Estimating Speed of Scanning Activities with a Hough Transform
暂无分享,去创建一个
[1] Michalis Faloutsos,et al. BLINC: multilevel traffic classification in the dark , 2005, SIGCOMM '05.
[2] Kensuke Fukuda,et al. Correlation Among Piecewise Unwanted Traffic Time Series , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[3] David Moore,et al. Code-Red: a case study on the spread and victims of an internet worm , 2002, IMW '02.
[4] Vern Paxson,et al. A brief history of scanning , 2007, IMC '07.
[5] Farnam Jahanian,et al. The Internet Motion Sensor - A Distributed Blackhole Monitoring System , 2005, NDSS.
[6] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[7] Zhuoqing Morley Mao,et al. Toward understanding distributed blackhole placement , 2004, WORM '04.
[8] Kensuke Fukuda,et al. An image processing approach to traffic anomaly detection , 2008, AINTEC '08.
[9] Jiri Matas,et al. Progressive probabilistic Hough transform for line detection , 1999, Proceedings. 1999 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (Cat. No PR00149).
[10] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[11] Kotagiri Ramamohanarao,et al. A probabilistic approach to detecting network scans , 2002, NOMS 2002. IEEE/IFIP Network Operations and Management Symposium. ' Management Solutions for the New Communications World'(Cat. No.02CH37327).
[12] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[13] Richard O. Duda,et al. Use of the Hough transformation to detect lines and curves in pictures , 1972, CACM.
[14] Stefan Savage,et al. Inferring Internet denial-of-service activity , 2001, TOCS.
[15] Tao Ye,et al. Connectionless port scan detection on the backbone , 2006, 2006 IEEE International Performance Computing and Communications Conference.
[16] Vern Paxson,et al. The top speed of flash worms , 2004, WORM '04.
[17] Kensuke Fukuda,et al. Extracting hidden anomalies using sketch and non Gaussian multiresolution statistical detection procedures , 2007, LSAD '07.
[18] Vinod Yegneswaran,et al. Characteristics of internet background radiation , 2004, IMC '04.
[19] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[20] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.