메뉴 건너뛰기




Volumn 11, Issue 4, 2015, Pages 662-674

Scorpius: sFlow network anomaly simulator

Author keywords

Anomaly; Flows; Network management; Scorpius; Simulation

Indexed keywords


EID: 84946412609     PISSN: 15493636     EISSN: None     Source Type: Journal    
DOI: 10.3844/jcssp.2015.662.674     Document Type: Article
Times cited : (7)

References (37)
  • 1
    • 84855596504 scopus 로고    scopus 로고
    • Development of an algorithm for fiber-to-the-home passive optical network automatic self-restoration scheme using access control system
    • Ab-Rahman, S.M. and S.R.A. Mahir, 2011. Development of an algorithm for fiber-to-the-home passive optical network automatic self-restoration scheme using access control system. J. Comput. Sci., 7: 1846-1853. DOI: 10.3844/jcssp.2011.1846.1853
    • (2011) J. Comput. Sci , vol.7 , pp. 1846-1853
    • Ab-Rahman, S.M.1    Mahir, S.R.A.2
  • 2
    • 0000004140 scopus 로고
    • Measurement in medicine: The analysis of method comparison studies
    • Altman, D.G. and J.M. Bland, 1983. Measurement in medicine: The analysis of method comparison studies. J. Royal Statistical Society, 32: 307-317. DOI: 10.2307/2987937
    • (1983) J. Royal Statistical Society , vol.32 , pp. 307-317
    • Altman, D.G.1    Bland, J.M.2
  • 4
    • 39349111817 scopus 로고    scopus 로고
    • Intelligent flow-based sampling for effective network anomaly detection
    • Nov. 26-30, IEEE Xplore Press, Washington
    • Androulidakis, G. and S. Papavassiliou, 2007. Intelligent flow-based sampling for effective network anomaly detection. Proceedings of the IEEE Global Telecommunications Conference, Nov. 26-30, IEEE Xplore Press, Washington, pp: 1948-1953. DOI: 10.1109/GLOCOM.2007.374
    • (2007) Proceedings of the IEEE Global Telecommunications Conference , pp. 1948-1953
    • Androulidakis, G.1    Papavassiliou, S.2
  • 6
  • 7
    • 84893496533 scopus 로고    scopus 로고
    • Aberrant behavior detection in time series for network monitoring
    • (Dec. 3-8), USENIX Association, USA
    • Brutlag, J.D., 2000. Aberrant behavior detection in time series for network monitoring. Proceedings of the 14th Systems Administration Conference, (Dec. 3-8), USENIX Association, USA, pp: 139-146.
    • (2000) Proceedings of the 14th Systems Administration Conference , pp. 139-146
    • Brutlag, J.D.1
  • 9
    • 84916624305 scopus 로고    scopus 로고
    • Digital signature of network segment for healthcare environments support
    • Carvalho, L.F., G. Fernandes Jr., M.V.O. de Assis, J.J.P.C. Rodrigues and M.L. Proença Jr., 2014. Digital signature of network segment for healthcare environments support. IRBM, 35: 299-309. DOI: 10.1016/j.irbm.2014.09.001
    • (2014) IRBM , vol.35 , pp. 299-309
    • Carvalho, L.F.1    Fernandes, G.2    de Assis, M.V.O.3    Rodrigues, J.J.P.C.4    Proença, M.L.5
  • 10
    • 84893382978 scopus 로고    scopus 로고
    • Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection
    • Telecommunications and Computer Networks, Sep. 18-20, IEEE Xplore Press, Primosten
    • Carvalho, L.F., J.J.P.C. Rodrigues, S. Barbon and M.L. Proenca, 2013. Using ant colony optimization metaheuristic and dynamic time warping for anomaly detection. Proceedings of the 21st International Conference on Software, Telecommunications and Computer Networks, Sep. 18-20, IEEE Xplore Press, Primosten, pp: 1-5. DOI: 10.1109/SoftCOM.2013.6671906
    • (2013) Proceedings of the 21st International Conference on Software , pp. 1-5
    • Carvalho, L.F.1    Rodrigues, J.J.P.C.2    Barbon, S.3    Proenca, M.L.4
  • 11
    • 84946427162 scopus 로고    scopus 로고
    • Scorpius-sFlow Anomaly Simulator (version 1.0)
    • Brazil
    • de Assis, M.V.O., 2014. Scorpius-sFlow Anomaly Simulator (version 1.0). JAVA. Brazil.
    • (2014) JAVA
    • de Assis, M.V.O.1
  • 12
    • 84904103233 scopus 로고    scopus 로고
    • A novel anomaly detection system based on seven-dimensional flow analysis
    • Dec. 9-13, IEEE Xplore Press, Atlanta
    • de Assis, M.V.O., J.J.P.C. Rodrigues and M.L. Proença Jr., 2013. A novel anomaly detection system based on seven-dimensional flow analysis. Proceedings of the IEEE Global Communications Conference, Dec. 9-13, IEEE Xplore Press, Atlanta, pp: 735-740. DOI: 10.1109/GLOCOM.2013.6831160
    • (2013) Proceedings of the IEEE Global Communications Conference , pp. 735-740
    • de Assis, M.V.O.1    Rodrigues, J.J.P.C.2    Proença, M.L.3
  • 13
    • 84901825380 scopus 로고    scopus 로고
    • A seven-dimensional flow analysis to help autonomous network management
    • de Assis, M.V.O., J.J.P.C. Rodrigues and M.L. Proença Jr., 2014. A seven-dimensional flow analysis to help autonomous network management. Inform. Sci., 278: 900-913. DOI: 10.1016/j.ins.2014.03.102
    • (2014) Inform. Sci , vol.278 , pp. 900-913
    • de Assis, M.V.O.1    Rodrigues, J.J.P.C.2    Proença, M.L.3
  • 14
    • 84891355510 scopus 로고    scopus 로고
    • Digital signature to help network management using principal component analysis and k-means clustering
    • Jun. 9-13, IEEE Xplore Press, Budapest
    • Fernandes, G., A.M. Zacaron, J.J.P.C. Rodrigues and M.L. Proenca, 2013. Digital signature to help network management using principal component analysis and k-means clustering. Proceedings of the IEEE International Conference on Communications, Jun. 9-13, IEEE Xplore Press, Budapest, pp: 2519-2523. DOI: 10.1109/ICC.2013.6654912
    • (2013) Proceedings of the IEEE International Conference on Communications , pp. 2519-2523
    • Fernandes, G.1    Zacaron, A.M.2    Rodrigues, J.J.P.C.3    Proenca, M.L.4
  • 16
    • 84867243953 scopus 로고    scopus 로고
    • Global detection of DDoS attack based on time and frequency analysis
    • Circuits and Systems, Jul. 11-13, IEEE Xploer Press, Kokura
    • Hua, L., H. Guang-min and Y. Xing-miao, 2007. Global detection of DDoS attack based on time and frequency analysis. Proceedings of the International Conference on Communications, Circuits and Systems, Jul. 11-13, IEEE Xploer Press, Kokura, pp: 462-466. DOI: 10.1109/ICCCAS.2007.6251606
    • (2007) Proceedings of the International Conference on Communications , pp. 462-466
    • Hua, L.1    Guang-min, H.2    Xing-miao, Y.3
  • 17
    • 67249121449 scopus 로고    scopus 로고
    • A framework for network state management in the next-generation internet architecture
    • Nov. 30-Dec. 4, IEEE Xplore Press, New Orleans
    • Huang, X., S. Ganapathy and T. Wolf, 2008. A framework for network state management in the next-generation internet architecture. Proceedings of the IEEE Global Telecommunications Conference, Nov. 30-Dec. 4, IEEE Xplore Press, New Orleans, pp: 1-5. DOI: 10.1109/GLOCOM.2008.ECP.435
    • (2008) Proceedings of the IEEE Global Telecommunications Conference , pp. 1-5
    • Huang, X.1    Ganapathy, S.2    Wolf, T.3
  • 19
    • 80052163345 scopus 로고    scopus 로고
    • An accurate sampling scheme for detecting SYN flooding attacks and portscans
    • Jun. 5-9, IEEE Xplore Press, Kyoto
    • Korczynski, M., L. Janowski and A. Duda, 2011. An accurate sampling scheme for detecting SYN flooding attacks and portscans. Proceedings of the IEEE International Conference on Communications, Jun. 5-9, IEEE Xplore Press, Kyoto, pp: 1-5. DOI: 10.1109/icc.2011.5962593
    • (2011) Proceedings of the IEEE International Conference on Communications , pp. 1-5
    • Korczynski, M.1    Janowski, L.2    Duda, A.3
  • 20
    • 49749101200 scopus 로고    scopus 로고
    • Cyber attack modeling and simulation for network security analysis
    • Dec. 9-12, IEEE Xplore Press, Washington
    • Kuhl, M.E., J. Kistner, K. Costantini and M. Sudit, 2007. Cyber attack modeling and simulation for network security analysis. Proceedings of the Winter Simulation Conference, Dec. 9-12, IEEE Xplore Press, Washington, pp: 1180-1188. DOI: 10.1109/WSC.2007.4419720
    • (2007) Proceedings of the Winter Simulation Conference , pp. 1180-1188
    • Kuhl, M.E.1    Kistner, J.2    Costantini, K.3    Sudit, M.4
  • 25
    • 84908199123 scopus 로고    scopus 로고
    • Anomaly detection using digital signature of network segment with adaptive arima model and paraconsistent logic."
    • Jun. 23-16, IEEE Xplore Press, Funchal
    • Pena, E.H.M., S. Barbon, J.J.P.C. Rodrigues and M.L. Proença Jr., 2014b. Anomaly detection using digital signature of network segment with adaptive arima model and paraconsistent logic." Proceedings of the IEEE Symposium on Computers and Communication, Jun. 23-16, IEEE Xplore Press, Funchal, pp: 1-6. DOI: 10.1109/ISCC.2014.6912503
    • (2014) Proceedings of the IEEE Symposium on Computers and Communication , pp. 1-6
    • Pena, E.H.M.1    Barbon, S.2    Rodrigues, J.J.P.C.3    Proença, M.L.4
  • 26
    • 84880127634 scopus 로고    scopus 로고
    • Data integrity proof and secure computation in cloud computing
    • Ponnuramu, V. and L. Tamilselvan, 2012. Data integrity proof and secure computation in cloud computing. J. Comput. Sci., 8: 1987-1995. DOI: 10.3844/jcssp.2012.1987.1995
    • (2012) J. Comput. Sci , vol.8 , pp. 1987-1995
    • Ponnuramu, V.1    Tamilselvan, L.2
  • 27
    • 84946405794 scopus 로고    scopus 로고
    • Intense School, NFOSEC Institute
    • Praetox Technologies, 2010. Low Orbit Ion Cannon. Intense School, NFOSEC Institute.
    • (2010) Low Orbit Ion Cannon
  • 28
    • 84894549552 scopus 로고    scopus 로고
    • Distributive power migration and management algorithm for cloud environment
    • Prakash, P., G. Kousalya, S.K. Vasudevan and K.K. Rangaraju, 2014. Distributive power migration and management algorithm for cloud environment. J. Comput. Sci., 10: 484-491. DOI: 10.3844/jcssp.2014.484.491
    • (2014) J. Comput. Sci , vol.10 , pp. 484-491
    • Prakash, P.1    Kousalya, G.2    Vasudevan, S.K.3    Rangaraju, K.K.4
  • 29
    • 34250779136 scopus 로고    scopus 로고
    • The Hurst Parameter for Digital Signature of Network Segment
    • J.N. de Souza, P. Dini and P. Lorenz (Eds.), Springer Berlin Heidelberg, Brazil
    • Proença Jr., M.L., C. Coppelmans, M. Bottoli, A. Alberti and L.S. Mendes, 2004. The Hurst Parameter for Digital Signature of Network Segment. In: Telecommunications and Networking-ICT 2004, J.N. de Souza, P. Dini and P. Lorenz (Eds.), Springer Berlin Heidelberg, Brazil, ISBN-10: 978-3-540-27824-5, pp: 772-781.
    • (2004) Telecommunications and Networking-ICT 2004 , pp. 772-781
    • Proença, M.L.1    Coppelmans, C.2    Bottoli, M.3    Alberti, A.4    Mendes, L.S.5
  • 32
    • 0002947255 scopus 로고    scopus 로고
    • A mathematical theory of communication
    • Shannon, C.E., 2001. A mathematical theory of communication. SIGMOBILE Mobile Comput. Commun. Rev., 5: 3-55. DOI: 10.1145/584091.584093
    • (2001) SIGMOBILE Mobile Comput. Commun. Rev , vol.5 , pp. 3-55
    • Shannon, C.E.1
  • 33
    • 17744362921 scopus 로고    scopus 로고
    • A simple and intuitive simulation tool for analyzing emergency department operations
    • Dec. 5-8, IEEE Xplore Press
    • Sinreich, D. and Y.N. Marmor, 2004. A simple and intuitive simulation tool for analyzing emergency department operations. Proceedings of the Winter Simulation Conference, Dec. 5-8, IEEE Xplore Press, pp: 1994-2002. DOI: 10.1109/WSC.2004.1371561
    • (2004) Proceedings of the Winter Simulation Conference , pp. 1994-2002
    • Sinreich, D.1    Marmor, Y.N.2
  • 34
    • 84871996169 scopus 로고    scopus 로고
    • Identifying standardization opportunities of an operator-driven, framework for unifying autonomic network and service management
    • IEEE Xplore Press, Ottawa
    • Tsagkaris, K., A. Galani, P. Demestichas, G. Nguengang and M. Bouet et al., 2012. Identifying standardization opportunities of an operator-driven, framework for unifying autonomic network and service management. Proceedings of the IEEE International Conference on Communications, IEEE Xplore Press, Ottawa, pp: 6921-6925. DOI: 10.1109/ICC.2012.6364850
    • (2012) Proceedings of the IEEE International Conference on Communications , pp. 6921-6925
    • Tsagkaris, K.1    Galani, A.2    Demestichas, P.3    Nguengang, G.4    Bouet, M.5
  • 36
    • 34250755328 scopus 로고    scopus 로고
    • Anomaly detection aiming pro-active management of computer network based on digital signature of network segment
    • Zarpelão, B.B., L.D.S. Mendes and M.L. Proença Jr.,2007. Anomaly detection aiming pro-active management of computer network based on digital signature of network segment. J. Netw. Syst. Manage., 15: 267-83. DOI: 10.1007/s10922-007-9064-y
    • (2007) J. Netw. Syst. Manage , vol.15 , pp. 267-283
    • Zarpelão, B.B.1    Mendes, L.D.S.2    Proença, M.L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.