-
1
-
-
14944367267
-
Characterization of networkwide anomalies in traffic flows
-
ser. IMC '04. New York, NY, USA: ACM, [Online]
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of networkwide anomalies in traffic flows," in Proceedings of the 4th ACM SIGCOMM conference on Internet measurement ser. IMC '04. New York, NY, USA: ACM, 2004, pp. 201-206. [Online]. Available: http://doi.acm.org/10.1145/1028788.1028813
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
4
-
-
77949701174
-
Anomaly detection by clustering in the network
-
F. Guo, Y. Yang, and L. Duan, "Anomaly detection by clustering in the network," in Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on 2009, pp. 1-4.
-
(2009)
Computational Intelligence and Software Engineering, 2009. CiSE 2009. International Conference on
, pp. 1-4
-
-
Guo, F.1
Yang, Y.2
Duan, L.3
-
5
-
-
77649326381
-
Entropy based method for network anomaly detection
-
ser. PRDC '09. Washington, DC, USA: IEEE Computer Society, [Online]
-
Q. Quan, C. Hong-Yi, and Z. Rui, "Entropy based method for network anomaly detection," in Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing ser. PRDC '09. Washington, DC, USA: IEEE Computer Society, 2009, pp. 189-191. [Online]. Available: http://dx.doi.org/10.1109/PRDC.2009.38
-
(2009)
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing
, pp. 189-191
-
-
Quan, Q.1
Hong-Yi, C.2
Rui, Z.3
-
6
-
-
84889048803
-
Studies in applying PCA and wavelet algorithms for network traffic anomaly detection
-
S. Novakov, C.-H. Lung, I. Lambadaris, and N. Seddigh, "Studies in applying PCA and wavelet algorithms for network traffic anomaly detection," in High Performance Switching and Routing (HPSR), 2013 IEEE 14th International Conference on 2013, pp. 185-190.
-
(2013)
High Performance Switching and Routing (HPSR), 2013 IEEE 14th International Conference on
, pp. 185-190
-
-
Novakov, S.1
Lung, C.-H.2
Lambadaris, I.3
Seddigh, N.4
-
7
-
-
33845348900
-
Intrusion detection system based on new association rule mining model
-
T.-R. Li and W. ming Pan, "Intrusion detection system based on new association rule mining model," in Granular Computing, 2005 IEEE International Conference on vol. 2, 2005, pp. 512-515 Vol. 2.
-
(2005)
Granular Computing, 2005 IEEE International Conference on
, vol.2
, pp. 512-515
-
-
Li, T.-R.1
Ming Pan, W.2
-
8
-
-
0043166339
-
Anomaly detection in IP networks
-
M. Thottan and J. Chuanyi, "Anomaly detection in IP networks," Signal Processing, IEEE Transactions on vol. 51, no. 8, pp. 2191-2204, 2003.
-
(2003)
Signal Processing, IEEE Transactions on
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Chuanyi, J.2
-
9
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
ser. IMC '03. New York, NY, USA: ACM
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: methods, evaluation, and applications," in Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement ser. IMC '03. New York, NY, USA: ACM, 2003, pp. 234-247.
-
(2003)
Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
10
-
-
84856161420
-
Revisit dynamic arima based anomaly detection
-
B. Zhu and S. Sastry, "Revisit dynamic arima based anomaly detection," in Privacy, security, risk and trust (passat), 2011 ieee third international conference on social computing (socialcom) 2011, pp. 1263-1268.
-
(2011)
Privacy, Security, Risk and Trust (Passat), 2011 Ieee Third International Conference on Social Computing (Socialcom)
, pp. 1263-1268
-
-
Zhu, B.1
Sastry, S.2
-
11
-
-
77952362091
-
Arima based network anomaly detection
-
A. Yaacob, I. K. T. Tan, S. F. Chien, and H. K. Tan, "Arima based network anomaly detection," in Communication Software and Networks, 2010. ICCSN '10. Second International Conference on 2010, pp. 205-209.
-
(2010)
Communication Software and Networks, 2010. ICCSN '10. Second International Conference on
, pp. 205-209
-
-
Yaacob, A.1
Tan, I.K.T.2
Chien, S.F.3
Tan, H.K.4
-
12
-
-
84893496533
-
Aberrant behavior detection in time series for network monitoring
-
ser. LISA '00. Berkeley, CA, USA: USENIX Association, [Online]
-
J. D. Brutlag, "Aberrant behavior detection in time series for network monitoring," in Proceedings of the 14th USENIX Conference on System Administration ser. LISA '00. Berkeley, CA, USA: USENIX Association, 2000, pp. 139-146. [Online]. Available: http://dl.acm.org/citation.cfm?id=1045502.1045530
-
(2000)
Proceedings of the 14th USENIX Conference on System Administration
, pp. 139-146
-
-
Brutlag, J.D.1
-
13
-
-
79951752574
-
A flow-based anomaly detection method using entropy and multiple traffic features
-
Oct.
-
S. Chang, X. Qiu, Z. Gao, F. Qi, and K. Liu, "A flow-based anomaly detection method using entropy and multiple traffic features," in Broadband Network and Multimedia Technology (IC-BNMT), 2010 3rd IEEE International Conference on Oct 2010, pp. 223-227.
-
(2010)
Broadband Network and Multimedia Technology (IC-BNMT), 2010 3rd IEEE International Conference on
, pp. 223-227
-
-
Chang, S.1
Qiu, X.2
Gao, Z.3
Qi, F.4
Liu, K.5
-
15
-
-
84891348090
-
Holtwinters statistical forecasting and ACO metaheuristic for traffic characterization
-
June
-
M. V. de Assis, L. Carvalho, J. Rodrigues, and M. J. L. Proença, "Holtwinters statistical forecasting and ACO metaheuristic for traffic characterization," in 2013 IEEE International Conference on Communications (ICC) June 2013, pp. 2524-2528.
-
(2013)
2013 IEEE International Conference on Communications (ICC)
, pp. 2524-2528
-
-
De Assis, M.V.1
Carvalho, L.2
Rodrigues, J.3
Proença, M.J.L.4
-
16
-
-
33750996160
-
Anomaly detection for network servers using digital signature of network segment
-
M. Proenca, B. Zarpelao, and L. Mendes, "Anomaly detection for network servers using digital signature of network segment," in Telecommunications, 2005. advanced industrial conference on telecommunications. aict 2005. proceedings 2005, pp. 290-295.
-
(2005)
Telecommunications, 2005. Advanced Industrial Conference on Telecommunications. Aict 2005. Proceedings
, pp. 290-295
-
-
Proenca, M.1
Zarpelao, B.2
Mendes, L.3
-
17
-
-
34250755328
-
Anomaly detection aiming pro-active management of computer network based on digital signature of network segment
-
Jun.
-
B. B. Zarpelão, L. D. S. Mendes, and M. L. Proença, Jr., "Anomaly detection aiming pro-active management of computer network based on digital signature of network segment," J. Netw. Syst. Manage. vol. 15, no. 2, pp. 267-283, Jun. 2007.
-
(2007)
J. Netw. Syst. Manage.
, vol.15
, Issue.2
, pp. 267-283
-
-
Zarpelão, B.B.1
Mendes, L.D.S.2
Proença, M.L.3
-
18
-
-
84867519215
-
Inference of network anomaly propagation using spatio-temporal correlation
-
A. A. Amaral, B. B. Zarpelão, L. de Souza Mendes, J. J. P. C. Rodrigues, and M. L. P. Junior, "Inference of network anomaly propagation using spatio-temporal correlation," Journal of Network and Computer Applications vol. 35, no. 6, pp. 1781-1792, 2012.
-
(2012)
Journal of Network and Computer Applications
, vol.35
, Issue.6
, pp. 1781-1792
-
-
Amaral, A.A.1
Zarpelão, B.B.2
De Souza-Mendes, L.3
Rodrigues, J.J.P.C.4
Junior, M.L.P.5
-
19
-
-
77951593049
-
Parameterized anomaly detection system with automatic configuration
-
Nov.
-
B. Zarpelao, L. Mendes, M. Proenca, and J. Rodrigues, "Parameterized anomaly detection system with automatic configuration," in Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE Nov 2009, pp. 1-6.
-
(2009)
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE
, pp. 1-6
-
-
Zarpelao, B.1
Mendes, L.2
Proenca, M.3
Rodrigues, J.4
|