Diagnosing network disruptions with network-wide analysis. In: Proceedings of SIGMETRICS; 2007. p. 61-72. (Pubitemid 350158073)
-
(2007)
Performance Evaluation Review
, vol.35
, Issue.1
, pp. 61-72
-
-
Huang, Y.1
Feamster, N.2
Lakhina, A.3
Xu, J.4
-
14
-
-
59649105558
-
GARCH model-based large-scale IP traffic matrix estimation
-
D. Jiang, and G. Hu GARCH model-based large-scale IP traffic matrix estimation IEEE Commun Lett 13 1 2009 52 54
-
(2009)
IEEE Commun Lett
, vol.13
, Issue.1
, pp. 52-54
-
-
Jiang, D.1
Hu, G.2
-
15
-
-
77950302337
-
Mahalanobis distance-based traffic matrix estimation
-
D. Jiang, X. Wang, and L. Guo Mahalanobis distance-based traffic matrix estimation Eur Trans Telecommun 21 3 2010 195 201
-
(2010)
Eur Trans Telecommun
, vol.21
, Issue.3
, pp. 195-201
-
-
Jiang, D.1
Wang, X.2
Guo, L.3
-
16
-
-
80052453279
-
Joint time-frequency sparse estimation of large-scale network traffic
-
D. Jiang, Z. Xu, Z. Chen, Y. Han, and H. Xu Joint time-frequency sparse estimation of large-scale network traffic Comput Netw 55 10 2011 3533 3547
-
(2011)
Comput Netw
, vol.55
, Issue.10
, pp. 3533-3547
-
-
Jiang, D.1
Xu, Z.2
Chen, Z.3
Han, Y.4
Xu, H.5
-
17
-
-
78649251599
-
Accurate estimation of large-scale IP traffic matrix
-
D. Jiang, X. Wang, L. Guo, H. Nie, and Z. Chen Accurate estimation of large-scale IP traffic matrix AEU - Int J Electron Commun 65 1 2011 75 86
-
(2011)
AEU - Int J Electron Commun
, vol.65
, Issue.1
, pp. 75-86
-
-
Jiang, D.1
Wang, X.2
Guo, L.3
Nie, H.4
Chen, Z.5
-
19
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
S.S. Kim, and A.L.N. Reddy Statistical techniques for detecting traffic anomalies through packet header data IEEE Trans Netw 16 3 2008 562 575
-
(2008)
IEEE Trans Netw
, vol.16
, Issue.3
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
20
-
-
67349121736
-
Oblivious routing of highly variable traffic in service overlays and IP backbones
-
M. Kodialam, T.V. Lakshman, J.B. Orlin, and S. Sengupta Oblivious routing of highly variable traffic in service overlays and IP backbones IEEE Trans Netw 17 2 2009 459 472
-
(2009)
IEEE Trans Netw
, vol.17
, Issue.2
, pp. 459-472
-
-
Kodialam, M.1
Lakshman, T.V.2
Orlin, J.B.3
Sengupta, S.4
-
21
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
DOI 10.1145/1090191.1080118
-
Lakhina A, Crovella M, Diot C. Mining anomalies using traffic feature distributions. In: Proceedings of SIGCOMM; 2005. p. 217-28. (Pubitemid 46323506)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
22
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. In: Proceedings of SIGCOMM; October 2004. p. 219-30. (Pubitemid 40954882)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
23
-
-
70350552089
-
Describing network traffic using the index of variability
-
G.Y. Lazarou, J. Baca, V.S. Frost, and J.B. Evans Describing network traffic using the index of variability IEEE Trans Netw 17 5 2009 1672 1683
-
(2009)
IEEE Trans Netw
, vol.17
, Issue.5
, pp. 1672-1683
-
-
Lazarou, G.Y.1
Baca, J.2
Frost, V.S.3
Evans, J.B.4
-
24
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
W. Lu, and A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J Adv Signal Process 2009 1 16
-
(2009)
EURASIP J Adv Signal Process
, pp. 1-16
-
-
Lu, W.1
Ghorbani, A.2
-
25
-
-
66449085932
-
Reducing false positives in anomaly detectors through fuzzy alert aggregation
-
F. Maggi, M. Matteucci, and S. Zanero Reducing false positives in anomaly detectors through fuzzy alert aggregation Inf Fusion 10 4 2009 300 311
-
(2009)
Inf Fusion
, vol.10
, Issue.4
, pp. 300-311
-
-
Maggi, F.1
Matteucci, M.2
Zanero, S.3
-
26
-
-
77953880481
-
Unsupervised ensemble anomaly detection through time-periodical packet sampling
-
Nawata S, Uchida M, Gu Y, Tsuru M, Oie Y. Unsupervised ensemble anomaly detection through time-periodical packet sampling. In: Proceedings of INFOCOM; 2010. p. 1-9.
-
(2010)
Proceedings of INFOCOM
, pp. 1-9
-
-
Nawata, S.1
Uchida, M.2
Gu, Y.3
Tsuru, M.4
Oie, Y.5
-
27
-
-
84874727342
-
A power laws-based reconstruction approach to end-to-end network traffic
-
L. Nie, D. Jiang, and L. Guo A power laws-based reconstruction approach to end-to-end network traffic J Netw Comput Appl 36 2 2013 898 907
-
(2013)
J Netw Comput Appl
, vol.36
, Issue.2
, pp. 898-907
-
-
Nie, L.1
Jiang, D.2
Guo, L.3
-
28
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
Nychis G, Sekar V, Andersen DG, Kim H, Zhang H. An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of IMC; 2008. p. 151-6.
-
(2008)
Proceedings of IMC
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
29
-
-
67650149213
-
Spatio-temporal network anomaly detection by assessing deviations of empirical measures
-
I.C. Paschalidis, and G. Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures IEEE Trans Netw 17 3 2009 685 697
-
(2009)
IEEE Trans Netw
, vol.17
, Issue.3
, pp. 685-697
-
-
Paschalidis, I.C.1
Smaragdakis, G.2
-
30
-
-
79960922346
-
Monitoring abnormal network traffic based on blind source separation approach
-
T. Qin, X. Guan, W. Li, P. Wang, and Q. Huang Monitoring abnormal network traffic based on blind source separation approach J Netw Comput Appl 34 2011 1732 1742
-
(2011)
J Netw Comput Appl
, vol.34
, pp. 1732-1742
-
-
Qin, T.1
Guan, X.2
Li, W.3
Wang, P.4
Huang, Q.5
-
32
-
-
84877775237
-
ANTIDOTE: Understanding and defending against poisoning of anomaly detectors
-
Rubinstein BI, Nelson B, Huang L, Joseph AD, Lau S, Rao S, et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors. In: Proceedings of IMC; 2009. p. 1-14.
-
(2009)
Proceedings of IMC
, pp. 1-14
-
-
Rubinstein, B.I.1
Nelson, B.2
Huang, L.3
Joseph, A.D.4
Lau, S.5
Rao, S.6
-
33
-
-
65249105995
-
Accurate anomaly detection through parallelism
-
S. Shanbhag, and T. Wolf Accurate anomaly detection through parallelism IEEE Netw 23 1 2009 22 28
-
(2009)
IEEE Netw
, vol.23
, Issue.1
, pp. 22-28
-
-
Shanbhag, S.1
Wolf, T.2
-
34
-
-
77953306333
-
-
Silveira F, Diot C. URCA: pulling out anomalies by their root causes. In: Proceedings of INFOCOM; 2010. p. 1-9.
-
Silveira F, Diot C. URCA: pulling out anomalies by their root causes. In: Proceedings of INFOCOM; 2010. p. 1-9.
-
-
-
-
35
-
-
57349120523
-
Optimal sampling in state space models with applications to network monitoring
-
Singhal H, Michailidis G. Optimal sampling in state space models with applications to network monitoring. In: Proceedings of SIGMETRICS; 2008. p. 145-56.
-
(2008)
Proceedings of SIGMETRICS
, pp. 145-156
-
-
Singhal, H.1
Michailidis, G.2
-
36
-
-
77955233769
-
-
ed. by A Wong (Fields Institute Communications, Providence) Pseudo-Differential Operators: PDEs and Time-Frequency Analysis
-
Stockwel RG, in Why use the S-transform, vol. 52, ed. by A Wong (Fields Institute Communications, Providence, 2007), p. 279-309. Pseudo-Differential Operators: PDEs and Time-Frequency Analysis
-
(2007)
Why Use the S-transform
, vol.52
, pp. 279-309
-
-
Stockwel, R.G.1
-
37
-
-
85028098285
-
Parametric methods for anomaly detection in aggregate traffic
-
G. Thatte, U. Mitra, and J. Heidemann Parametric methods for anomaly detection in aggregate traffic IEEE/ACM Trans Netw 19 2 2011 512 525
-
(2011)
IEEE/ACM Trans Netw
, vol.19
, Issue.2
, pp. 512-525
-
-
Thatte, G.1
Mitra, U.2
Heidemann, J.3
-
39
-
-
80051794572
-
Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers
-
A. Vishwanath, V. Sivaraman, and G.N. Rouskas Anomalous loss performance for mixed real-time and TCP traffic in routers with very small buffers IEEE/ACM Trans Netw 19 4 2011 933 946
-
(2011)
IEEE/ACM Trans Netw
, vol.19
, Issue.4
, pp. 933-946
-
-
Vishwanath, A.1
Sivaraman, V.2
Rouskas, G.N.3
-
40
-
-
67650145176
-
Swing: Realistic and responsive network traffic generation
-
K.V. Vishwanath, and A. Vahdat Swing: realistic and responsive network traffic generation IEEE Trans Netw 17 3 2009 712 725
-
(2009)
IEEE Trans Netw
, vol.17
, Issue.3
, pp. 712-725
-
-
Vishwanath, K.V.1
Vahdat, A.2
-
41
-
-
70350493344
-
Decomposable principal component analysis
-
A. Wiese, and A.O. Hero Decomposable principal component analysis IEEE Trans Signal Process 57 11 2009 4369 4377
-
(2009)
IEEE Trans Signal Process
, vol.57
, Issue.11
, pp. 4369-4377
-
-
Wiese, A.1
Hero, A.O.2
-
42
-
-
79957530146
-
Low-rate DDoS attacks detection and traceback by using new information metrics
-
Y. Xiang, K. Li, and W. Zhou Low-rate DDoS attacks detection and traceback by using new information metrics IEEE Trans Inf Forensics Secur 6 2 2011 426 437
-
(2011)
IEEE Trans Inf Forensics Secur
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
43
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
DOI 10.1145/1090191.1080112
-
Xu K, Zhang Z, Bhattacharyya S. Profiling Internet backbone traffic: behavior models and applications. In: Proceedings of SIGCOMM; 2005. p. 169-80. (Pubitemid 46323502)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
44
-
-
85008008496
-
Internet traffic behavior profiling for network security monitoring
-
K. Xu, Z. Zhang, and S. Bhattacharyya Internet traffic behavior profiling for network security monitoring IEEE Trans Netw 16 6 2008 1241 1252
-
(2008)
IEEE Trans Netw
, vol.16
, Issue.6
, pp. 1241-1252
-
-
Xu, K.1
Zhang, Z.2
Bhattacharyya, S.3
-
45
-
-
77956179239
-
Self-disciplinary worms and countermeasures: Modeling and analysis
-
W. Yu, N. Zhang, X. Fu, and Wei Zhao Self-disciplinary worms and countermeasures: modeling and analysis IEEE Trans Parallel Distrib Systems 21 10 2010 1501 1514
-
(2010)
IEEE Trans Parallel Distrib Systems
, vol.21
, Issue.10
, pp. 1501-1514
-
-
Yu, W.1
Zhang, N.2
Fu, X.3
Zhao, W.4
-
46
-
-
50949098790
-
A secure quality of service routing protocol for wireless Ad Hoc networks
-
Zhu T, Yu M. A secure quality of service routing protocol for wireless Ad Hoc networks. In: Proceedings of GLOBECOM'06; 2006. p. 1-6.
-
(2006)
Proceedings of GLOBECOM'06
, pp. 1-6
-
-
Zhu, T.1
Yu, M.2
-
47
-
-
84855828842
-
A secure energy routing mechanism for sharing renewable energy in smart microgrid
-
Zhu T, Xiao S, Yi P, Towsley D, Gong W. A secure energy routing mechanism for sharing renewable energy in smart microgrid. In: Proceedings of SmartGridComm'11; 2011. p. 143-8.
-
(2011)
Proceedings of SmartGridComm'11
, pp. 143-148
-
-
Zhu, T.1
Xiao, S.2
Yi, P.3
Towsley, D.4
Gong, W.5
|