An Empirical Evaluation of Entropy-based Anomaly Detection
暂无分享,去创建一个
[1] Vinod Yegneswaran,et al. Internet intrusions: global characteristics and prevalence , 2003, SIGMETRICS '03.
[2] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[3] Hui Zang,et al. Is sampled data sufficient for anomaly detection? , 2006, IMC '06.
[4] Peter Phaal,et al. InMon Corporation's sFlow: A Method for Monitoring Traffic in Switched and Routed Networks , 2001, RFC.
[5] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[6] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[7] Paul Barford,et al. Self-configuring network traffic generation , 2004, IMC '04.
[8] Amin Vahdat,et al. Realistic and responsive network traffic generation , 2006, SIGCOMM.
[9] Daphne Koller,et al. Toward Optimal Feature Selection , 1996, ICML.
[10] Abhishek Kumar,et al. Data streaming algorithms for efficient and accurate estimation of flow size distribution , 2004, SIGMETRICS '04/Performance '04.
[11] Vyas Sekar,et al. Data streaming algorithms for estimating entropy of network traffic , 2006, SIGMETRICS '06/Performance '06.
[12] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[13] Jules J. Berman,et al. Ruby: The Programming Language , 2008 .
[14] Dan Schnackenberg,et al. Statistical approaches to DDoS attack detection and response , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[15] Eddie Kohler,et al. Observed Structure of Addresses in IP Traffic , 2002, IEEE/ACM Transactions on Networking.
[16] Vyas Sekar,et al. LADS: Large-scale Automated DDoS Detection System , 2006, USENIX Annual Technical Conference, General Track.
[17] Matthew Roughan,et al. Experience in measuring internet backbone traffic variability: Models metrics, measurements and meaning , 2003 .
[18] S. Muthukrishnan,et al. Detecting malicious network traffic using inverse distributions of packet contents , 2005, MineNet '05.
[19] Hari Balakrishnan,et al. Fast portscan detection using sequential hypothesis testing , 2004, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004.
[20] Zhi-Li Zhang,et al. Profiling internet backbone traffic: behavior models and applications , 2005, SIGCOMM '05.
[21] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[22] Bernhard Plattner,et al. Entropy based worm and anomaly detection in fast IP networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[23] Donald F. Towsley,et al. An information-theoretic approach to network monitoring and measurement , 2005, IMC '05.
[24] Jim Morrison. Blaster Revisited , 2004, ACM Queue.
[25] Mostafa H. Ammar,et al. Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme , 2004, Comput. Networks.