Abnormal Hosts Monitor for City Wide Core Network by Real Time Super Points Cardinality Estimation
暂无分享,去创建一个
Jie Xu | Wei Ding | Xiaoyan Hu | Jie Xu | W. Ding | Xiaoyan Hu
[1] Kyu-Young Whang,et al. A linear-time probabilistic counting algorithm for database applications , 1990, TODS.
[2] Enrico Gregori,et al. On the incompleteness of the AS-level graph: a novel methodology for BGP route collector placement , 2012, Internet Measurement Conference.
[3] MyungKeun Yoon,et al. A grand spread estimator using a graphics processing unit , 2014, J. Parallel Distributed Comput..
[4] Muttukrishnan Rajarajan,et al. A survey of intrusion detection techniques in Cloud , 2013, J. Netw. Comput. Appl..
[5] Yang Liu,et al. Identifying high-cardinality hosts from network-wide traffic measurements , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[6] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[7] Jing Cao,et al. Identifying High Cardinality Internet Hosts , 2009, IEEE INFOCOM 2009.
[8] Ahmed Patel,et al. An intrusion detection and prevention system in cloud computing: A systematic review , 2013, J. Netw. Comput. Appl..
[9] Chun-Hung Richard Lin,et al. Intrusion detection system: A comprehensive review , 2013, J. Netw. Comput. Appl..
[10] Xenofontas A. Dimitropoulos,et al. Indexing million of packets per second using GPUs , 2013, Internet Measurement Conference.
[11] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[12] Keqiu Li,et al. Detection of Superpoints Using a Vector Bloom Filter , 2016, IEEE Transactions on Information Forensics and Security.
[13] Abhishek Kumar,et al. Detection of Super Sources and Destinations in High-Speed Networks: Algorithms, Analysis and Evaluation , 2006, IEEE Journal on Selected Areas in Communications.
[14] Tao Qin,et al. A Data Streaming Method for Monitoring Host Connection Degrees of High-Speed Links , 2011, IEEE Transactions on Information Forensics and Security.
[15] John E. Stone,et al. OpenCL: A Parallel Programming Standard for Heterogeneous Computing Systems , 2010, Computing in Science & Engineering.
[16] Chiara Orsini,et al. BGPStream: A Software Framework for Live and Historical BGP Data Analysis , 2016, Internet Measurement Conference.
[17] Yinhui Li,et al. An efficient intrusion detection system based on support vector machines and gradually feature removal method , 2012, Expert Syst. Appl..
[18] Michael Garland,et al. Designing efficient sorting algorithms for manycore GPUs , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[19] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.