메뉴 건너뛰기




Volumn 40, Issue 1, 2014, Pages 194-205

Benford's law behavior of internet traffic

Author keywords

Anomaly detection; Benford's law; Computer network traffic analysis; Weibull distribution

Indexed keywords

WEIBULL DISTRIBUTION;

EID: 84896318444     PISSN: 10848045     EISSN: 10958592     Source Type: Journal    
DOI: 10.1016/j.jnca.2013.09.007     Document Type: Article
Times cited : (34)

References (101)
  • 4
    • 2442583303 scopus 로고    scopus 로고
    • The loss technique for detecting new denial of service attacks
    • Greensboro, NC, USA. March 2004
    • Allen WH, Marin GA. The loss technique for detecting new denial of service attacks, In: Proceedings of IEEE SoutheastCon, Greensboro, NC, USA. March 2004. p. 302-9.
    • Proceedings of IEEE SoutheastCon , pp. 302-309
    • Allen, W.H.1    Marin, G.A.2
  • 10
    • 21844493117 scopus 로고
    • An application of Fourier series to the most significant digit problem
    • J. Boyle An application of Fourier series to the most significant digit problem American Mathematical Monthly 101 2 1994 879 886
    • (1994) American Mathematical Monthly , vol.101 , Issue.2 , pp. 879-886
    • Boyle, J.1
  • 12
    • 0020139872 scopus 로고
    • Patterns in listings of failure-rate & mttf values and listings of other data
    • P. Becker Patterns in listings of failure-rate and MTTF values and listings of other data IEEE Transactions on Reliability 31 2 1982 132 134 (Pubitemid 12549107)
    • (1982) IEEE Transactions on Reliability , vol.R-31 , Issue.2 , pp. 132-134
    • Becker Peter, W.1
  • 13
    • 0038695506 scopus 로고
    • An illustration of Benford's first digit law using alpha decay half lives
    • B. Buck, A. Merchant, and S. Perez An illustration of Benford's first digit law using alpha decay half lives European Journal in Physics 14 2 1993 59 63
    • (1993) European Journal in Physics , vol.14 , Issue.2 , pp. 59-63
    • Buck, B.1    Merchant, A.2    Perez, S.3
  • 14
    • 80052032506 scopus 로고    scopus 로고
    • Searching for electoral irregularities in an established democracy: Applying Benford's Law tests to Bundestag elections in Unified Germany
    • C. Breunig, and A. Goerres Searching for electoral irregularities in an established democracy: applying Benford's Law tests to Bundestag elections in Unified Germany Electoral Studies 30 3 2011 534 545
    • (2011) Electoral Studies , vol.30 , Issue.3 , pp. 534-545
    • Breunig, C.1    Goerres, A.2
  • 15
    • 84859097165 scopus 로고    scopus 로고
    • A basic theory of Benford's law
    • A. Berger, and T.P. Hill A basic theory of Benford's law Probability Surveys 8 2011 1 126
    • (2011) Probability Surveys , vol.8 , pp. 1-126
    • Berger, A.1    Hill, T.P.2
  • 16
    • 79952247200 scopus 로고    scopus 로고
    • [accessed 06.13.]
    • Benford Online Bibliography. 2013. Available from: 〈 http://www.benfordonline.net [accessed 06.13.]
    • (2013) Benford Online Bibliography
  • 19
    • 77951539790 scopus 로고    scopus 로고
    • SYN flooding attack detection based on entropy computing
    • Honolulu, Hawaii, USA. December 2009
    • Bellaïche M, Grégoire JC., SYN flooding attack detection based on entropy computing. In: Proceedings of the IEEE GLOBECOM. Honolulu, Hawaii, USA. December 2009. p. 1-6.
    • Proceedings of the IEEE GLOBECOM , pp. 1-6
    • Bellaïche, M.1    Grégoire, J.C.2
  • 21
    • 0002810030 scopus 로고
    • Long-range dependence: A review
    • H.A. David, H.T David, Iowa State University Press
    • D.R. Cox Long-range dependence: a review H.A. David, H.T David, Statistics: an appraisal 1984 Iowa State University Press 55 74
    • (1984) Statistics: An Appraisal , pp. 55-74
    • Cox, D.R.1
  • 26
    • 0036967463 scopus 로고    scopus 로고
    • Use of spectral analysis in defense against DoS attacks
    • Taipei, Taiwan. November 2002
    • Cheng CM, Kung HT, Tan KS. Use of spectral analysis in defense against DoS attacks. In: Proceedings of IEEE GLOBECOM. Taipei, Taiwan. November 2002. p. 2143-8.
    • Proceedings of IEEE GLOBECOM , pp. 2143-2148
    • Cheng, C.M.1    Kung, H.T.2    Tan, K.S.3
  • 28
    • 67949109641 scopus 로고    scopus 로고
    • Improving network anomaly detection effectiveness via an integrated multi-metric-multi-link (m3l) PCA-based approach
    • V. Chatzigiannakis, S. Papavassiliou, and G. Androulidakis Improving network anomaly detection effectiveness via an integrated multi-metric-multi- link (m3l) PCA-based approach Security and Communication Networks 2 3 2009 289 304
    • (2009) Security and Communication Networks , vol.2 , Issue.3 , pp. 289-304
    • Chatzigiannakis, V.1    Papavassiliou, S.2    Androulidakis, G.3
  • 31
    • 62949129764 scopus 로고    scopus 로고
    • Extracting hidden anomalies using sketch and non-Gaussian multiresolution statistical detection procedures
    • Kyoto, Japan. August 2007
    • Dewaele G, Fukuda K, Borgnat P, Abry P, Cho K. Extracting hidden anomalies using sketch and non-Gaussian multiresolution statistical detection procedures. In: Proceedings of the SIGCOMM LSAD workshop. Kyoto, Japan. August 2007.
    • Proceedings of the SIGCOMM LSAD Workshop
    • Dewaele, G.1    Fukuda, K.2    Borgnat, P.3    Abry, P.4    Cho, K.5
  • 32
    • 0010648031 scopus 로고
    • The theory of probabilities and telephone conversations
    • (First published in: Nyt Tidsskrift for Matematik B 1909; 20: 33-39s.)
    • Erlang AK. The theory of probabilities and telephone conversations. Transactions of the Danish Academy of Technical Sciences, no. 2, 1948. (First published in: Nyt Tidsskrift for Matematik B 1909; 20: 33-39s.)
    • (1948) Transactions of the Danish Academy of Technical Sciences , vol.2
    • Erlang, A.K.1
  • 34
    • 0037632943 scopus 로고    scopus 로고
    • Benford's law for exponential random variables
    • DOI 10.1016/S0167-7152(03)00101-9, PII S0167715203001019
    • H. Engel, and C. Leuenberger Benford's law for exponential random variables Statistics & Probability Letters 63 4 2003 361 365 (Pubitemid 36742502)
    • (2003) Statistics and Probability Letters , vol.63 , Issue.4 , pp. 361-365
    • Engel, H.-A.1    Leuenberger, C.2
  • 35
    • 0003311938 scopus 로고    scopus 로고
    • Characteristics of TCP connection arrivals
    • K. Park, W. Willinger, John Wiley & Sons Inc. New York, USA
    • A. Feldmann Characteristics of TCP connection arrivals K. Park, W. Willinger, Self-similar network traffic and performance evaluation 2000 John Wiley & Sons Inc. New York, USA 367 400
    • (2000) Self-similar Network Traffic and Performance Evaluation , pp. 367-400
    • Feldmann, A.1
  • 36
    • 63549150030 scopus 로고    scopus 로고
    • A simple explanation of Benford's law
    • R.M. Fewster A simple explanation of Benford's law The American Statistician 63 1 2009 26 32
    • (2009) The American Statistician , vol.63 , Issue.1 , pp. 26-32
    • Fewster, R.M.1
  • 38
    • 84863616826 scopus 로고    scopus 로고
    • An orchestration approach for unwanted Internet traffic identification
    • E. Feitosa, E. Souto, and D.H. Sadok An orchestration approach for unwanted Internet traffic identification Computer Networks 56 12 2012 2805 2831
    • (2012) Computer Networks , vol.56 , Issue.12 , pp. 2805-2831
    • Feitosa, E.1    Souto, E.2    Sadok, D.H.3
  • 41
    • 44849134557 scopus 로고    scopus 로고
    • A global security architecture for intrusion detection on computer networks
    • A.K. Ganame, J. Bourgeoisa, R. Bidou, and F. Spiesa A global security architecture for intrusion detection on computer networks Computers & Security 27 2008 30 47
    • (2008) Computers & Security , vol.27 , pp. 30-47
    • Ganame, A.K.1    Bourgeoisa, J.2    Bidou, R.3    Spiesa, F.4
  • 43
    • 84972541029 scopus 로고    scopus 로고
    • A statistical derivation of the significant-digit law
    • T. Hill A statistical derivation of the significant-digit law Statistical Science 10 4 1996 354 363
    • (1996) Statistical Science , vol.10 , Issue.4 , pp. 354-363
    • Hill, T.1
  • 46
    • 67649366072 scopus 로고    scopus 로고
    • Detecting problems in survey data using Benford's law
    • G. Judge, and L. Schechter Detecting problems in survey data using Benford's law Journal of Human Resources 44 1 2009 1 24
    • (2009) Journal of Human Resources , vol.44 , Issue.1 , pp. 1-24
    • Judge, G.1    Schechter, L.2
  • 47
    • 84874309665 scopus 로고    scopus 로고
    • Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection
    • Florida, USA. October 2012
    • James C, Murthy HA. Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection. In: Proceedings of the 37th annual IEEE Conference on local computer networks (LCN). Florida, USA. October 2012.
    • Proceedings of the 37th Annual IEEE Conference on Local Computer Networks (LCN)
    • James, C.1    Murthy, H.A.2
  • 48
    • 45749141660 scopus 로고    scopus 로고
    • Statistical techniques for detecting traffic anomalies through packet header data
    • S.S. Kim, and R.AL Narasimha Statistical techniques for detecting traffic anomalies through packet header data IEEE/ACM Transactions on Networking 16 3 2008 562 575
    • (2008) IEEE/ACM Transactions on Networking , vol.16 , Issue.3 , pp. 562-575
    • Kim, S.S.1    Narasimha, R.A.2
  • 52
    • 68349085747 scopus 로고    scopus 로고
    • Analysis and modeling of a campus wireless network TCP/IP traffic
    • I.W.C. Lee, and A.O. Fapojuwo Analysis and modeling of a campus wireless network TCP/IP traffic Computer Networks 53 15 2009 2674 2687
    • (2009) Computer Networks , vol.53 , Issue.15 , pp. 2674-2687
    • Lee, I.W.C.1    Fapojuwo, A.O.2
  • 53
    • 0034556676 scopus 로고    scopus 로고
    • Survival Distributions Satisfying Benford's Law
    • L.M. Leemis, B.W. Schmeiser, and D.L. Evans Survival distributions satisfying Benford's law The American Statistician 54 3 2000 236 241 (Pubitemid 33204717)
    • (2000) American Statistician , vol.54 , Issue.4 , pp. 236-241
    • Leemis, L.M.1    Schmeiser, B.W.2    Evans, D.L.3
  • 56
    • 33646900187 scopus 로고    scopus 로고
    • Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
    • DOI 10.1016/j.cose.2005.11.007, PII S0167404805001963
    • M. Li Change trend of averaged Hurst parameter of traffic under DDOS flood attacks Computers & Security 25 3 2006 213 220 (Pubitemid 43796072)
    • (2006) Computers and Security , vol.25 , Issue.3 , pp. 213-220
    • Li, M.1
  • 61
    • 84896316288 scopus 로고    scopus 로고
    • MAWI. Working Group Traffic Archive, samplepoint-F. 2013. Available from [accessed 06.13].
    • MAWI. Working Group Traffic Archive, samplepoint-F. 2013. Available from 〈http://mawi.wide.ad.jp/mawi/samplepoint-F/2009 [accessed 06.13].
  • 62
    • 58149509288 scopus 로고    scopus 로고
    • Election forensics: The second-digit Benford's law test and recent American presidential elections
    • Salt Lake City. September 2006
    • Mebane Jr WR. Election forensics: the second-digit Benford's law test and recent American presidential elections. In: Proceedings of the election fraud conference. Salt Lake City. September 2006.
    • Proceedings of the Election Fraud Conference
    • Mebane Jr., W.R.1
  • 64
  • 65
    • 17144397597 scopus 로고    scopus 로고
    • The use of Benford's law as an aid in analytical procedures
    • M. Nigrini The use of Benford's law as an aid in analytical procedures Auditing: A Journal of Practice & Theory 16 2 1997 52 67
    • (1997) Auditing: A Journal of Practice & Theory , vol.16 , Issue.2 , pp. 52-67
    • Nigrini, M.1
  • 68
    • 84896318595 scopus 로고    scopus 로고
    • [accessed 06.13]
    • NUST Traffic Dataset. 2013. 〈http://wisnet.seecs.nust. edu.pk/projects/ENS/DataSets.html [accessed 06.13].
    • (2013) NUST Traffic Dataset
  • 70
    • 0029323403 scopus 로고
    • Wide area traffic: The failure of Poisson modeling
    • V. Paxson, and S. Floyd Wide area traffic: the failure of Poisson modeling IEEE/ACM Transactions on Networking 3 3 1995 226 244
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 72
    • 34250315640 scopus 로고    scopus 로고
    • An overview of anomaly detection techniques: Existing solutions and latest technological trends
    • DOI 10.1016/j.comnet.2007.02.001, PII S138912860700062X
    • A. Patcha, and J.M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Computer Networks 51 12 2007 3448 3470 (Pubitemid 46921030)
    • (2007) Computer Networks , vol.51 , Issue.12 , pp. 3448-3470
    • Patcha, A.1    Park, J.-M.2
  • 73
    • 0000109243 scopus 로고
    • On the distribution of first significant digits
    • R.S. Pinkham On the distribution of first significant digits The Annuals of Mathematical Statistics 32 4 1961 1223 1230
    • (1961) The Annuals of Mathematical Statistics , vol.32 , Issue.4 , pp. 1223-1230
    • Pinkham, R.S.1
  • 74
    • 84864509699 scopus 로고    scopus 로고
    • Quick anomaly detection by the Newcomb-Benford law, with applications to electoral processes data from the USA, Puerto Rico and Venezuela
    • L. Pericchi, and D. Torres Quick anomaly detection by the Newcomb-Benford law, with applications to electoral processes data from the USA, Puerto Rico and Venezuela Statistical Science 26 4 2011 502 516
    • (2011) Statistical Science , vol.26 , Issue.4 , pp. 502-516
    • Pericchi, L.1    Torres, D.2
  • 80
    • 84896316439 scopus 로고
    • An observation on the significant digits of the binomial coefficients and factorials
    • B.P. Sarkar An observation on the significant digits of the binomial coefficients and factorials Sankhya: The Indian Journal of Statistics Series B 35 3 1973 363 364
    • (1973) Sankhya: The Indian Journal of Statistics Series B , vol.35 , Issue.3 , pp. 363-364
    • Sarkar, B.P.1
  • 86
    • 49949084678 scopus 로고    scopus 로고
    • Multi-agent reinforcement learning for intrusion detection
    • A. Servin, and D. Kudenko Multi-agent reinforcement learning for intrusion detection Lecture Notes in Computer Science 4865 2008 211 223
    • (2008) Lecture Notes in Computer Science , vol.4865 , pp. 211-223
    • Servin, A.1    Kudenko, D.2
  • 87
    • 84896319163 scopus 로고    scopus 로고
    • SERPRO. Brazilian Federal Service of data processing. 2011
    • SERPRO. Brazilian Federal Service of data processing. 2011. 〈http://www.serpro.gov.br.
  • 91
    • 58549089680 scopus 로고    scopus 로고
    • Intrusion detection using fuzzy association rules
    • A. Tajbakhsh, M. Rahmati, and A. Mirzaei Intrusion detection using fuzzy association rules Applied Soft Computing 9 2 2009 462 469
    • (2009) Applied Soft Computing , vol.9 , Issue.2 , pp. 462-469
    • Tajbakhsh, A.1    Rahmati, M.2    Mirzaei, A.3
  • 94
    • 70249099684 scopus 로고
    • Fibonacci and Lucas numbers tend to obey Benford's law
    • J. Wlodarski Fibonacci and Lucas numbers tend to obey Benford's law Fibonacci Quarterly 9 1 1971 87 88
    • (1971) Fibonacci Quarterly , vol.9 , Issue.1 , pp. 87-88
    • Wlodarski, J.1
  • 95
  • 96
  • 98
    • 1942436335 scopus 로고    scopus 로고
    • Robustness of the Markov-chain model for cyber-attack detection
    • N. Ye, Y. Zhang, and C.M. Borror Robustness of the Markov-chain model for cyber-attack detection IEEE Transactions on Reliability 53 1 2004 116 123
    • (2004) IEEE Transactions on Reliability , vol.53 , Issue.1 , pp. 116-123
    • Ye, N.1    Zhang, Y.2    Borror, C.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.