[1]
|
A. Lakhina, M. Crovella, and C. Diot, “Characterization
of network-wide anomalies in traffic flows (short paper),” In IMC, 2004.
|
[2]
|
D. Brauckhoff, B. Tellenbach, A. Wagner, A. Lakhina, and M. May, “Impact of traffic sampling on anomaly detection metrics,” In Proceeding of ACM/USENIX IMC, 2006.
|
[3]
|
P. Barford, J. Kline, D. Plonka, and A. Ron, “A signal analysis of network traffic anomalies,” In Proceeding of IMW, 2002.
|
[4]
|
A. Wagner, and B. Platter, “Entropy based worm and anomaly detection in fast IP networks,” In Proceeding IEEE WETICE, 2005.
|
[5]
|
A. Lakhina, M. Crovella, and C. Diot, “Mining anomalies using traffic feature distributions,” In Proceeding of ACM SIGCOMM, 2005.
|
[6]
|
G. Nychis, V. Sekar, D. G. Andersen, H. Kim, and H. Zhang, “An empirical evaluation of entropy-based traffic anomaly detection,” In IMC, 2008.
|
[7]
|
“Arbor networks,” At http://www.arbornetworks.com/.
|
[8]
|
A. Lakhina, M. Crovella, and C. Diot, “Characterization of network-wide anomalies in traffic flows (Short Paper),” In IMC, 2004.
|
[9]
|
“Riverhead networks,” At http://www.riverhead.com.
|
[10]
|
L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, “Statistical approaches to DDoS attack detection and response,” In Proceedings of the DARPA Information Survivability Conference and Exposition, 2003.
|
[11]
|
V. Karamcheti, D. Geiger, Z. Kedem, and S. Muthukri-
Shnan, “Detecting malicious network traffic using inverse distributions of packet contents,” In Proceeding of ACM SIGCOMM MineNet, 2005.
|
[12]
|
M. Thottan, and C. Ji, “Anomaly detection in IP networks,” In IEEE TRANSACTIONS ON SIGNAL PROCESSING, August 2003.
|
[13]
|
Y. Gu, A. McCallum, and D. Towsley, “Detecting anom-
alies in network traffic using maximum entropy estimation,” In IMC, 2005.
|
[14]
|
K. Xu, F. Wang, S. Bhattacharyya, and Z.-L. Zhang, “A real-time network traffic profiling system,” In DSN, 2007.
|
[15]
|
“FlowMatrix,” At http://www.akmalabs.com/flowmatrix. php.
|
[16]
|
M. Roesch, “Snort: Lightweight intrusion detection for networks,” In USENIX LISA, 1999.
|
[17]
|
T Karagiannis, K Papagiannaki, and M Faloutsos, “BLINC: Multilevel traffic classification in the dark,” In Proceeding of ACM SIGCOMM, 2005.
|
[18]
|
“CiscoNetflow,” At http://www.cisco.com/en/US/tech/tk 812/tsd_technology_support_technical_references_list.html.
|