Statistical Network Anomaly Detection: An Experimental Study
暂无分享,去创建一个
[1] Graham Cormode,et al. An improved data stream summary: the count-min sketch and its applications , 2004, J. Algorithms.
[2] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[3] Kensuke Fukuda,et al. MAWILab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking , 2010, CoNEXT.
[4] Yan Chen,et al. Reversible sketches for efficient and accurate change detection over network data streams , 2004, IMC '04.
[5] Christian Callegari,et al. When randomness improves the anomaly detection performance , 2010, 2010 3rd International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL 2010).
[6] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[7] Xenofontas A. Dimitropoulos,et al. Histogram-based traffic anomaly detection , 2009, IEEE Transactions on Network and Service Management.
[8] Kensuke Fukuda,et al. Seven Years and One Day: Sketching the Evolution of Internet Traffic , 2009, IEEE INFOCOM 2009.
[9] Christian Callegari,et al. A Methodological Overview on Anomaly Detection , 2013, Data Traffic Monitoring and Analysis.
[10] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[11] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[12] Balachander Krishnamurthy,et al. Sketch-based change detection: methods, evaluation, and applications , 2003, IMC '03.
[13] Christian Callegari,et al. Data Traffic Monitoring and Analysis , 2013, Lecture Notes in Computer Science.
[14] Christian Callegari,et al. On the Use of Compression Algorithms for Network Anomaly Detection , 2009, 2009 IEEE International Conference on Communications.
[15] Christian Callegari,et al. Sketch-based multidimensional IDS: A new approach for network anomaly detection , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).
[16] Marina Thottan,et al. Anomaly Detection Approaches for Communication Networks , 2010, Algorithms for Next Generation Networks.
[17] Kavé Salamatian,et al. Anomaly extraction in backbone networks using association rules , 2012, TNET.
[18] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[19] Osman Salem,et al. A scalable, efficient and informative approach for anomaly‐based intrusion detection systems: theory and practice , 2010, Int. J. Netw. Manag..
[20] S. Fomin,et al. Elements of the Theory of Functions and Functional Analysis , 1961 .