-
1
-
-
84879651756
-
Anomaly detection and mitigation at Internet scale: A survey
-
In, Doyen G. Waldburger M. Čeleda P. Sperotto A. Stiller B. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
-
Steinberger J, Schehlmann L, Abt S, Baier H,. Anomaly detection and mitigation at Internet scale: a survey. In Emerging Management Mechanisms for the Future Internet, Doyen G, Waldburger M, Čeleda P, Sperotto A, Stiller B, (eds.), Lecture Notes in Computer Science, vol. 7943. Springer: Berlin, 2013; 49-60.
-
(2013)
Emerging Management Mechanisms for the Future Internet
, vol.7943
, pp. 49-60
-
-
Steinberger, J.1
Schehlmann, L.2
Abt, S.3
Baier, H.4
-
2
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
Sperotto A, Schaffrath G, Sadre R, Morariu C, Pras A, Stiller B,. An overview of IP flow-based intrusion detection, IEEE Communications Surveys and Tutorials 2010; 12 (3): 343-356.
-
(2010)
IEEE Communications Surveys and Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
3
-
-
84874724334
-
A survey of network flow applications
-
Li B, Springer J, Bebis G, Gunes MH,. A survey of network flow applications, Journal of Network and Computer Applications 2013; 36 (2): 567-581.
-
(2013)
Journal of Network and Computer Applications
, vol.36
, Issue.2
, pp. 567-581
-
-
Li, B.1
Springer, J.2
Bebis, G.3
Gunes, M.H.4
-
4
-
-
84894646147
-
Network anomaly detection: Methods, systems and tools
-
Bhuyan M, Bhattacharyya D, Kalita J,. Network anomaly detection: methods, systems and tools, IEEE Communications Surveys and Tutorials 2014; 16: 303-336.
-
(2014)
IEEE Communications Surveys and Tutorials
, vol.16
, pp. 303-336
-
-
Bhuyan, M.1
Bhattacharyya, D.2
Kalita, J.3
-
5
-
-
34848927600
-
-
Advances in Information Security, , Springer: Berlin.
-
Kruegel C, Valeur F, Vigna G,. Intrusion Detection and Correlation: Challenges and Solutions, Advances in Information Security, vol. 14, Springer: Berlin, 2005.
-
(2005)
Intrusion Detection and Correlation: Challenges and Solutions
, vol.14
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
-
7
-
-
84875589665
-
Measurement artifacts in NetFlow data
-
In, Lecture Notes in Computer Science, . Springer: Berlin.
-
Hofstede R, Drago I, Sperotto A, Sadre R, Pras A,. Measurement artifacts in NetFlow data. In Proceedings of the 14th International Conference on Passive and Active Measurement, Lecture Notes in Computer Science, vol. 7799. Springer: Berlin, 2013; 1-10.
-
(2013)
Proceedings of the 14th International Conference on Passive and Active Measurement
, vol.7799
, pp. 1-10
-
-
Hofstede, R.1
Drago, I.2
Sperotto, A.3
Sadre, R.4
Pras, A.5
-
8
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
DOI 10.1145/1177080.1177101, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
Brauckhoff D, Tellenbach B, Wagner A, May M, Lakhina A,. Impact of packet sampling on anomaly detection metrics, In Proceedings of the 6th ACM SIGCOMM Conference on Internet measurement: IMC'06. ACM: New York, 2006; 159-164. (Pubitemid 47165598)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
9
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
DOI 10.1145/1177080.1177102, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
Mai J, Chuah CN, Sridharan A, Ye T, Zang H,. Is sampled data sufficient for anomaly detection? In Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement: IMC'06. ACM: New York, 2006; 165-176. (Pubitemid 47165599)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
10
-
-
84868110134
-
Reduction of traffic sampling impact on anomaly detection
-
Melbourne, Australia
-
Qiao P, Huang Yf, Zeng Pf,. Reduction of traffic sampling impact on anomaly detection, In Proceedings of the 7th International Conference on Computer Science Education, Melbourne, Australia, 2012; 438-443.
-
(2012)
Proceedings of the 7th International Conference on Computer Science Education
, pp. 438-443
-
-
Qiao, P.1
Huang, Y.2
Zeng, P.3
-
11
-
-
84869193506
-
A distributed DNS traffic monitoring system
-
Limassol, Cyprus
-
Deri L, Luconi Trombacchi L, Martinelli M, Vannozzi D,. A distributed DNS traffic monitoring system, In Proceedings of the 8th International Conference for Wireless Communications and Mobile Computing, Limassol, Cyprus, 2012; 30-35.
-
(2012)
Proceedings of the 8th International Conference for Wireless Communications and Mobile Computing
, pp. 30-35
-
-
Deri, L.1
Luconi Trombacchi, L.2
Martinelli, M.3
Vannozzi, D.4
-
12
-
-
84885780072
-
Design and evaluation of HTTP protocol parsers for IPFIX measurement
-
In, Lecture Notes in Computer Science, . Springer: Berlin.
-
Velan P, Jirsík T, Čeleda P,. Design and evaluation of HTTP protocol parsers for IPFIX measurement. In Advances in Communication Networking, Lecture Notes in Computer Science, vol. 8115. Springer: Berlin, 2013; 136-147.
-
(2013)
Advances in Communication Networking
, vol.8115
, pp. 136-147
-
-
Velan, P.1
Jirsík, T.2
Čeleda, P.3
-
13
-
-
84898800098
-
An Investigation into Teredo and 6to4 transition mechanisms: Traffic analysis
-
Sydney, Australia
-
Elich M, Velan P, Jirsík T, Čeleda P,. An Investigation Into Teredo and 6to4 transition mechanisms: traffic analysis, In IEEE 38th Conference on Local Computer Networks, Sydney, Australia, 2013; 1046-1052.
-
(2013)
IEEE 38th Conference on Local Computer Networks
, pp. 1046-1052
-
-
Elich, M.1
Velan, P.2
Jirsík, T.3
Čeleda, P.4
-
14
-
-
84867375385
-
BYOD: Security and privacy considerations
-
Miller KW, Voas J, Hurlburt GF,. BYOD: Security and privacy considerations, IT Professional 2012; 14 (5): 53-55.
-
(2012)
IT Professional
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.W.1
Voas, J.2
Hurlburt, G.F.3
-
15
-
-
77956877124
-
The Internet of Things: A survey
-
Atzori L, Iera A, Morabito G,. The Internet of Things: a survey, Computer Networks 2010; 54 (15): 2787-2805.
-
(2010)
Computer Networks
, vol.54
, Issue.15
, pp. 2787-2805
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
-
16
-
-
79953770333
-
An introduction to IP flow information export (IPFIX)
-
Trammell B, Boschi E,. An introduction to IP flow information export (IPFIX), IEEE Communications Magazine 2011; 49 (4): 89-95.
-
(2011)
IEEE Communications Magazine
, vol.49
, Issue.4
, pp. 89-95
-
-
Trammell, B.1
Boschi, E.2
-
18
-
-
68949173234
-
Taxonomies of attacks and vulnerabilities in computer systems
-
Igure V, Williams R,. Taxonomies of attacks and vulnerabilities in computer systems, IEEE Communications Surveys Tutorials 2008; 10 (1): 6-19.
-
(2008)
IEEE Communications Surveys Tutorials
, vol.10
, Issue.1
, pp. 6-19
-
-
Igure, V.1
Williams, R.2
-
19
-
-
15744370034
-
A taxonomy of network and computer attacks
-
DOI 10.1016/j.cose.2004.06.011, PII S0167404804001804
-
Hansman S, Hunt R,. A taxonomy of network and computer attacks, Computers and Security 2005; 24 (1): 31-43. (Pubitemid 40415398)
-
(2005)
Computers and Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
20
-
-
33748559731
-
-
Springer: New York.
-
Zezula P, Amato G, Dohnal V, Batko M,. Similarity Search: The Metric Space Approach, Springer: New York, 2005.
-
(2005)
Similarity Search: The Metric Space Approach
-
-
Zezula, P.1
Amato, G.2
Dohnal, V.3
Batko, M.4
-
22
-
-
78650797552
-
A Survey of binary similarity and distance measures
-
Choi SS, Cha SH, Tappert C,. A Survey of binary similarity and distance measures, Journal on Systemics, Cybernetics and Informatics 2010; 8 (1): 43-48.
-
(2010)
Journal on Systemics, Cybernetics and Informatics
, vol.8
, Issue.1
, pp. 43-48
-
-
Choi, S.S.1
Cha, S.H.2
Tappert, C.3
-
23
-
-
77954875432
-
Similarity measures for binary and numerical data: A survey
-
Lesot MJ, Rifqi M, Benhadda H,. Similarity measures for binary and numerical data: a survey, International Journal of Knowledge Engineering and Soft Data Paradigms 2009; 1 (1): 63-84.
-
(2009)
International Journal of Knowledge Engineering and Soft Data Paradigms
, vol.1
, Issue.1
, pp. 63-84
-
-
Lesot, M.J.1
Rifqi, M.2
Benhadda, H.3
-
24
-
-
52649136576
-
Similarity measures for categorical data: A comparative evaluation
-
Atlanta, Georgia, USA
-
Boriah S, Chandola V, Kumar V,. Similarity measures for categorical data: a comparative evaluation, In Proceedings of the 8th SIAM International Conference on Data Mining, Atlanta, Georgia, USA, 2008; 243-254.
-
(2008)
Proceedings of the 8th SIAM International Conference on Data Mining
, pp. 243-254
-
-
Boriah, S.1
Chandola, V.2
Kumar, V.3
-
25
-
-
33846190721
-
Host behaviour based early detection of worm outbreaks in internet backbones
-
DOI 10.1109/WETICE.2005.40, 1566204, Proceedings - Fourteenth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2005
-
Dübendorfer T, Plattner B,. Host behaviour based early detection of worm outbreaks in Internet backbones, In Proceedings of the 14th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprise, Linköping, Sweden, 2005; 166-171. (Pubitemid 46090869)
-
(2005)
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE
, vol.2005
, pp. 166-171
-
-
Dubendorfer, T.1
Plattner, B.2
-
26
-
-
70449418092
-
Network-based dictionary attack detection
-
Bangkok, Thailand
-
Vykopal J, Plesník T, Minařík P,. Network-based dictionary attack detection, In Proceedings of the International Conference on Future Networks, Bangkok, Thailand, 2009; 23-27.
-
(2009)
Proceedings of the International Conference on Future Networks
, pp. 23-27
-
-
Vykopal, J.1
Plesník, T.2
Minařík, P.3
-
28
-
-
82955180276
-
Network attack detection at flow level
-
In, Balandin S. Koucheryavy Y. Hu H. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
-
Galtsev AA, Sukhov AM,. Network attack detection at flow level. In Smart Spaces and Next Generation Wired/Wireless Networking, Balandin S, Koucheryavy Y, Hu H, (eds.), Lecture Notes in Computer Science, vol. 6869. Springer: Berlin, 2011; 326-334.
-
(2011)
Smart Spaces and Next Generation Wired/Wireless Networking
, vol.6869
, pp. 326-334
-
-
Galtsev, A.A.1
Sukhov, A.M.2
-
29
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
DOI 10.1145/1030194.1015492, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
Lakhina A, Crovella M, Diot C,. Diagnosing network-wide traffic anomalies, SIGCOMM Computer Communication Review 2004; 34 (4): 219-230. (Pubitemid 40954882)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
30
-
-
77951544397
-
A distribution-based approach to anomaly detection and application to 3G mobile traffic
-
Honolulu, Hawaii, USA
-
D'Alconzo A, Coluccia A, Ricciato F, Romirer-Maierhofer P,. A distribution-based approach to anomaly detection and application to 3G mobile traffic, In Proceedings of IEEE Global Telecommunications Conference, Honolulu, Hawaii, USA, 2009; 1-8.
-
(2009)
Proceedings of IEEE Global Telecommunications Conference
, pp. 1-8
-
-
D'Alconzo, A.1
Coluccia, A.2
Ricciato, F.3
Romirer-Maierhofer, P.4
-
32
-
-
84885796339
-
Protocol-independent detection of dictionary attacks
-
In, Bauschert T. (ed.), Lecture Notes in Computer Science, . Springer: Berlin.
-
Drašar M,. Protocol-independent detection of dictionary attacks. In Advances in Communication Networking, Bauschert T, (ed.), Lecture Notes in Computer Science, vol. 8115. Springer: Berlin, 2013; 304-309.
-
(2013)
Advances in Communication Networking
, vol.8115
, pp. 304-309
-
-
Drašar, M.1
-
34
-
-
79956034020
-
BotTrack: Tracking botnets using NetFlow and PageRank
-
In, Domingo-Pascual J. Manzoni P. Palazzo S. Pont A. Scoglio C. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
-
François J, Wang S, State R, Engel T,. BotTrack: tracking botnets using NetFlow and PageRank. In IFIP NETWORKING 2011, Domingo-Pascual J, Manzoni P, Palazzo S, Pont A, Scoglio C, (eds.), Lecture Notes in Computer Science, vol. 6640. Springer: Berlin, 2011; 1-14.
-
(2011)
IFIP Networking 2011
, vol.6640
, pp. 1-14
-
-
François, J.1
Wang, S.2
State, R.3
Engel, T.4
-
35
-
-
84863031076
-
BotCloud: Detecting botnets using MapReduce
-
Iguacu Falls, Brazil
-
François J, Wang S, Bronzi W, State R, Engel T,. BotCloud: detecting botnets using MapReduce, In Proceedings of the IEEE International Workshop on Information Forensics and Security, Iguacu Falls, Brazil, 2011; 1-6.
-
(2011)
Proceedings of the IEEE International Workshop on Information Forensics and Security
, pp. 1-6
-
-
François, J.1
Wang, S.2
Bronzi, W.3
State, R.4
Engel, T.5
-
36
-
-
77956384873
-
Unsupervised host behavior classification from connection patterns
-
Dewaele G, Himura Y, Borgnat P, Fukuda K, Abry P, Michel O, Fontugne R, Cho K, Esaki H,. Unsupervised host behavior classification from connection patterns, International Journal of Network Management 2010; 20 (5): 317-337.
-
(2010)
International Journal of Network Management
, vol.20
, Issue.5
, pp. 317-337
-
-
Dewaele, G.1
Himura, Y.2
Borgnat, P.3
Fukuda, K.4
Abry, P.5
Michel, O.6
Fontugne, R.7
Cho, K.8
Esaki, H.9
-
38
-
-
77956377864
-
A scalable, efficient and informative approach for anomaly- based intrusion detection systems: Theory and practice
-
Salem O, Vaton S, Gravey A,. A scalable, efficient and informative approach for anomaly- based intrusion detection systems: theory and practice, International Journal of Network Management 2010; 20 (5): 271-293.
-
(2010)
International Journal of Network Management
, vol.20
, Issue.5
, pp. 271-293
-
-
Salem, O.1
Vaton, S.2
Gravey, A.3
-
39
-
-
84863186562
-
Hierarchical method for anomaly detection and attack identification in high-speed network
-
Yan R, Shao C,. Hierarchical method for anomaly detection and attack identification in high-speed network, Information Technology Journal 2012; 11 (9): 1243-1250.
-
(2012)
Information Technology Journal
, vol.11
, Issue.9
, pp. 1243-1250
-
-
Yan, R.1
Shao, C.2
-
40
-
-
84904205325
-
Detecting anomalies in interhosts communication graph
-
Scottsdale, AZ, [31 October 2013]
-
Ishibashi K, Kondoh T, Harada S, Mori T, Kawahara R, Asano S,. Detecting anomalies in interhosts communication graph, In CERT FloCon Workshop: Scottsdale, AZ, 2009. Available: http://www.cert.org/flocon/2009/presentations/ Ishibashi-GraphAnomalies.pdf [31 October 2013].
-
(2009)
CERT FloCon Workshop
-
-
Ishibashi, K.1
Kondoh, T.2
Harada, S.3
Mori, T.4
Kawahara, R.5
Asano, S.6
-
42
-
-
84871993648
-
BotFinder: Finding bots in network traffic without deep packet inspection
-
ACM: New York
-
Tegeler F, Fu X, Vigna G, Kruegel C,. BotFinder: finding bots in network traffic without deep packet inspection, In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies: CoNEXT'12. ACM: New York, 2012; 349-360.
-
(2012)
Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies: CoNEXT'12
, pp. 349-360
-
-
Tegeler, F.1
Fu, X.2
Vigna, G.3
Kruegel, C.4
-
43
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Berkeley, CA, USA
-
Jung J, Paxson V, Berger AW, Balakrishnan H,. Fast portscan detection using sequential hypothesis testing, In Proceedings of the IEEE Symposium on Security and Privacy, Berkeley, CA, USA, 2004; 211-225.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
44
-
-
84904199992
-
Revisiting the threshold random walk scan detector
-
Savannah, GA, [31 October 2013]
-
Nagaonkar V, McHugh J,. Revisiting the threshold random walk scan detector, In CERT FloCon Workshop: Savannah, GA, 2008. Available: http://www.cert.org/flocon/2008/presentations/flocon08-mchugh-vagi.pdf [31 October 2013].
-
(2008)
CERT FloCon Workshop
-
-
Nagaonkar, V.1
McHugh, J.2
-
45
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
DOI 10.1145/1090191.1080112
-
Xu K, Zhang ZL, Bhattacharyya S,. Profiling Internet backbone traffic: behavior models and applications, In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications: SIGCOMM'05. ACM: New York, 2005; 169-180. (Pubitemid 46323502)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
46
-
-
69249205008
-
-
The Cyber Systems and Technology Group [31 October 2013]
-
The Cyber Systems and Technology Group. DARPA intrusion detection data sets. Available: http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ ideval/data/ [31 October 2013].
-
DARPA Intrusion Detection Data Sets
-
-
-
47
-
-
84870674934
-
-
The MAWI Working Group [31 October 2013]
-
The MAWI Working Group. MAWI Working Group traffic archive. Available: http://mawi.wide.ad.jp/mawi/ [31 October 2013].
-
MAWI Working Group Traffic Archive
-
-
-
48
-
-
0141723181
-
-
[31 October 2013]
-
KDD Cup 1999 data. Available: http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html [31 October 2013].
-
KDD Cup 1999 Data
-
-
-
50
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh J,. Testing intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory, ACM Transactions on Information and System Security; 3 (4): 262-294.
-
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
51
-
-
35248857893
-
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection
-
Mahoney MV, Chan PK,. An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection, Vigna G, Kruegel C, Jonsson E, (eds.), Lecture Notes in Computer Science, vol. 2820, 2003; 220-237. (Pubitemid 137633167)
-
(2003)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.2820
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
52
-
-
77950575061
-
A detailed analysis of the KDD CUP 99 data set
-
Ottawa, ON, Canada
-
Tavallaee M, Bagheri E, Lu W, Ghorbani AA,. A detailed analysis of the KDD CUP 99 data set, In Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications, Ottawa, ON, Canada, 2009; 1-6.
-
(2009)
Proceedings of the 2009 IEEE Symposium on Computational Intelligence in Security and Defense Applications
, pp. 1-6
-
-
Tavallaee, M.1
Bagheri, E.2
Lu, W.3
Ghorbani, A.A.4
-
54
-
-
84868286263
-
Packet and flow based network intrusion dataset
-
In, Parashar M. Kaushik D. Zomaya A. (eds.), . Springer: Berlin.
-
Gogoi P, Bhuyan MH, Bhattacharyya DK, Kalita JK,. Packet and flow based network intrusion dataset. In Contemporary Computing, Parashar M, Kaushik D, Zomaya A, (eds.), Vol. 306. Springer: Berlin, 2012; 322-334.
-
(2012)
Contemporary Computing
, vol.306
, pp. 322-334
-
-
Gogoi, P.1
Bhuyan, M.H.2
Bhattacharyya, D.K.3
Kalita, J.K.4
-
55
-
-
79951608572
-
Mawilab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking
-
ACM: New York
-
Fontugne R, Borgnat P, Abry P, Fukuda K,. Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking, In Proceedings of the 6th International Conference: Co-NEXT'10. ACM: New York, 2010.
-
(2010)
Proceedings of the 6th International Conference: Co-NEXT'10
-
-
Fontugne, R.1
Borgnat, P.2
Abry, P.3
Fukuda, K.4
-
56
-
-
77955847605
-
Toward credible evaluation of anomaly-based intrusion- detection methods
-
Tavallaee M, Stakhanova N, Ghorbani AA,. Toward credible evaluation of anomaly-based intrusion- detection methods, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews 2010; 40 (5): 516-524.
-
(2010)
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
, vol.40
, Issue.5
, pp. 516-524
-
-
Tavallaee, M.1
Stakhanova, N.2
Ghorbani, A.A.3
-
57
-
-
77049103625
-
A labeled data set for flow-based intrusion detection
-
In, Lecture Notes in Computer Science, . Springer: Berlin.
-
Sperotto A, Sadre R, van Vliet F, Pras A,. A labeled data set for flow-based intrusion detection. In Proceedings of the 9th IEEE International Workshop on IP Operations and Management, Venice, Lecture Notes in Computer Science, vol. 5843. Springer: Berlin, 2009; 39-50.
-
(2009)
Proceedings of the 9th IEEE International Workshop on IP Operations and Management, Venice
, vol.5843
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Van Vliet, F.3
Pras, A.4
-
58
-
-
85084162112
-
Toward instrumenting network warfare competitions to generate labeled datasets
-
Montreal, Canada
-
Sangster B, O'Connor TJ, Cook T, Fanelli R, Dean E, Morrell C, Conti G,. Toward instrumenting network warfare competitions to generate labeled datasets, In Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test, Montreal, Canada, 2009.
-
(2009)
Proceedings of the 2nd Workshop on Cyber Security Experimentation and Test
-
-
Sangster, B.1
O'Connor, T.J.2
Cook, T.3
Fanelli, R.4
Dean, E.5
Morrell, C.6
Conti, G.7
-
59
-
-
78650720508
-
The need for simulation in evaluating anomaly detectors
-
Ringberg H, Roughan M, Rexford J,. The need for simulation in evaluating anomaly detectors, SIGCOMM Computer Communication Review 2008; 38 (1): 55-59.
-
(2008)
SIGCOMM Computer Communication Review
, vol.38
, Issue.1
, pp. 55-59
-
-
Ringberg, H.1
Roughan, M.2
Rexford, J.3
-
60
-
-
84904207156
-
Framework for comparison of network anomaly detection algorithms
-
[31 October 2013]
-
Bartoš V, Žádík M,. Framework for comparison of network anomaly detection algorithms. Technical Report, Faculty of Information Technology BUT, 2012. Available: http://www.fit.vutbr.cz/research/ view-pub.php?id=10070 [31 October 2013].
-
(2012)
Technical Report, Faculty of Information Technology but
-
-
Bartoš, V.1
Žádík, M.2
-
61
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson S,. The base-rate fallacy and the difficulty of intrusion detection, ACM Transactions on Information and System Security 2000; 3 (3): 186-205.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.3
, pp. 186-205
-
-
Axelsson, S.1
-
62
-
-
80051569378
-
A flow-level taxonomy and prevalence of brute force attacks
-
In, Abraham A. Mauri J.L. Buford J.F. Suzuki J. Thampi S.M. (eds.), Communications in Computer and Information Science, . Springer: Berlin.
-
Vykopal J,. A flow-level taxonomy and prevalence of brute force attacks. In Advances in Computing and Communications, Abraham A, Mauri JL, Buford JF, Suzuki J, Thampi SM, (eds.), Communications in Computer and Information Science, vol. 191. Springer: Berlin, 2011; 666-675.
-
(2011)
Advances in Computing and Communications
, vol.191
, pp. 666-675
-
-
Vykopal, J.1
-
63
-
-
84904203940
-
CAMNEP: Multistage collective network behavior analysis system with hardware accelerated NetFlow probes, in
-
Scottsdale AZ, Available: [31 October 2013]
-
Rehák M, Čeleda P, Pěchouček M, Novotný J,. CAMNEP: multistage collective network behavior analysis system with hardware accelerated NetFlow probes, In CERT FloCon Workshop: Scottsdale, AZ, 2009. Available: http://www.cert.org/flocon/2009/presentations/ Rehak-Camnep.pdf [31 October 2013].
-
(2009)
CERT FloCon Workshop
-
-
Rehák, M.1
Čeleda, P.2
Pěchouček, M.3
Novotný, J.4
-
64
-
-
84904193654
-
-
AT&T Labs Research [31 October 2013]
-
Mahimkar A, Lall A, Wang J, Xu J, Yates J, Zhao Q,. SYNERGY: detecting and diagnosing correlated network anomalies. AT&T Labs Research, 2009. Available: http://www.research.att.com/export/sites/att-labs/techdocs/TD-7KEJWS. pdf [31 October 2013].
-
(2009)
SYNERGY: Detecting and Diagnosing Correlated Network Anomalies
-
-
Mahimkar, A.1
Lall, A.2
Wang, J.3
Xu, J.4
Yates, J.5
Zhao, Q.6
-
65
-
-
84872911521
-
Complex event processing over distributed probabilistic event streams
-
Chongqing, Sichuan, China
-
Wang Y, Zhang X,. Complex event processing over distributed probabilistic event streams, In Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, Chongqing, Sichuan, China, 2012; 1489-1493.
-
(2012)
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery
, pp. 1489-1493
-
-
Wang, Y.1
Zhang, X.2
-
66
-
-
84904198553
-
Considerations for scan detection using flow data
-
Albuquerque NM, [31 October 2013]
-
McHugh J,. Considerations for scan detection using flow data, In CERT FloCon Workshop: Albuquerque, NM, 2013. Available: http://www.cert.org/flocon/ 2013/presentations/mchugh-john-scan-detection.pdf [31 October 2013].
-
(2013)
CERT FloCon Workshop
-
-
McHugh, J.1
-
67
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
Seoul, Korea
-
Kim MS, Kong HJ, Hong SC, Chung SH, Hong JW,. A flow-based method for abnormal network traffic detection, In Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Application Session, Vol. 1, Seoul, Korea, 2004; 599-612.
-
(2004)
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Application Session
, vol.1
, pp. 599-612
-
-
Kim, M.S.1
Kong, H.J.2
Hong, S.C.3
Chung, S.H.4
Hong, J.W.5
-
69
-
-
84874719821
-
Study on the TOPN abnormal detection based on the NetFlow data set
-
Zhang H,. Study on the TOPN abnormal detection based on the NetFlow data set, Computer and Information Science 2009; 2 (3): 103-108.
-
(2009)
Computer and Information Science
, vol.2
, Issue.3
, pp. 103-108
-
-
Zhang, H.1
-
70
-
-
62949162690
-
A NetFlow based Internet-worm detecting system in large network
-
London, UK
-
Chan YTF, Shoniregun CA, Akmayeva GA,. A NetFlow based Internet-worm detecting system in large network, In Proceedings of the 3rd International Conference on Digital Information Management, London, UK, 2008; 581-586.
-
(2008)
Proceedings of the 3rd International Conference on Digital Information Management
, pp. 581-586
-
-
Chan, Y.T.F.1
Shoniregun, C.A.2
Akmayeva, G.A.3
-
72
-
-
84861990847
-
SSHCure: A flow-based SSH intrusion detection system
-
In, Sadre R. Novotný J. Čeleda P. Waldburger M. Stiller B. (eds.), Lecture Notes in Computer Science, . Springer: Berlin.
-
Hellemons L, Hendriks L, Hofstede R, Sperotto A, Sadre R, Pras A,. SSHCure: a flow-based SSH intrusion detection system. In Dependable Networks and Services, Sadre R, Novotný J, Čeleda P, Waldburger M, Stiller B, (eds.), Lecture Notes in Computer Science, vol. 7279. Springer: Berlin, 2012; 86-97.
-
(2012)
Dependable Networks and Services
, vol.7279
, pp. 86-97
-
-
Hellemons, L.1
Hendriks, L.2
Hofstede, R.3
Sperotto, A.4
Sadre, R.5
Pras, A.6
-
73
-
-
84904180737
-
Analysis of the US-CERT DAC
-
Pittsburgh, PA, [31 October 2013]
-
McNutt J,. Analysis of the US-CERT DAC, In CERT FloCon Workshop, Pittsburgh, PA, 2004. Available: http://www.cert.org/flocon/2004/proceedings/ flocon2004-analysis-mcnutt.pdf [31 October 2013].
-
(2004)
CERT FloCon Workshop
-
-
McNutt, J.1
-
74
-
-
84904181678
-
Identifying anomalous traffic using Delta Traffic
-
Savannah, GA, [31 October 2013]
-
Kondoh T, Ishibashi K,. Identifying anomalous traffic using Delta Traffic, In CERT FloCon Workshop: Savannah, GA, 2008. Available: http://www.cert.org/flocon/2008/presentations/kondoh-flocon2008.pdf [31 October 2013].
-
(2008)
CERT FloCon Workshop
-
-
Kondoh, T.1
Ishibashi, K.2
-
75
-
-
84878912661
-
Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks
-
Hashim F, Munasinghe KS, Jamalipour A,. Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks, IEEE Transactions on Network and Service Management; 7 (4): 268-281.
-
IEEE Transactions on Network and Service Management
, vol.7
, Issue.4
, pp. 268-281
-
-
Hashim, F.1
Munasinghe, K.S.2
Jamalipour, A.3
-
76
-
-
84858698273
-
Unsupervised network intrusion detection systems: Detecting the unknown without knowledge
-
Casas P, Mazel J, Owezarski P,. Unsupervised network intrusion detection systems: detecting the unknown without knowledge, Computer Communications 2012; 35 (7): 772-783.
-
(2012)
Computer Communications
, vol.35
, Issue.7
, pp. 772-783
-
-
Casas, P.1
Mazel, J.2
Owezarski, P.3
-
77
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
DOI 10.1145/1090191.1080119
-
Karagiannis T, Papagiannaki K, Faloutsos M,. BLINC: multilevel traffic classification in the dark, In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications: SIGCOMM'05. ACM: New York, 2005; 229-240. (Pubitemid 46323507)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
78
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
Tampa, Florida, USA
-
Livadas C, Walsh R, Lapsley D, Strayer WT,. Using machine learning techniques to identify botnet traffic, In Proceedings of the 31st IEEE Conference on Local Computer Networks, Tampa, Florida, USA, 2006; 967-974.
-
(2006)
Proceedings of the 31st IEEE Conference on Local Computer Networks
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
79
-
-
84904158680
-
Anomaly detection through blind flow analysis inside a local network
-
Vancouver, WA, [31 October 2013]
-
McLeod R, Nagaonkar V,. Anomaly detection through blind flow analysis inside a local network, In CERT FloCon Workshop: Vancouver, WA, 2006. Available: http://www.cert.org/flocon/2006/presentations/anomaly-detect2006.pdf [31 October 2013].
-
(2006)
CERT FloCon Workshop
-
-
McLeod, R.1
Nagaonkar, V.2
-
80
-
-
75149179043
-
Histogram-based traffic anomaly detection
-
Kind A, Stoecklin MP, Dimitropoulos X,. Histogram-based traffic anomaly detection, IEEE Transactions on Network and Service Management 2009; 6 (2): 110-121.
-
(2009)
IEEE Transactions on Network and Service Management
, vol.6
, Issue.2
, pp. 110-121
-
-
Kind, A.1
Stoecklin, M.P.2
Dimitropoulos, X.3
-
81
-
-
84904180074
-
Network host classification using statistical analysis of flow data
-
New Orleans, LA, [31 October 2013]
-
Kent A, Fisk M, Gavrilov E,. Network host classification using statistical analysis of flow data, In CERT FloCon Workshop: New Orleans, LA, 2010. Available: http://www.cert.org/flocon/2010/presentations/Kent- NetworkHostClassification.pdf [31 October 2013].
-
(2010)
CERT FloCon Workshop
-
-
Kent, A.1
Fisk, M.2
Gavrilov, E.3
-
82
-
-
84904156819
-
Locality based analysis of network flows
-
Pittsburgh, PA, [31 October 2013]
-
McHugh J,. Locality based analysis of network flows, In CERT FloCon Workshop: Pittsburgh, PA, 2004. Available: http://www.cert.org/flocon/2004/ proceedings/flocon2004-analysis-mchugh.pdf [31 October 2013].
-
(2004)
CERT FloCon Workshop
-
-
McHugh, J.1
-
83
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
DOI 10.1145/1090191.1080118
-
Lakhina A, Crovella M, Diot C,. Mining anomalies using traffic feature distributions, SIGCOMM Computer Communication Review 2005; 35 (4): 217-228. (Pubitemid 46323506)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
84
-
-
84904160449
-
Towards a high-speed router-based anomaly/intrusion detection system
-
Philadelphia, PA, [20 May 2014]
-
Li Z, Gao Y, Chen Y,. Towards a high-speed router-based anomaly/intrusion detection system, In Proceedings of the Special Interest Group on Data Communication (SIGCOMM): Philadelphia, PA, 2005. Available: http://conferences. sigcomm.org/sigcomm/2005/poster-121.pdf [20 May 2014].
-
(2005)
Proceedings of the Special Interest Group on Data Communication (SIGCOMM)
-
-
Li, Z.1
Gao, Y.2
Chen, Y.3
-
85
-
-
84855161053
-
Correlations between quiescent ports in network flows
-
Pittsburgh, PA, [31 October 2013]
-
McNutt J, De Shon M,. Correlations between quiescent ports in network flows, In CERT FloCon Workshop: Pittsburgh, PA, 2005. Available: http://www.cert.org/flocon/2005/presentations/McNutt-Correlation-FloCon2005.pdf [31 October 2013].
-
(2005)
CERT FloCon Workshop
-
-
McNutt, J.1
De Shon, M.2
-
87
-
-
43949111011
-
A two-layered anomaly detection technique based on multi-modal flow behavior models
-
DOI 10.1007/978-3-540-79232-1-22, Passive and Active Network Measurement - 9th International Conference, PAM 2008, Proceedings
-
Stoecklin MP, Boudec JY, Kind A,. A two-layered anomaly detection technique based on multi-modal flow behavior models. In Passive and Active Network Measurement, Claypool M, Uhlig S, (eds.), Lecture Notes in Computer Science, vol. 4979. Springer: Berlin, 2008; 212-221. (Pubitemid 351702294)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4979
, pp. 212-221
-
-
Stoecklin, M.P.1
Le Boudec, J.-Y.2
Kind, A.3
-
88
-
-
84904165427
-
A flexible DDoS detection system using IPFIX, in
-
Savannah, GA, [31 October 2013]
-
Zseby T, Hirsch T,. A flexible DDoS detection system using IPFIX, In CERT FloCon Workshop: Savannah, GA, 2008. Available: http://www.cert.org/flocon/ 2008/presentations/zseby-Flocon2008.pdf [31 October 2013].
-
(2008)
CERT FloCon Workshop
-
-
Zseby, T.1
Hirsch, T.2
-
89
-
-
77950814614
-
A network access control mechanism based on behavior profiles
-
Honolulu, Hawaii
-
Frias-Martinez V, Sherrick J, Stolfo SJ, Keromytis AD,. A network access control mechanism based on behavior profiles, In Proceedings of the Conference on Computer Security Applications, Honolulu, Hawaii, 2009; 3-12.
-
(2009)
Proceedings of the Conference on Computer Security Applications
, pp. 3-12
-
-
Frias-Martinez, V.1
Sherrick, J.2
Stolfo, S.J.3
Keromytis, A.D.4
-
91
-
-
84904215576
-
Protographs: Graph-based approach to NetFlow analysis
-
Salt Lake City, UT, [31 October 2013]
-
Janies J,. Protographs: graph-based approach to NetFlow analysis, In CERT FloCon Workshop: Salt Lake City, UT, 2011. Available: http://www.cert.org/ flocon/2011/presentations/Janies-Protographs.pdf [31 October 2013].
-
(2011)
CERT FloCon Workshop
-
-
Janies, J.1
-
92
-
-
80053919941
-
A novel DoS detection mechanism
-
Jilin, China
-
Yin Kx, Zhu Jq,. A novel DoS detection mechanism, In Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer, Jilin, China, 2011; 296-298.
-
(2011)
Proceedings of the International Conference on Mechatronic Science, Electric Engineering and Computer
, pp. 296-298
-
-
Yin, K.1
Zhu, J.2
-
93
-
-
80053022689
-
Detection of attackers in services using anomalous host behavior based on traffic flow statistics
-
Munich, Germany
-
Sawaya Y, Kubota A, Miyake Y,. Detection of attackers in services using anomalous host behavior based on traffic flow statistics, In Proceedings of the 11th International Symposium on Applications and the Internet (SAINT): Munich, Germany, 2011; 353-359.
-
(2011)
Proceedings of the 11th International Symposium on Applications and the Internet (SAINT)
, pp. 353-359
-
-
Sawaya, Y.1
Kubota, A.2
Miyake, Y.3
-
94
-
-
84904203378
-
Entropy in IP Darkspace data
-
Austin, TX, [31 October 2013]
-
Zseby T,. Entropy in IP Darkspace data, In CERT FloCon Workshop: Austin, TX, 2012. Available: http://www.cert.org/flocon/2012/presentations/zseby- entropy-in-IP-darkspace-data.pdf [31 October 2013].
-
(2012)
CERT FloCon Workshop
-
-
Zseby, T.1
|