메뉴 건너뛰기




Volumn 16, Issue 6, 2008, Pages 1241-1252

Internet Traffic Behavior Profiling for Network Security Monitoring

Author keywords

Anomaly behavior; monitoring; traffic profiling

Indexed keywords


EID: 85008008496     PISSN: 10636692     EISSN: 15582566     Source Type: Journal    
DOI: 10.1109/TNET.2007.911438     Document Type: Article
Times cited : (91)

References (32)
  • 1
    • 0003685012 scopus 로고
    • The Mathematical Theory of Communication
    • Chicago, NY: Univ. Illinois Press
    • C. E. Shannon and W. Weaver, The Mathematical Theory of Communication. Chicago, NY: Univ. Illinois Press, 1949.
    • (1949)
    • Shannon, C.E.1    Weaver, W.2
  • 2
    • 0004188848 scopus 로고
    • Elements of Information Theory, ser
    • Wiley Series in Telecommunications. New York: Wiley
    • T. Cover and J. Thomas, Elements of Information Theory, ser. Wiley Series in Telecommunications. New York: Wiley, 1991.
    • (1991)
    • Cover, T.1    Thomas, J.2
  • 3
    • 0029392293 scopus 로고
    • A parameterizable methodology for internet traffic flow profiling
    • Oct
    • K. Claffy, H.-W. Braun, and G. Polyzos, “A parameterizable methodology for internet traffic flow profiling,” IEEE J. Sel. Areas Commun., vol. 13, no. 8, pp. 1481–1494, Oct. 1995.
    • (1995) IEEE J. Sel. Areas Commun , vol.13 , Issue.8 , pp. 1481-1494
    • Claffy, K.1    Braun, H.-W.2    Polyzos, G.3
  • 4
    • 1242310086 scopus 로고    scopus 로고
    • Automatically inferring patterns of resource consumption in network traffic
    • Sep
    • C. Estan, S. Savage, and G. Varghese, “Automatically inferring patterns of resource consumption in network traffic,” in Proc. ACM SIGCOMM, Sep. 2003, pp. 137–148.
    • (2003) Proc. ACM SIGCOMM , pp. 137-148
    • Estan, C.1    Savage, S.2    Varghese, G.3
  • 5
    • 33750711125 scopus 로고    scopus 로고
    • Profiling internet backbone traffic: Behavior models and applications
    • Aug
    • K. Xu, Z.-L. Zhang, and S. Bhattacharyya, “Profiling internet backbone traffic: Behavior models and applications,” in Proc. ACM SIGCOMM, Aug. 2005, pp. 169–180.
    • (2005) Proc. ACM SIGCOMM , pp. 169-180
    • Xu, K.1    Zhang, Z.-L.2    Bhattacharyya, S.3
  • 6
    • 0004188153 scopus 로고
    • Information Theory: Structural Models for Qualitative Data
    • Thousand Oaks, CA: Sage
    • K. Krippendorff, Information Theory: Structural Models for Qualitative Data. Thousand Oaks, CA: Sage, 1986.
    • (1986)
    • Krippendorff, K.1
  • 7
    • 0018655277 scopus 로고
    • Reconstructability analysis of multi-dimensional relations: A theoretical basis for computer-aided determination of acceptable systems models
    • R. Cavallo and G. Klir, “Reconstructability analysis of multi-dimensional relations: A theoretical basis for computer-aided determination of acceptable systems models,” Int. J. General Syst., vol. 5, pp. 143–171, 1979.
    • (1979) Int. J. General Syst , vol.5 , pp. 143-171
    • Cavallo, R.1    Klir, G.2
  • 8
    • 1342294716 scopus 로고    scopus 로고
    • An overview of reconstructability analysis
    • M. Zwick, “An overview of reconstructability analysis,” Int. J. Syst. Cybern., vol. 33, pp. 877–905, 2004.
    • (2004) Int. J. Syst. Cybern , vol.33 , pp. 877-905
    • Zwick, M.1
  • 12
    • 14944367082 scopus 로고    scopus 로고
    • Sketch-based change detection: Methods, evaluation, and applications
    • B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch-based change detection: Methods, evaluation, and applications,” in Proc. ACM/USENIX IMC, 2003, pp. 234–247.
    • (2003) Proc. ACM/USENIX IMC , pp. 234-247
    • Krishnamurthy, B.1    Sen, S.2    Zhang, Y.3    Chen, Y.4
  • 13
  • 14
    • 0036090327 scopus 로고    scopus 로고
    • Practical automated detection of stealthy portscans
    • S. Staniford, J. Hoagland, and J. McAlerney, “Practical automated detection of stealthy portscans,” J. Comput. Security, vol. 10, pp. 105–136, 2002.
    • (2002) J. Comput. Security , vol.10 , pp. 105-136
    • Staniford, S.1    Hoagland, J.2    McAlerney, J.3
  • 16
    • 14944356227 scopus 로고    scopus 로고
    • Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
    • Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund, “Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications,” in Proc. Internet Meas. Conf., 2004, pp. 101–114.
    • (2004) Proc. Internet Meas. Conf , pp. 101-114
    • Zhang, Y.1    Singh, S.2    Sen, S.3    Duffield, N.4    Lund, C.5
  • 17
    • 0037661195 scopus 로고    scopus 로고
    • Network traffic anomaly detection based on packet bytes
    • Mar
    • M. Mahoney, “Network traffic anomaly detection based on packet bytes,” in Proc. ACM Symp. Appl. Comput., Mar. 2003, pp. 346–350.
    • (2003) Proc. ACM Symp. Appl. Comput , pp. 346-350
    • Mahoney, M.1
  • 18
    • 77953077374 scopus 로고    scopus 로고
    • Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
    • J. Jung, B. Krishnamurthy, and M. Rabinovich, “Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites,” in Proc. Int. WWW Conf, 2002, pp. 293–304.
    • (2002) Proc. Int. WWW Conf , pp. 293-304
    • Jung, J.1    Krishnamurthy, B.2    Rabinovich, M.3
  • 20
    • 33646179175 scopus 로고    scopus 로고
    • Internet intrusions: Global characteristics and prevalence
    • V. Yegneswaran, P. Barford, and J. Ullrich, “Internet intrusions: Global characteristics and prevalence,” in Proc. ACM SIGMETRICS, 2003, pp. 138–147.
    • (2003) Proc. ACM SIGMETRICS , pp. 138-147
    • Yegneswaran, V.1    Barford, P.2    Ullrich, J.3
  • 22
    • 21844451952 scopus 로고    scopus 로고
    • Diagnosing network-wide traffic anomalies
    • A. Lakhina, M. Crovella, and C. Diot, “Diagnosing network-wide traffic anomalies,” in Proc. ACM SIGCOMM, 2004, pp. 219–230.
    • (2004) Proc. ACM SIGCOMM , pp. 219-230
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 23
    • 14944367267 scopus 로고    scopus 로고
    • Characterization of network-wide anomalies in traffic flows
    • A. Lakhina, M. Crovella, and C. Diot, “Characterization of network-wide anomalies in traffic flows,” in Proc. IMC, 2004, pp. 201–206.
    • (2004) Proc. IMC , pp. 201-206
    • Lakhina, A.1    Crovella, M.2    Diot, C.3
  • 24
    • 0038223829 scopus 로고    scopus 로고
    • Minnesota Intrusion Detection System
    • [Online]. Available:
    • MINDS, Minnesota Intrusion Detection System. [Online]. Available: http://www.cs.umn.edu/research/minds/
  • 26
    • 0034836392 scopus 로고    scopus 로고
    • Information-theoretic measures for anomaly detection
    • W. Lee and D. Xiang, “Information-theoretic measures for anomaly detection,” in Proc. IEEE Symp. Security Privacy, 2001, pp. 130–143.
    • (2001) Proc. IEEE Symp. Security Privacy , pp. 130-143
    • Lee, W.1    Xiang, D.2
  • 27
    • 17744390868 scopus 로고    scopus 로고
    • Real-time detection of hidden traffic patterns
    • Oct
    • F. Hao, M. Kodialam, and T. Lakshman, “Real-time detection of hidden traffic patterns,” in Proc. ICNP, Oct. 2004, pp. 340–349.
    • (2004) Proc. ICNP , pp. 340-349
    • Hao, F.1    Kodialam, M.2    Lakshman, T.3
  • 30
  • 31
    • 33847290520 scopus 로고    scopus 로고
    • Mining anomalies using traffic feature distributions
    • Aug
    • A. Lakhina, M. Crovella, and C. Diot, “Mining anomalies using traffic feature distributions,” in Proc. ACM SIGCOMM, Aug. 2005, pp. 217–228.
    • (2005) Proc. ACM SIGCOMM , pp. 217-228
    • Lakhina, A.1    Crovella, M.2    Diot, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.