-
1
-
-
84889048803
-
Studies in applying pca and wavelet algorithms for network traffic anomaly detection
-
S. Novakov, C.-H. Lung, I. Lambadaris, N. Seddigh, Studies in applying pca and wavelet algorithms for network traffic anomaly detection, in: 2013 IEEE 14th International Conference on High Performance Switching and Routing (HPSR), 2013, pp. 185-190. http://dx.doi.org/10.1109/HPSR.2013.6602310.
-
(2013)
2013 IEEE 14th International Conference on High Performance Switching and Routing (HPSR)
, pp. 185-190
-
-
Novakov, S.1
Lung, C.-H.2
Lambadaris, I.3
Seddigh, N.4
-
2
-
-
84907539069
-
-
J. Wang, D. Rossell, C.G. Cassandras, I.C. Paschalidis, Network anomaly detection: a survey and comparative analysis of stochastic and deterministic methods, CoRR abs/1309.4844.
-
Network Anomaly Detection: A Survey and Comparative Analysis of Stochastic and Deterministic Methods, CoRR abs/1309.4844
-
-
Wang, J.1
Rossell, D.2
Cassandras, C.G.3
Paschalidis, I.C.4
-
3
-
-
80052448813
-
Accurate network anomaly classification with generalized entropy metrics
-
B. Tellenbach, M. Burkhart, D. Schatzmann, D. Gugelmann, and D. Sornette Accurate network anomaly classification with generalized entropy metrics Comput. Netw. 55 15 2011 3485 3502 10.1016/j.comnet.2011.07.008
-
(2011)
Comput. Netw.
, vol.55
, Issue.15
, pp. 3485-3502
-
-
Tellenbach, B.1
Burkhart, M.2
Schatzmann, D.3
Gugelmann, D.4
Sornette, D.5
-
4
-
-
84887047298
-
Distribution-based anomaly detection via generalized likelihood ratio test: A general maximum entropy approach
-
A. Coluccia, A. D'alconzo, and F. Ricciato Distribution-based anomaly detection via generalized likelihood ratio test: a general maximum entropy approach Comput. Netw. 57 17 2013 3446 3462 http://dx.doi.org/10.1016/j.comnet.2013.07.028
-
(2013)
Comput. Netw.
, vol.57
, Issue.17
, pp. 3446-3462
-
-
Coluccia, A.1
D'Alconzo, A.2
Ricciato, F.3
-
5
-
-
84655161362
-
Collaborative anomaly-based detection of large-scale internet attacks
-
T. Gamer Collaborative anomaly-based detection of large-scale internet attacks Comput. Netw. 56 1 2012 169 185 10.1016/j.comnet.2011.08.015
-
(2012)
Comput. Netw.
, vol.56
, Issue.1
, pp. 169-185
-
-
Gamer, T.1
-
6
-
-
84903531892
-
Anomaly extraction in backbone networks using association rules
-
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian Anomaly extraction in backbone networks using association rules IEEE/ACM Trans. Network. 20 6 2012 1788 1799 10.1109/TNET.2012.2187306
-
(2012)
IEEE/ACM Trans. Network.
, vol.20
, Issue.6
, pp. 1788-1799
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
7
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha, and J.-M. Park An overview of anomaly detection techniques: existing solutions and latest technological trends Comput. Netw. 51 12 2007 3448 3470 10.1016/j.comnet.2007.02.001
-
(2007)
Comput. Netw.
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
10
-
-
70349659426
-
Network performance anomaly detection and localization
-
IEEE
-
P. Barford, N. Duffield, A. Ron, and J. Sommers Network performance anomaly detection and localization INFOCOM 2009 2009 IEEE 1377 1385 http://dx.doi.org/10.1109/INFCOM.2009.5062053
-
(2009)
INFOCOM 2009
, pp. 1377-1385
-
-
Barford, P.1
Duffield, N.2
Ron, A.3
Sommers, J.4
-
11
-
-
84861584915
-
Traffic anomaly detection based on the ip size distribution
-
F. Soldo, A. Metwally, Traffic anomaly detection based on the ip size distribution, in: INFOCOM, 2012 Proceedings IEEE, 2012, pp. 2005-2013. http://dx.doi.org/10.1109/INFCOM.2012.6195581.
-
(2012)
INFOCOM, 2012 Proceedings IEEE
, pp. 2005-2013
-
-
Soldo, F.1
Metwally, A.2
-
12
-
-
67650149213
-
Spatio-temporal network anomaly detection by assessing deviations of empirical measures
-
I.C. Paschalidis, and G. Smaragdakis Spatio-temporal network anomaly detection by assessing deviations of empirical measures IEEE/ACM Trans. Netw. 17 3 2009 685 697 10.1109/TNET.2008.2001468
-
(2009)
IEEE/ACM Trans. Netw.
, vol.17
, Issue.3
, pp. 685-697
-
-
Paschalidis, I.C.1
Smaragdakis, G.2
-
15
-
-
84907497169
-
-
Snort
-
Snort < http://www.snort.org >.
-
-
-
-
16
-
-
84907497168
-
-
Bro ids
-
Bro ids < http://www.bro.org >.
-
-
-
-
17
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, Bro: a system for detecting network intruders in real-time, in: Computer Networks, 1999, pp. 2435-2463.
-
(1999)
Computer Networks
, pp. 2435-2463
-
-
Paxson, V.1
-
18
-
-
0034226287
-
A revised taxonomy for intrusion-detection systems
-
H. Debar, M. Dacier, and A. Wespi A revised taxonomy for intrusion-detection systems Ann. Télécommun. 55 7-8 2000 361 378
-
(2000)
Ann. Télécommun.
, vol.55
, Issue.78
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
19
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao Survey of network-based defense mechanisms countering the dos and ddos problems ACM Comput. Surv. 39 1 2007 3 http://dx.doi.org/10.1145/1216370.1216373
-
(2007)
ACM Comput. Surv.
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
21
-
-
68049121093
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar Anomaly detection: a survey ACM Comput. Surv. 41 3 2009 15:1 15:58 10.1145/1541880.1541882
-
(2009)
ACM Comput. Surv.
, vol.41
, Issue.3
, pp. 151-1558
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
22
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
ACM New York, NY, USA
-
A. Lakhina, M. Crovella, and C. Diot Diagnosing network-wide traffic anomalies SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2004 ACM New York, NY, USA 219 230 http://dx.doi.org/10.1145/1015467.1015492
-
(2004)
SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
23
-
-
62949129764
-
Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures
-
ACM New York, NY, USA
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures Proceedings of the 2007 Workshop on Large Scale Attack Defense, LSAD'07 2007 ACM New York, NY, USA 145 152 http://dx.doi.org/10.1145/1352664.1352675
-
(2007)
Proceedings of the 2007 Workshop on Large Scale Attack Defense, LSAD'07
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
24
-
-
70450263491
-
Spatio-temporal compressive sensing and internet traffic matrices
-
ACM New York, NY, USA
-
Y. Zhang, M. Roughan, W. Willinger, and L. Qiu Spatio-temporal compressive sensing and internet traffic matrices Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM'09 2009 ACM New York, NY, USA 267 278 http://dx.doi.org/10.1145/1592568.1592600
-
(2009)
Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, SIGCOMM'09
, pp. 267-278
-
-
Zhang, Y.1
Roughan, M.2
Willinger, W.3
Qiu, L.4
-
25
-
-
33244480149
-
Traffic matrices: Balancing measurements, inference and modeling
-
A. Soule, A. Lakhina, N. Taft, K. Papagiannaki, K. Salamatian, A. Nucci, M. Crovella, and C. Diot Traffic matrices: balancing measurements, inference and modeling SIGMETRICS Perform. Eval. Rev. 33 1 2005 362 373 http://dx.doi.org/10.1145/1071690.1064259
-
(2005)
SIGMETRICS Perform. Eval. Rev.
, vol.33
, Issue.1
, pp. 362-373
-
-
Soule, A.1
Lakhina, A.2
Taft, N.3
Papagiannaki, K.4
Salamatian, K.5
Nucci, A.6
Crovella, M.7
Diot, C.8
-
28
-
-
18144385431
-
Application of anomaly detection algorithms for detecting syn flooding attacks
-
GLOBECOM '04 IEEE
-
V. Siris, and F. Papagalou Application of anomaly detection algorithms for detecting syn flooding attacks Global Telecommunications Conference, 2004 GLOBECOM '04 vol. 4 2004 IEEE 2050 2054 http://dx.doi.org/10.1109/GLOCOM.2004.1378372
-
(2004)
Global Telecommunications Conference, 2004
, vol.4
, pp. 2050-2054
-
-
Siris, V.1
Papagalou, F.2
-
29
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
ACM New York, NY, USA
-
A. Lakhina, M. Crovella, and C. Diot Characterization of network-wide anomalies in traffic flows IMC'04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004 ACM New York, NY, USA 201 206 http://dx.doi.org/10.1145/1028788.1028813
-
(2004)
IMC'04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
31
-
-
36949007362
-
Challenging the anomaly detection paradigm: A provocative discussion
-
ACM New York, NY, USA
-
C. Gates, and C. Taylor Challenging the anomaly detection paradigm: a provocative discussion Proceedings of the 006 Workshop on New Security Paradigms, NSPW '06 2007 ACM New York, NY, USA 21 29 http://dx.doi.org/10.1145/1278940.1278945
-
(2007)
Proceedings of the 006 Workshop on New Security Paradigms, NSPW '06
, pp. 21-29
-
-
Gates, C.1
Taylor, C.2
-
32
-
-
78650720508
-
The need for simulation in evaluating anomaly detectors
-
H. Ringberg, M. Roughan, and J. Rexford The need for simulation in evaluating anomaly detectors SIGCOMM Comput. Commun. Rev. 38 1 2008 55 59 10.1145/1341431.1341443
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.1
, pp. 55-59
-
-
Ringberg, H.1
Roughan, M.2
Rexford, J.3
-
33
-
-
1242265009
-
An information-theoretic approach to traffic matrix estimation
-
ACM New York, NY, USA
-
Y. Zhang, M. Roughan, C. Lund, and D. Donoho An information-theoretic approach to traffic matrix estimation Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM'03 2003 ACM New York, NY, USA 301 312 http://dx.doi.org/10.1145/863955.863990
-
(2003)
Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM'03
, pp. 301-312
-
-
Zhang, Y.1
Roughan, M.2
Lund, C.3
Donoho, D.4
-
34
-
-
78149299461
-
Astute: Detecting a different class of traffic anomalies
-
ACM New York, NY, USA
-
F. Silveira, C. Diot, N. Taft, and R. Govindan Astute: detecting a different class of traffic anomalies SIGCOMM'10: Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM 2010 ACM New York, NY, USA 267 278 http://dx.doi.org/10.1145/1851182.1851215
-
(2010)
SIGCOMM'10: Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM
, pp. 267-278
-
-
Silveira, F.1
Diot, C.2
Taft, N.3
Govindan, R.4
-
35
-
-
51349141856
-
Distributed spatial anomaly detection
-
P. Chhabra, C. Scott, E.D. Kolaczyk, M. Crovella, Distributed spatial anomaly detection, in: Proceedings of Infocom 2008, 2008.
-
(2008)
Proceedings of Infocom 2008
-
-
Chhabra, P.1
Scott, C.2
Kolaczyk, E.D.3
Crovella, M.4
-
36
-
-
84878704906
-
Network anomography
-
USENIX Association Berkeley, CA, USA
-
Y. Zhang, Z. Ge, A. Greenberg, and M. Roughan Network anomography IMC'05: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement 2005 USENIX Association Berkeley, CA, USA 30
-
(2005)
IMC'05: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement
, pp. 30
-
-
Zhang, Y.1
Ge, Z.2
Greenberg, A.3
Roughan, M.4
-
38
-
-
12244311689
-
A taxonomy of computer worms
-
ACM New York, NY, USA
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham A taxonomy of computer worms Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM '03 2003 ACM New York, NY, USA 11 18 http://dx.doi.org/10.1145/948187.948190
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM '03
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
39
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
ACM New York, NY, USA
-
P. Barford, J. Kline, D. Plonka, and A. Ron A signal analysis of network traffic anomalies IMW'02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement 2002 ACM New York, NY, USA 71 82 http://dx.doi.org/10.1145/637201.637210
-
(2002)
IMW'02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
40
-
-
85084160767
-
On gray-box program tracking for anomaly detection
-
SSYM'04 USENIX Association Berkeley, CA, USA < >
-
D. Gao, M.K. Reiter, and D. Song On gray-box program tracking for anomaly detection Proceedings of the 13th Conference on USENIX Security Symposium SSYM'04 vol. 13 2004 USENIX Association Berkeley, CA, USA 8 < http://dl.acm.org/citation.cfm?id=1251375.1251383 >
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium
, vol.13
, pp. 8
-
-
Gao, D.1
Reiter, M.K.2
Song, D.3
-
41
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
W. Lee, D. Xiang, Information-theoretic measures for anomaly detection, in: Proceedings. 2001 IEEE Symposium on Security and Privacy, 2001, SP 2001, 2001, pp. 130-143. http://dx.doi.org/10.1109/SECPRI.2001.924294.
-
(2001)
Proceedings. 2001 IEEE Symposium on Security and Privacy, 2001, SP 2001
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
42
-
-
80051791562
-
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
-
Z. Zhang, F. Nat-Abdesselam, P.-H. Ho, and Y. Kadobayashi Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks Comput. Secur. 30 6-7 2011 525 537
-
(2011)
Comput. Secur.
, vol.30
, Issue.67
, pp. 525-537
-
-
Zhang, Z.1
Nat-Abdesselam, F.2
Ho, P.-H.3
Kadobayashi, Y.4
-
43
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
ACM New York, NY, USA
-
H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee Internet traffic classification demystified: myths, caveats, and the best practices CoNEXT'08: Proceedings of the 2008 ACM CoNEXT Conference 2008 ACM New York, NY, USA 1 12
-
(2008)
CoNEXT'08: Proceedings of the 2008 ACM CoNEXT Conference
, pp. 1-12
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
44
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot Mining anomalies using traffic feature distributions SIGCOMM Comput. Commun. Rev. 35 4 2005 217 228 http://dx.doi.org/10.1145/1090191.1080118
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.4
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
45
-
-
84878737375
-
Combining filtering and statistical methods for anomaly detection
-
USENIX Association Berkeley, CA, USA
-
A. Soule, K. Salamatian, and N. Taft Combining filtering and statistical methods for anomaly detection IMC'05: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement 2005 USENIX Association Berkeley, CA, USA 31
-
(2005)
IMC'05: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement
, pp. 31
-
-
Soule, A.1
Salamatian, K.2
Taft, N.3
-
48
-
-
16344383315
-
Sampling for passive internet measurement: A review
-
N. Duffield Sampling for passive internet measurement: a review Stat. Sci. 19 2004 472 498
-
(2004)
Stat. Sci.
, vol.19
, pp. 472-498
-
-
Duffield, N.1
-
49
-
-
0141762497
-
Properties and prediction of flow statistics from sampled packet streams
-
ACM New York, NY, USA
-
C. Duffield, N. Lund, and M. Thorup Properties and prediction of flow statistics from sampled packet streams Proceedings of the 2Nd ACM SIGCOMM Workshop on Internet Measurement, IMW'02 2002 ACM New York, NY, USA 159 171 http://dx.doi.org/10.1145/637201.637225
-
(2002)
Proceedings of the 2Nd ACM SIGCOMM Workshop on Internet Measurement, IMW'02
, pp. 159-171
-
-
Duffield, C.1
Lund, N.2
Thorup, M.3
-
50
-
-
33144477616
-
Inverting sampled traffic
-
N. Hohn, and D. Veitch Inverting sampled traffic IEEE/ACM Trans. Network. 14 1 2006 68 80 10.1109/TNET.2005.863456
-
(2006)
IEEE/ACM Trans. Network.
, vol.14
, Issue.1
, pp. 68-80
-
-
Hohn, N.1
Veitch, D.2
-
51
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
ACM New York, NY, USA
-
J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang Is sampled data sufficient for anomaly detection? Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC'06 2006 ACM New York, NY, USA 165 176 http://dx.doi.org/10.1145/1177080.1177102
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC'06
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
52
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
ACM New York, NY, USA
-
D. Brauckhoff, B. Tellenbach, A. Wagner, M. May, and A. Lakhina Impact of packet sampling on anomaly detection metrics Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC'06 2006 ACM New York, NY, USA 159 164 http://dx.doi.org/10.1145/1177080.1177101
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC'06
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
53
-
-
77953294708
-
A signal processing view on packet sampling and anomaly detection
-
D. Brauckhoff, K. Salamatian, M. May, A signal processing view on packet sampling and anomaly detection, in: INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-9. http://dx.doi.org/10.1109/INFCOM.2010.5462154.
-
(2010)
INFOCOM, 2010 Proceedings IEEE
, pp. 1-9
-
-
Brauckhoff, D.1
Salamatian, K.2
May, M.3
-
54
-
-
34547487270
-
Detection and identification of network anomalies using sketch subspaces
-
ACM New York, NY, USA
-
X. Li, F. Bian, M. Crovella, C. Diot, R. Govindan, G. Iannaccone, and A. Lakhina Detection and identification of network anomalies using sketch subspaces IMC'06: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement 2006 ACM New York, NY, USA 147 152 http://dx.doi.org/10.1145/1177080.1177099
-
(2006)
IMC'06: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 147-152
-
-
Li, X.1
Bian, F.2
Crovella, M.3
Diot, C.4
Govindan, R.5
Iannaccone, G.6
Lakhina, A.7
-
55
-
-
85048675213
-
In-network pca and anomaly detection
-
Vancouver, BC
-
L. Huang, X.L. Nguyen, M. Garofalakis, A. Joseph, M. Jordan, and N. Taft In-network pca and anomaly detection Advances in Neural Information Processing Systems (NIPS) 2006 Vancouver, BC
-
(2006)
Advances in Neural Information Processing Systems (NIPS)
-
-
Huang, L.1
Nguyen, X.L.2
Garofalakis, M.3
Joseph, A.4
Jordan, M.5
Taft, N.6
-
56
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
ACM New York, NY, USA
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications IMC'04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004 ACM New York, NY, USA 101 114 http://dx.doi.org/10.1145/1028788.1028802
-
(2004)
IMC'04: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
57
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
ACM New York, NY, USA
-
G. Nychis, V. Sekar, D.G. Andersen, H. Kim, and H. Zhang An empirical evaluation of entropy-based traffic anomaly detection IMC'08: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement 2008 ACM New York, NY, USA 151 156 http://dx.doi.org/10.1145/1452520.1452539
-
(2008)
IMC'08: Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement
, pp. 151-156
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
59
-
-
67649977471
-
Beyond shannon: Characterizing internet traffic with generalized entropy metrics
-
Springer-Verlag Berlin, Heidelberg
-
B. Tellenbach, M. Burkhart, D. Sornette, and T. Maillart Beyond shannon: characterizing internet traffic with generalized entropy metrics PAM'09: Proceedings of the 10th International Conference on Passive and Active Network Measurement 2009 Springer-Verlag Berlin, Heidelberg 239 248 http://dx.doi.org/10.1007/978-3-642-00975-4-24
-
(2009)
PAM'09: Proceedings of the 10th International Conference on Passive and Active Network Measurement
, pp. 239-248
-
-
Tellenbach, B.1
Burkhart, M.2
Sornette, D.3
Maillart, T.4
-
61
-
-
77956376882
-
Anomaly extraction in backbone networks using association rules
-
ACM New York, NY, USA
-
D. Brauckhoff, X. Dimitropoulos, A. Wagner, and K. Salamatian Anomaly extraction in backbone networks using association rules IMC'09: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference 2009 ACM New York, NY, USA 28 34 http://dx.doi.org/10.1145/1644893.1644897
-
(2009)
IMC'09: Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference
, pp. 28-34
-
-
Brauckhoff, D.1
Dimitropoulos, X.2
Wagner, A.3
Salamatian, K.4
-
62
-
-
0043166339
-
Anomaly detection in ip networks
-
M. Thottan, and C. Ji Anomaly detection in ip networks IEEE Trans. Signal Process. 51 8 2003 2191 2204
-
(2003)
IEEE Trans. Signal Process.
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
63
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
ACM New York, NY, USA
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen Sketch-based change detection: methods, evaluation, and applications IMC'03: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement 2003 ACM New York, NY, USA 234 247 http://dx.doi.org/10.1145/948205.948236
-
(2003)
IMC'03: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
64
-
-
79955025451
-
Modeling spatial and temporal behavior of internet traffic anomalies
-
V. Bandara, A. Pezeshki, P. Anura, Modeling spatial and temporal behavior of internet traffic anomalies, in: 2010 IEEE 35th Conference on Local Computer Networks (LCN), 2010, pp. 384-391. doi: 10.1109/LCN.2010.5735749.
-
(2010)
2010 IEEE 35th Conference on Local Computer Networks (LCN)
, pp. 384-391
-
-
Bandara, V.1
Pezeshki, A.2
Anura, P.3
-
65
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
W. Lu, and A.A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J. Adv. Signal Process 2009 2009 4:1 4:16 10.1155/2009/837601
-
(2009)
EURASIP J. Adv. Signal Process
, vol.2009
, pp. 41-416
-
-
Lu, W.1
Ghorbani, A.A.2
-
67
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry Non-Gaussian and long memory statistical characterizations for internet traffic with anomalies IEEE Trans. Depend. Secur. Comput. 4 1 2007 56 70 http://dx.doi.org/10.1109/TDSC.2007.12
-
(2007)
IEEE Trans. Depend. Secur. Comput.
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
68
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
USENIX Association Berkeley, CA, USA < >
-
Y. Gu, A. McCallum, and D. Towsley Detecting anomalies in network traffic using maximum entropy estimation Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC'05 2005 USENIX Association Berkeley, CA, USA 32 < http://dl.acm.org/citation.cfm?id=1251086.1251118 >
-
(2005)
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC'05
, pp. 32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
69
-
-
79251558204
-
Detecting malicious network traffic using inverse distributions of packet contents
-
ACM New York, NY, USA
-
V. Karamcheti, D. Geiger, Z. Kedem, and S. Muthukrishnan Detecting malicious network traffic using inverse distributions of packet contents MineNet'05: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data 2005 ACM New York, NY, USA 165 170 http://dx.doi.org/10.1145/1080173.1080176
-
(2005)
MineNet'05: Proceedings of the 2005 ACM SIGCOMM Workshop on Mining Network Data
, pp. 165-170
-
-
Karamcheti, V.1
Geiger, D.2
Kedem, Z.3
Muthukrishnan, S.4
-
70
-
-
0036967463
-
Use of spectral analysis in defense against dos attacks
-
GLOBECOM'02 IEEE
-
C.-M. Cheng, H. Kung, and K.-S. Tan Use of spectral analysis in defense against dos attacks Global Telecommunications Conference, 2002 GLOBECOM'02 vol. 3 2002 IEEE 2143 2148 http://dx.doi.org/10.1109/GLOCOM.2002.1189011
-
(2002)
Global Telecommunications Conference, 2002
, vol.3
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.2
Tan, K.-S.3
-
71
-
-
84942256107
-
Statistical approaches to ddos attack detection and response
-
L. Feinstein, D. Schnackenberg, R. Balupari, D. Kindred, Statistical approaches to ddos attack detection and response, in: Proceedings of the DARPA Information Survivability Conference and Exposition, vol. 1, 2003, pp. 303-314. http://dx.doi.org/10.1109/DISCEX.2003.1194894.
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 303-314
-
-
Feinstein, L.1
Schnackenberg, D.2
Balupari, R.3
Kindred, D.4
-
73
-
-
84944486544
-
Prediction and entropy of printed english
-
C.E. Shannon Prediction and entropy of printed english Bell Syst. Tech. J. 30 1951 50 64
-
(1951)
Bell Syst. Tech. J.
, vol.30
, pp. 50-64
-
-
Shannon, C.E.1
-
75
-
-
0242637092
-
Detecting intrusion with rule-based integration of multiple models
-
S.-J. Han, and S.-B. Cho Detecting intrusion with rule-based integration of multiple models Comput. Secur. 22 7 2003 613 623 10.1016/S0167-4048(03)00711-9
-
(2003)
Comput. Secur.
, vol.22
, Issue.7
, pp. 613-623
-
-
Han, S.-J.1
Cho, S.-B.2
-
76
-
-
0032639421
-
Detecting intrusions using system calls: Alternative data models
-
C. Warrender, S. Forrest, B. Pearlmutter, Detecting intrusions using system calls: alternative data models, in: Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999, 1999, pp. 133-145. http://dx.doi.org/10.1109/SECPRI.1999.766910.
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
, pp. 133-145
-
-
Warrender, C.1
Forrest, S.2
Pearlmutter, B.3
-
77
-
-
0037209446
-
Host-based intrusion detection using dynamic and static behavioral models
-
D.-Y. Yeung, and Y. Ding Host-based intrusion detection using dynamic and static behavioral models Pattern Recogn. 36 2003 229 243
-
(2003)
Pattern Recogn.
, vol.36
, pp. 229-243
-
-
Yeung, D.-Y.1
Ding, Y.2
-
78
-
-
0023383894
-
Bispectrum estimation: A digital signal processing framework
-
C. Nikias, and M.R. Raghuveer Bispectrum estimation: a digital signal processing framework Proc. IEEE 75 7 1987 869 891 10.1109/PROC.1987.13824
-
(1987)
Proc. IEEE
, vol.75
, Issue.7
, pp. 869-891
-
-
Nikias, C.1
Raghuveer, M.R.2
-
79
-
-
84891348026
-
Internet traffic classification using energy time-frequency distributions
-
A. Marnerides, D. Pezaros, H. chul Kim, D. Hutchison, Internet traffic classification using energy time-frequency distributions, in: 2013 IEEE International Conference on Communications (ICC), 2013, pp. 2513-2518. http://dx.doi.org/10.1109/ICC.2013.6654911.
-
(2013)
2013 IEEE International Conference on Communications (ICC)
, pp. 2513-2518
-
-
Marnerides, A.1
Pezaros, D.2
Chul Kim, H.3
Hutchison, D.4
-
80
-
-
0024705330
-
Time-frequency distributions - A review
-
L. Cohen Time-frequency distributions - a review Proc. IEEE 77 7 1989 941 981 10.1109/5.30749
-
(1989)
Proc. IEEE
, vol.77
, Issue.7
, pp. 941-981
-
-
Cohen, L.1
-
81
-
-
59949095579
-
Network anomaly detection based on wavelet analysis
-
W. Lu, and A.A. Ghorbani Network anomaly detection based on wavelet analysis EURASIP J. Adv. Signal Process 2009 2009 4:1 4:16 10.1155/2009/837601
-
(2009)
EURASIP J. Adv. Signal Process
, vol.2009
, pp. 41-416
-
-
Lu, W.1
Ghorbani, A.A.2
-
82
-
-
0031222502
-
Proactive network-fault detection [telecommunications]
-
C. Hood, and C. Ji Proactive network-fault detection [telecommunications] IEEE Trans. Reliab. 46 3 1997 333 341 10.1109/24.664004
-
(1997)
IEEE Trans. Reliab.
, vol.46
, Issue.3
, pp. 333-341
-
-
Hood, C.1
Ji, C.2
-
83
-
-
77953098563
-
Anomaly detection through a bayesian support vector machine
-
V. Sotiris, P. Tse, and M. Pecht Anomaly detection through a bayesian support vector machine IEEE Trans. Reliab. 59 2 2010 277 286 10.1109/TR.2010.2048740
-
(2010)
IEEE Trans. Reliab.
, vol.59
, Issue.2
, pp. 277-286
-
-
Sotiris, V.1
Tse, P.2
Pecht, M.3
-
85
-
-
84928828986
-
Unsupervised two-class and multi-class support vector machines for abnormal traffic characterization
-
Seoul, South Korea
-
A.K. Marnerides, D. Pezaros, H. Kim, D. Hutchison, Unsupervised two-class and multi-class support vector machines for abnormal traffic characterization, in: 10th International Passive and Active Measurements Conference, PAM Conference Student Workshop, Seoul, South Korea, 2009.
-
(2009)
10th International Passive and Active Measurements Conference, PAM Conference Student Workshop
-
-
Marnerides, A.K.1
Pezaros, D.2
Kim, H.3
Hutchison, D.4
-
86
-
-
1242287724
-
A framework for classifying denial of service attacks
-
ACM New York, NY, USA
-
A. Hussain, J. Heidemann, and C. Papadopoulos A framework for classifying denial of service attacks SIGCOMM'03: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2003 ACM New York, NY, USA 99 110 http://dx.doi.org/10.1145/863955.863968
-
(2003)
SIGCOMM'03: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
87
-
-
39049161433
-
Identification of repeated denial of service attacks
-
IEEE Barcelona, Spain < >
-
A. Hussain, J. Heidemann, and C. Papadopoulos Identification of repeated denial of service attacks Proceedings of the IEEE Infocom 2006 IEEE Barcelona, Spain < http://www.isi.edu/johnh/PAPERS/Hussain06a.html >
-
(2006)
Proceedings of the IEEE Infocom
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
88
-
-
0011875790
-
Probability theory
-
fourth ed. Springer-Verlag vol. II
-
M. Loève Probability theory fourth ed. Graduate Texts in Mathematics vol. 46 1978 Springer-Verlag vol. II
-
(1978)
Graduate Texts in Mathematics
, vol.46
-
-
Loève, M.1
-
89
-
-
85024429815
-
A new approach to linear filtering and prediction problems
-
R. Kalman A new approach to linear filtering and prediction problems J. Basic Eng. 1 82 1960 35 45
-
(1960)
J. Basic Eng.
, vol.1
, Issue.82
, pp. 35-45
-
-
Kalman, R.1
-
91
-
-
84877644867
-
Towards the improvement of diagnostic metrics fault diagnosis for dsl-based iptv networks using the Renyi entropy
-
A. Marnerides, S. Malinowski, R. Morla, M. Rodrigues, H. Kim, Towards the improvement of diagnostic metrics fault diagnosis for dsl-based iptv networks using the Renyi entropy, in: Global Communications Conference (GLOBECOM), 2012 IEEE, 2012, pp. 2779-2784. http://dx.doi.org/10.1109/GLOCOM.2012.6503537.
-
(2012)
Global Communications Conference (GLOBECOM), 2012 IEEE
, pp. 2779-2784
-
-
Marnerides, A.1
Malinowski, S.2
Morla, R.3
Rodrigues, M.4
Kim, H.5
-
92
-
-
0033242934
-
Nonextensive statistics: Theoretical, experimental and computational evidences and connections
-
C. Tsallis Nonextensive statistics: theoretical, experimental and computational evidences and connections Braz. J. Phys. 29 cond-mat/9903356 1999 1 35
-
(1999)
Braz. J. Phys.
, vol.29
, pp. 1-35
-
-
Tsallis, C.1
-
93
-
-
84882950393
-
Botnet detection revisited: Theory and practice of finding malicious p2p networks via internet connection graphs
-
S. Ruehrup, P. Urbano, A. Berger, A. D'Alconzo, Botnet detection revisited: theory and practice of finding malicious p2p networks via internet connection graphs, in: 2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2013, pp. 435-440. http://dx.doi.org/10.1109/INFCOMW.2013.6562902.
-
(2013)
2013 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
, pp. 435-440
-
-
Ruehrup, S.1
Urbano, P.2
Berger, A.3
D'Alconzo, A.4
-
94
-
-
1242308107
-
Fast accurate computation of large-scale ip traffic matrices from link loads
-
ACM New York, NY, USA
-
Y. Zhang, M. Roughan, N. Duffield, and A. Greenberg Fast accurate computation of large-scale ip traffic matrices from link loads Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS'03 2003 ACM New York, NY, USA 206 217 http://dx.doi.org/10.1145/781027.781053
-
(2003)
Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS'03
, pp. 206-217
-
-
Zhang, Y.1
Roughan, M.2
Duffield, N.3
Greenberg, A.4
-
96
-
-
84878724535
-
-
The Dag Project < http://dag.cs.waikato.ac.nz >.
-
The Dag Project
-
-
-
97
-
-
34748873994
-
SNMP traffic analysis: Approaches, tools, and first results
-
IEEE Computer Society Press Piscataway < >
-
J. Schönwälder, A. Pras, M. Harvan, J. Schippers, and R.M. van de SNMP traffic analysis: approaches, tools, and first results Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management, IM'07 2007 IEEE Computer Society Press Piscataway 324 332 < http://doc.utwente.nl/64390/ >
-
(2007)
Proceedings of the 10th IFIP/IEEE International Symposium on Integrated Network Management, IM'07
, pp. 324-332
-
-
Schönwälder, J.1
Pras, A.2
Harvan, M.3
Schippers, J.4
Van De, R. M.5
-
100
-
-
70349259625
-
-
Ipsumdump Tool < http://www.cs.ucla.edu/kohler/ipsumdump/ >.
-
Ipsumdump Tool
-
-
-
101
-
-
84907497163
-
-
Caida's Coralreef Tool < http://www.caida.org/tools/measurement/coralreef/ >.
-
Caida's Coralreef Tool
-
-
-
102
-
-
84885406311
-
-
Wireshark < http://www.wireshark.org >.
-
Wireshark
-
-
-
103
-
-
84907497162
-
-
Snort ad Tool < http://anomalydetection.info/ >.
-
Snort Ad Tool
-
-
|