Network Anomaly Detection by IP Flow Graph Analysis: A DDoS Attack Case Study
暂无分享,去创建一个
Mario Lemes Proença | Bruno Bogaz Zarpelão | Leonardo de Souza Mendes | Eduardo H. M. Pena | Alexandre Aguiar Amaral
[1] Didier Sornette,et al. Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics , 2009, PAM.
[2] Joel J. P. C. Rodrigues,et al. Holt-Winters statistical forecasting and ACO metaheuristic for traffic characterization , 2013, 2013 IEEE International Conference on Communications (ICC).
[3] Mario Lemes Proença,et al. Anomaly Detection Aiming Pro-Active Management of Computer Network Based on Digital Signature of Network Segment , 2007, Journal of Network and Systems Management.
[4] Joel J. P. C. Rodrigues,et al. Parameterized Anomaly Detection System with Automatic Configuration , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[5] Mario Lemes Proença,et al. Anomaly detection for network servers using digital signature of network segment , 2005, Advanced Industrial Conference on Telecommunications/Service Assurance with Partial and Intermittent Resources Conference/E-Learning on Telecommunications Workshop (AICT/SAPIR/ELETE'05).
[6] Altyeb Altaher,et al. Real time network anomaly detection using relative entropy , 2011, 8th International Conference on High-capacity Optical Networks and Emerging Technologies.
[7] Artur Ziviani,et al. Network anomaly detection using nonextensive entropy , 2007, IEEE Communications Letters.
[8] Joel J. P. C. Rodrigues,et al. Inference of network anomaly propagation using spatio-temporal correlation , 2012, J. Netw. Comput. Appl..
[9] Joel J. P. C. Rodrigues,et al. Anomaly detection using DSNS and Firefly Harmonic Clustering Algorithm , 2012, 2012 IEEE International Conference on Communications (ICC).
[10] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[11] Thomas M. Cover,et al. Elements of Information Theory: Cover/Elements of Information Theory, Second Edition , 2005 .
[12] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).