Communication-Efficient Online Detection of Network-Wide Anomalies
暂无分享,去创建一个
Ling Huang | Michael I. Jordan | Joseph M. Hellerstein | Minos N. Garofalakis | Anthony D. Joseph | Nina Taft | XuanLong Nguyen | J. Hellerstein | M. Garofalakis | X. Nguyen | Ling Huang | A. Joseph | N. Taft
[1] G. Stewart,et al. Matrix Perturbation Theory , 1990 .
[2] Michael K. Reiter,et al. Seurat: A Pointillist Approach to Anomaly Detection , 2004, RAID.
[3] M. Brand,et al. Fast low-rank modifications of the thin singular value decomposition , 2006 .
[4] Sriram Ramabhadran,et al. NetProfiler: Profiling Wide-Area Networks Using Peer Cooperation , 2005, IPTPS.
[5] Scott Shenker,et al. Querying the Internet with PIER , 2003, VLDB.
[6] G. Weikum. Querying the Internet with PIER , 2005 .
[7] Graham Cormode,et al. Sketching Streams Through the Net: Distributed Approximate Query Tracking , 2005, VLDB.
[8] J. E. Jackson,et al. Control Procedures for Residuals Associated With Principal Component Analysis , 1979 .
[9] Kavé Salamatian,et al. Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.
[10] Ben Y. Zhao,et al. Exploiting routing redundancy via structured peer-to-peer overlays , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[11] Somesh Jha,et al. Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.
[12] Konstantina Papagiannaki,et al. Structural analysis of network traffic flows , 2004, SIGMETRICS '04/Performance '04.
[13] Albert G. Greenberg,et al. Network anomography , 2005, IMC '05.
[14] D. R. Jensen,et al. A Gaussian Approximation to the Distribution of a Definite Quadratic Form , 1972 .
[15] Robbert van Renesse,et al. Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining , 2003, TOCS.
[16] Edward Y. Chang,et al. Adaptive stream resource management using Kalman Filters , 2004, SIGMOD '04.
[17] V. N. Bogaevski,et al. Matrix Perturbation Theory , 1991 .
[18] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[19] Ling Huang,et al. In-Network PCA and Anomaly Detection , 2006, NIPS.
[20] David Wetherall,et al. Scriptroute: A Public Internet Measurement Facility , 2003, USENIX Symposium on Internet Technologies and Systems.
[21] Paul Barford,et al. A signal analysis of network traffic anomalies , 2002, IMW '02.
[22] Danny Raz,et al. Efficient reactive monitoring , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[23] Graham Cormode,et al. Communication-efficient distributed monitoring of thresholded counts , 2006, SIGMOD Conference.
[24] Jennifer Widom,et al. Adaptive filters for continuous queries over distributed data streams , 2003, SIGMOD '03.
[25] Jake D. Brutlag,et al. Aberrant Behavior Detection in Time Series for Network Monitoring , 2000, LISA.
[26] Antonio Nucci,et al. The problem of synthetically generating IP traffic matrices: initial recommendations , 2005, CCRV.
[27] Zlatko Drmac,et al. On Principal Angles between Subspaces of Euclidean Space , 2000, SIAM J. Matrix Anal. Appl..
[28] Christophe Diot,et al. Diagnosing network-wide traffic anomalies , 2004, SIGCOMM.
[29] David Wetherall,et al. Scriptroute: a facility for distributed internet measurement , 2003 .
[30] Ling Huang,et al. Distributed PCA and Network Anomaly Detection , 2006 .