On Detecting Abrupt Changes in Network Entropy Time Series
暂无分享,去创建一个
Philipp Winter | Eckehard Hermann | Markus Zeilinger | Harald Lampesberger | Philipp Winter | M. Zeilinger | Harald Lampesberger | Eckehard Hermann
[1] Aiko Pras,et al. An Overview of IP Flow-Based Intrusion Detection , 2010, IEEE Communications Surveys & Tutorials.
[2] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[3] Fernando Silveira,et al. URCA: Pulling out Anomalies by their Root Causes , 2010, 2010 Proceedings IEEE INFOCOM.
[4] Robert K. Cunningham,et al. A taxonomy of computer worms , 2003, WORM '03.
[5] Jake D. Brutlag,et al. Aberrant Behavior Detection in Time Series for Network Monitoring , 2000, LISA.
[6] Vyas Sekar,et al. An empirical evaluation of entropy-based traffic anomaly detection , 2008, IMC '08.
[7] Didier Sornette,et al. Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics , 2009, PAM.
[8] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[9] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[10] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[11] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[12] Martin May,et al. FLAME: A Flow-Level Anomaly Modeling Engine , 2008, CSET.
[13] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[14] Benoit Claise,et al. Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information , 2008, RFC.