Multi-level anomaly detection: Relevance of big data analytics in networks

[1]  Hema A. Murthy,et al.  Systematic downloading: Analysis and detection , 2014, 2014 8th International Conference on Signal Processing and Communication Systems (ICSPCS).

[2]  Reza Azmi,et al.  MAIS-IDS: A distributed intrusion detection system using multi-agent AIS approach , 2014, Eng. Appl. Artif. Intell..

[3]  Hema A. Murthy,et al.  URL classification using non negative matrix factorization , 2014, 2014 Twentieth National Conference on Communications (NCC).

[4]  Hema A. Murthy,et al.  Decoupling non-stationary and stationary components in long range network time series in the context of anomaly detection , 2012, 37th Annual IEEE Conference on Local Computer Networks.

[5]  F. Martinelli,et al.  MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.

[6]  Amir-Hossein Jahangir,et al.  Entropy based SYN flooding detection , 2011, 2011 IEEE 36th Conference on Local Computer Networks.

[7]  Chandan Srivastava,et al.  Support Vector Data Description , 2011 .

[8]  Timothy A. Gonsalves,et al.  Feature Selection for Text Classification Based on Gini Coefficient of Inequality , 2010, FSDM.

[9]  Min Sik Kim,et al.  Real-Time Detection of Stealthy DDoS Attacks Using Time-Series Decomposition , 2010, 2010 IEEE International Conference on Communications.

[10]  Timothy A. Gonsalves,et al.  Detection of SYN flooding attacks using generalized autoregressive conditional heteroskedasticity (GARCH) modeling technique , 2010, 2010 National Conference On Communications (NCC).

[11]  Hema A Murthy,et al.  Internet activity analysis through proxy log , 2010, 2010 National Conference On Communications (NCC).

[12]  Brian D. Davison,et al.  Web page classification: Features and algorithms , 2009, CSUR.

[13]  G. Maciá-Fernández,et al.  Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..

[14]  Zhijing Liu,et al.  A Novel Approach to Naive Bayes Web Page Automatic Classification , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.

[15]  Ferenc Szidarovszky,et al.  Multi-Level Intrusion Detection System (ML-IDS) , 2008, 2008 International Conference on Autonomic Computing.

[16]  Michael W. Berry,et al.  Algorithms and applications for approximate nonnegative matrix factorization , 2007, Comput. Stat. Data Anal..

[17]  Samer Hassan,et al.  Random-Walk Term Weighting for Improved Text Classification , 2007, ICSC.

[18]  Shi-Chung Chang,et al.  Time-of-day Internet-access management by combining empirical data-based pricing with quota-based priority control , 2007, IET Commun..

[19]  Christina Lioma,et al.  Random walk term weighting for information retrieval , 2007, SIGIR.

[20]  Timothy A. Gonsalves,et al.  Detection of Syn Flooding Attacks using Linear Prediction Analysis , 2006, 2006 14th IEEE International Conference on Networks.

[21]  Rada Mihalcea,et al.  Random-Walk Term Weighting for Improved Text Classification , 2006, International Conference on Semantic Computing (ICSC 2007).

[22]  Qingtao Wu,et al.  Network Anomaly Detection Using Time Series Analysis , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).

[23]  Asok Ray,et al.  Symbolic time series analysis for anomaly detection: A comparative evaluation , 2005, Signal Process..

[24]  Yuting Zhang,et al.  Reduction of quality (RoQ) attacks on Internet end-systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[25]  Vasilios A. Siris,et al.  Application of anomaly detection algorithms for detecting SYN flooding attacks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[26]  Shi-Chung Chang,et al.  Management of abusive and unfair Internet access by quota-based priority control , 2004, Comput. Networks.

[27]  Fuhui Long,et al.  Feature selection based on mutual information criteria of max-dependency, max-relevance, and min-redundancy , 2003, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[28]  Marina Thottan,et al.  Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..

[29]  Qiang Chen,et al.  Computer intrusion detection through EWMA for autocorrelated and uncorrelated data , 2003, IEEE Trans. Reliab..

[30]  Kang G. Shin,et al.  SYN-dog: sniffing SYN flooding sources , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[31]  Anurag Kumar,et al.  Nonintrusive TCP connection admission control for bandwidth management of an Internet access link , 2000, IEEE Commun. Mag..

[32]  Marina Thottan,et al.  Proactive anomaly detection using distributed intelligent agents , 1998, IEEE Netw..

[33]  Martin F. Porter,et al.  An algorithm for suffix stripping , 1997, Program.

[34]  Takashi Okuda,et al.  Computational intelligence for distributed fault management in networks using fuzzy cognitive maps , 1996, Proceedings of ICC/SUPERCOMM '96 - International Conference on Communications.

[35]  Sally Floyd,et al.  Wide area traffic: the failure of Poisson modeling , 1995, TNET.

[36]  V. Paxson,et al.  Wide-area traffic: the failure of Poisson modeling , 1994, SIGCOMM.

[37]  M. Taqqu,et al.  On the self-similar nature of Ethernet traffic (extended version) , 1994, TNET.

[38]  K. K. Paliwal,et al.  On the use of line spectral frequency parameters for speech recognition , 1992, Digit. Signal Process..

[39]  T. Landauer,et al.  Latent semantic analysis , 2008, Scholarpedia.

[40]  Gerard Salton,et al.  Term-Weighting Approaches in Automatic Text Retrieval , 1988, Inf. Process. Manag..

[41]  John F. Canny,et al.  A Computational Approach to Edge Detection , 1986, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[42]  Thomas A. Paine,et al.  Directing Traffic: Managing Internet Bandwidth Fairly. , 2008 .

[43]  Ben Choi,et al.  Web Page Classification , 2005 .

[44]  Tsau Young Lin,et al.  Foundations and Advances in Data Mining , 2005 .

[45]  Robert P. W. Duin,et al.  Support Vector Data Description , 2004, Machine Learning.

[46]  H. Sebastian Seung,et al.  Algorithms for Non-negative Matrix Factorization , 2000, NIPS.

[47]  Douglas A. Reynolds,et al.  Speaker Verification Using Adapted Gaussian Mixture Models , 2000, Digit. Signal Process..

[48]  Walter Willinger,et al.  On the Self-Similar Nature of Ethernet Traffic ( extended version ) , 1995 .

[49]  Yi Peng,et al.  Network intrusion detection , 1994, IEEE Netw..

[50]  C. K. Yuen,et al.  Theory and application of digital signal processing , 1975 .