Understanding and Evaluating the Impact of Sampling on Anomaly Detection Techniques
暂无分享,去创建一个
S. Papavassiliou | G. Androulidakis | V. Chatzigiannakis | M. Grammatikou | V. Maglaris | S. Papavassiliou | V. Chatzigiannakis | G. Androulidakis | M. Grammatikou | V. Maglaris
[1] A. Winsor. Sampling techniques. , 2000, Nursing times.
[2] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[3] kc claffy,et al. Application of sampling methodologies to network traffic characterization , 1993, SIGCOMM 1993.
[4] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[5] Carsten Lund,et al. Estimating flow distributions from sampled flow statistics , 2003, SIGCOMM '03.
[6] Nicolas Hohn,et al. Inverting sampled traffic , 2003, IMC '03.
[7] George Varghese,et al. Building a better NetFlow , 2004, SIGCOMM 2004.
[8] Kotagiri Ramamohanarao,et al. Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring , 2004, NETWORKING.
[9] Zhi-Li Zhang,et al. Adaptive packet sampling for accurate and scalable flow measurement , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[10] Kang G. Shin,et al. Change-point monitoring for the detection of DoS attacks , 2004, IEEE Transactions on Dependable and Secure Computing.
[11] Qiang Chen,et al. Multivariate Statistical Analysis of Audit Trails for Host-Based Intrusion Detection , 2002, IEEE Trans. Computers.
[12] J. E. Jackson,et al. Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .
[13] S. Papavassiliou,et al. On the realization of a generalized data fusion and network anomaly detection framework , 2006 .
[14] Baek-Young Choi,et al. On the Accuracy and Overhead of Cisco Sampled NetFlow , 2005 .