-
1
-
-
0003685012
-
The Mathematical Theory of Communication
-
Chicago, NY: Univ. Illinois Press
-
C. E. Shannon and W. Weaver, The Mathematical Theory of Communication. Chicago, NY: Univ. Illinois Press, 1949.
-
(1949)
-
-
Shannon, C.E.1
Weaver, W.2
-
2
-
-
0004188848
-
Elements of Information Theory, ser
-
Wiley Series in Telecommunications. New York: Wiley
-
T. Cover and J. Thomas, Elements of Information Theory, ser. Wiley Series in Telecommunications. New York: Wiley, 1991.
-
(1991)
-
-
Cover, T.1
Thomas, J.2
-
3
-
-
0029392293
-
A parameterizable methodology for internet traffic flow profiling
-
Oct
-
K. Claffy, H.-W. Braun, and G. Polyzos, “A parameterizable methodology for internet traffic flow profiling,” IEEE J. Sel. Areas Commun., vol. 13, no. 8, pp. 1481–1494, Oct. 1995.
-
(1995)
IEEE J. Sel. Areas Commun
, vol.13
, Issue.8
, pp. 1481-1494
-
-
Claffy, K.1
Braun, H.-W.2
Polyzos, G.3
-
4
-
-
1242310086
-
Automatically inferring patterns of resource consumption in network traffic
-
Sep
-
C. Estan, S. Savage, and G. Varghese, “Automatically inferring patterns of resource consumption in network traffic,” in Proc. ACM SIGCOMM, Sep. 2003, pp. 137–148.
-
(2003)
Proc. ACM SIGCOMM
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
5
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
Aug
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, “Profiling internet backbone traffic: Behavior models and applications,” in Proc. ACM SIGCOMM, Aug. 2005, pp. 169–180.
-
(2005)
Proc. ACM SIGCOMM
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
6
-
-
0004188153
-
Information Theory: Structural Models for Qualitative Data
-
Thousand Oaks, CA: Sage
-
K. Krippendorff, Information Theory: Structural Models for Qualitative Data. Thousand Oaks, CA: Sage, 1986.
-
(1986)
-
-
Krippendorff, K.1
-
7
-
-
0018655277
-
Reconstructability analysis of multi-dimensional relations: A theoretical basis for computer-aided determination of acceptable systems models
-
R. Cavallo and G. Klir, “Reconstructability analysis of multi-dimensional relations: A theoretical basis for computer-aided determination of acceptable systems models,” Int. J. General Syst., vol. 5, pp. 143–171, 1979.
-
(1979)
Int. J. General Syst
, vol.5
, pp. 143-171
-
-
Cavallo, R.1
Klir, G.2
-
8
-
-
1342294716
-
An overview of reconstructability analysis
-
M. Zwick, “An overview of reconstructability analysis,” Int. J. Syst. Cybern., vol. 33, pp. 877–905, 2004.
-
(2004)
Int. J. Syst. Cybern
, vol.33
, pp. 877-905
-
-
Zwick, M.1
-
9
-
-
4043129651
-
Graphical models
-
M. Jordan, “Graphical models,” Statist. Sci., Special Issue Bayesian Statistics, vol. 19, pp. 140–155, 2004.
-
(2004)
Statist. Sci., Special Issue Bayesian Statistics
, vol.19
, pp. 140-155
-
-
Jordan, M.1
-
11
-
-
78650149893
-
Reducing unwanted traffic in a backbone network
-
Jul
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, “Reducing unwanted traffic in a backbone network,” in Proc. Steps Reducing Unwanted Traffic Internet Workshop (SRUTI), Jul. 2005, pp. 9–15.
-
(2005)
Proc. Steps Reducing Unwanted Traffic Internet Workshop (SRUTI)
, pp. 9-15
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
12
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch-based change detection: Methods, evaluation, and applications,” in Proc. ACM/USENIX IMC, 2003, pp. 234–247.
-
(2003)
Proc. ACM/USENIX IMC
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
13
-
-
85012186650
-
Finding hierarchical heavy hitters in data streams
-
G. Cormode, F. Korn, S. Muthukrishnan, and D. Srivastava, “Finding hierarchical heavy hitters in data streams,” in Proc. VLDB, 2003, pp. 464–474.
-
(2003)
Proc. VLDB
, pp. 464-474
-
-
Cormode, G.1
Korn, F.2
Muthukrishnan, S.3
Srivastava, D.4
-
14
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney, “Practical automated detection of stealthy portscans,” J. Comput. Security, vol. 10, pp. 105–136, 2002.
-
(2002)
J. Comput. Security
, vol.10
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
15
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishna, “Fast portscan detection using sequential hypothesis testing,” in Proc. IEEE Symp. Security Privacy, 2004, pp. 211–225.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishna, H.4
-
16
-
-
14944356227
-
Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications
-
Y. Zhang, S. Singh, S. Sen, N. Duffield, and C. Lund, “Online identification of hierarchical heavy hitters: Algorithms, evaluation, and applications,” in Proc. Internet Meas. Conf., 2004, pp. 101–114.
-
(2004)
Proc. Internet Meas. Conf
, pp. 101-114
-
-
Zhang, Y.1
Singh, S.2
Sen, S.3
Duffield, N.4
Lund, C.5
-
17
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
Mar
-
M. Mahoney, “Network traffic anomaly detection based on packet bytes,” in Proc. ACM Symp. Appl. Comput., Mar. 2003, pp. 346–350.
-
(2003)
Proc. ACM Symp. Appl. Comput
, pp. 346-350
-
-
Mahoney, M.1
-
18
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, “Flash crowds and denial of service attacks: Characterization and implications for CDNs and web sites,” in Proc. Int. WWW Conf, 2002, pp. 293–304.
-
(2002)
Proc. Int. WWW Conf
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
19
-
-
12244311689
-
A taxonomy of computer worms
-
N. Weaver, V. Paxon, S. Staniford, and R. Cunningham, “A taxonomy of computer worms,” in Proc. CCS Workshop Rapid Malcode (WORM), 2003, pp. 11–18.
-
(2003)
Proc. CCS Workshop Rapid Malcode (WORM)
, pp. 11-18
-
-
Weaver, N.1
Paxon, V.2
Staniford, S.3
Cunningham, R.4
-
20
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
V. Yegneswaran, P. Barford, and J. Ullrich, “Internet intrusions: Global characteristics and prevalence,” in Proc. ACM SIGMETRICS, 2003, pp. 138–147.
-
(2003)
Proc. ACM SIGMETRICS
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
-
21
-
-
14944369649
-
Characteristics of internet background radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, “Characteristics of internet background radiation,” in Proc. ACM SIG-COMM IMC, 2004, pp. 27–40.
-
(2004)
Proc. ACM SIG-COMM IMC
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
22
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
A. Lakhina, M. Crovella, and C. Diot, “Diagnosing network-wide traffic anomalies,” in Proc. ACM SIGCOMM, 2004, pp. 219–230.
-
(2004)
Proc. ACM SIGCOMM
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
23
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
A. Lakhina, M. Crovella, and C. Diot, “Characterization of network-wide anomalies in traffic flows,” in Proc. IMC, 2004, pp. 201–206.
-
(2004)
Proc. IMC
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
24
-
-
0038223829
-
Minnesota Intrusion Detection System
-
[Online]. Available:
-
MINDS, Minnesota Intrusion Detection System. [Online]. Available: http://www.cs.umn.edu/research/minds/
-
-
-
-
25
-
-
12244285117
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, L. Ertoz, A. Ozgur, J. Srivastava, and V. Kumar, “A comparative study of anomaly detection schemes in network intrusion detection,” in Proc. SIAM Conf. Data Mining, 2003, pp. 25–36.
-
(2003)
Proc. SIAM Conf. Data Mining
, pp. 25-36
-
-
Lazarevic, A.1
Ertoz, L.2
Ozgur, A.3
Srivastava, J.4
Kumar, V.5
-
26
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
W. Lee and D. Xiang, “Information-theoretic measures for anomaly detection,” in Proc. IEEE Symp. Security Privacy, 2001, pp. 130–143.
-
(2001)
Proc. IEEE Symp. Security Privacy
, pp. 130-143
-
-
Lee, W.1
Xiang, D.2
-
27
-
-
17744390868
-
Real-time detection of hidden traffic patterns
-
Oct
-
F. Hao, M. Kodialam, and T. Lakshman, “Real-time detection of hidden traffic patterns,” in Proc. ICNP, Oct. 2004, pp. 340–349.
-
(2004)
Proc. ICNP
, pp. 340-349
-
-
Hao, F.1
Kodialam, M.2
Lakshman, T.3
-
28
-
-
33751042906
-
Statistical clustering of internet communication patterns
-
F. Hernandez-Campos, A. B. Nobel, F. D. Smith, and K. Jeffay, “Statistical clustering of internet communication patterns,” in Proc. Symp. Interface Computing Sci. Statistics, 2003, p. 134.
-
(2003)
Proc. Symp. Interface Computing Sci. Statistics
, pp. 134
-
-
Hernandez-Campos, F.1
Nobel, A.B.2
Smith, F.D.3
Jeffay, K.4
-
29
-
-
35248879179
-
Behavior profiling of email
-
S. J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, and C. Hu, “Behavior profiling of email,” in Proc. NSF/NIJ Symp. Intell. Security Informatics, 2003, pp. 74–90.
-
(2003)
Proc. NSF/NIJ Symp. Intell. Security Informatics
, pp. 74-90
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
Hu, C.5
-
30
-
-
33847303101
-
BLINC: Multi-level traffic classification in the dark
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, “BLINC: Multi-level traffic classification in the dark,” in Proc. ACM SIGCOMM, 2005, pp. 229–240.
-
(2005)
Proc. ACM SIGCOMM
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
31
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Aug
-
A. Lakhina, M. Crovella, and C. Diot, “Mining anomalies using traffic feature distributions,” in Proc. ACM SIGCOMM, Aug. 2005, pp. 217–228.
-
(2005)
Proc. ACM SIGCOMM
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
32
-
-
36048955492
-
A real-time network traffic profiling system
-
June
-
K. Xu, F. Wang, S. Bhattacharyya, and Z.-L. Zhang, “A real-time network traffic profiling system,” in Proc. Int. Conf. Dependable Syste. Netw., June 2007, pp. 595–605.
-
(2007)
Proc. Int. Conf. Dependable Syste. Netw
, pp. 595-605
-
-
Xu, K.1
Wang, F.2
Bhattacharyya, S.3
Zhang, Z.-L.4
|