Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/505202.505211acmconferencesArticle/Chapter ViewAbstractPublication PagesimcConference Proceedingsconference-collections
Article

Characteristics of network traffic flow anomalies

Published: 01 November 2001 Publication History
First page of PDF

References

[1]
K. Claffy, G. Polyzos, and H.-W. Braun, "Internet traffic flow profiling," Tech. Rep. TR-CS93-328, University of California San Diego, November 1989.
[2]
D. Plonka, "Flowscan: A network traffic flow reporting and visualization tool," in Proceedings of the USENIX Fourteenth System Administration Conference LISA XIV, New Orleans, LA, December 2000.
[3]
Cisco's 10s Netflow Feature, http:flwww.cisco.comiwrapipublicl732/netflow.
[4]
R. Cficeres, "Measurements of wide-area Internet traffic," Tech. Rep. UCB/CSD 89/550, Computer Science Department, University of California, Berkeley, 1989.
[5]
V. Paxson, Measurements and Analysis of End-to-End Internet Dynamics, Ph.D. thesis, University of California Berkeley, 1997.
[6]
V. Paxson and S. Floyd, "Wide-area traffic: The failure of Poisson modeling," IEEE/ACM Transactions on Networking, vol. 3(3), pp. 226-244, June 1995.
[7]
W. Willinger, M. Taqqu, R. Sherman, and D. Wilson, "Selfsimilarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level," IEEE/ACM Transactions on Networking, vol. 5, no. 1, pp. 71-86, February 1997.
[8]
P. Abry and D. Veitch, "Wavelet analysis of long range dependent traffic," IEEE Transactions on Information Theory, vol. 44, no. 1, 1998.
[9]
K. Claffy, Internet TrafJ;c Characterization, Ph.D. thesis, University of California, San Diego, 1994.
[10]
I. Katzela and M. Schwartz, "Schemes for fault identificaiton in communicaitons networks," IEEE/ACM Transactions on Networking, vol. 3(6), pp. 753-764, December 1995.
[11]
F. Feather, D. Siewiorek, and R. Maxion, "Fault detection in an ethernet network using anomaly signature matching," in Proceedings of ACM SIGCOMM '93, San Francisco, CA, September 2000.
[12]
J. Brutlag, "Aberrant behavior detection in time series for network monitoring," in Proceedings of the USENIX Fourteenth System Administration Conference LISA XIV, New Orleans, LA, December 2000.
[13]
C. Hood and C. Ji, "Proactive network fault detection," in Proceedings of IEEE INFOCOM '97, Kobe, Japan, April 1997.
[14]
J. Toelle and O. Niggemann, "Supporting intrusion detection by graph clustering and graph drawing," in Proceedings of Third International Workshop on Recent Advances in Intrusion Detection RAID 2000, Toulouse, France, October 2000.
[15]
K. Fox, R. Henning, J. Reed, and R. Simonian, "A neural network approach towards intrusion detection," Tech. Rep., Harris Corporation, July 1990.
[16]
N. Ye, "A markov chain model of temporal behavior for anomaly detection," in Workshop on Information Assurance and Security, West Point, NY, June 2000.
[17]
D. Moore, G. Voelker, and S. Savage, "Inferring intemet denial-ofservice activity," in Proceedings of 2001 USENIX Security Symposium, Washington, DC, August 2001.
[18]
V. Paxson, "Bra: A system for detecting network intruders in real-time," Computer Networks, vol. 31, no. 23-24, pp. 2435- 2463, 1999.
[19]
R. Manajan, S. Bellovin, S. Floyd, V. Paxson, S. Shenker, and J. Ioannidis, "Controlling high bandwidth aggregates in the network," ACIRI Draft paper, February 2001.

Cited By

View all
  • (2023)Exploring Machine Learning Algorithms for User Activity Inference from IoT Network Traffic2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS)10.1109/MASS58611.2023.00052(366-374)Online publication date: 25-Sep-2023
  • (2023)Anomaly Detection with Ensemble Empirical Mode Decomposition for Secure QUIC Communications: A Simple Use CaseMobile Networks and Management10.1007/978-3-031-32443-7_30(413-422)Online publication date: 28-May-2023
  • (2022)Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic FlowEngineering, Technology & Applied Science Research10.48084/etasr.485212:3(8667-8674)Online publication date: 6-Jun-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
IMW '01: Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement
November 2001
319 pages
ISBN:1581134355
DOI:10.1145/505202
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

SIGCOMM WS'01
Sponsor:
SIGCOMM WS'01: ACM SIGCOMM Internet Measurement Workshop 2001
November 1 - 2, 2001
California, San Francisco, USA

Acceptance Rates

IMW '01 Paper Acceptance Rate 29 of 80 submissions, 36%;
Overall Acceptance Rate 29 of 80 submissions, 36%

Upcoming Conference

IMC '24
ACM Internet Measurement Conference
November 4 - 6, 2024
Madrid , AA , Spain

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)101
  • Downloads (Last 6 weeks)10
Reflects downloads up to 04 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Exploring Machine Learning Algorithms for User Activity Inference from IoT Network Traffic2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS)10.1109/MASS58611.2023.00052(366-374)Online publication date: 25-Sep-2023
  • (2023)Anomaly Detection with Ensemble Empirical Mode Decomposition for Secure QUIC Communications: A Simple Use CaseMobile Networks and Management10.1007/978-3-031-32443-7_30(413-422)Online publication date: 28-May-2023
  • (2022)Performance Comparison of Ensemble Learning and Supervised Algorithms in Classifying Multi-label Network Traffic FlowEngineering, Technology & Applied Science Research10.48084/etasr.485212:3(8667-8674)Online publication date: 6-Jun-2022
  • (2022)Bus Headways Analysis for Anomaly DetectionIEEE Transactions on Intelligent Transportation Systems10.1109/TITS.2022.315518023:10(18975-18988)Online publication date: Oct-2022
  • (2022)RPCA and Wavelet packet Decomposition based Network Traffic Anomaly Detection2022 IEEE 19th India Council International Conference (INDICON)10.1109/INDICON56171.2022.10039837(1-5)Online publication date: 24-Nov-2022
  • (2022)DLMHS: Flow‐based intrusion detection system using deep learning neural network and meta‐heuristic scaleInternational Journal of Communication Systems10.1002/dac.515935:10Online publication date: 5-Apr-2022
  • (2021)Multi-Attribute Monitoring for Anomaly Detection: a Reinforcement Learning Approach based on Unsupervised Reward2021 10th IFIP International Conference on Performance Evaluation and Modeling in Wireless and Wired Networks (PEMWN)10.23919/PEMWN53042.2021.9664667(1-6)Online publication date: 23-Nov-2021
  • (2021)Towards the Automatic and Schedule-Aware Alerting of Internetwork Time SeriesIEEE Access10.1109/ACCESS.2021.30735989(61346-61358)Online publication date: 2021
  • (2021)A Cloud-Based Method for Detecting Intrusions in PROFINET Communication Networks Based on Anomaly DetectionJournal of Control, Automation and Electrical Systems10.1007/s40313-021-00747-432:5(1177-1188)Online publication date: 22-Jun-2021
  • (2021)Statistical Properties and Modelling of DDoS AttacksContext-Aware Systems and Applications, and Nature of Computation and Communication10.1007/978-3-030-67101-3_4(44-54)Online publication date: 13-Jan-2021
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media