1 |
Estan C , Varghese G . New directions in traffic measurement and accounting.In: Proceedings of Applications,Technologies,Architectures and Protocols for Computer Communications, Pittsburgh, 2002
|
2 |
Mori T , Uchida M , Kawahara R et al. Identifying elephant flows through periodically sampled packets.In: The 4th ACM SIGCOMM Conference on Internet Measurement, Taormina, 2004
|
3 |
Kamiyama N , Mori T . Simple and accurate identification of high-rate flows by packet sampling.In: The 25th IEEE International Conference on Computer Communications, Barcelona, April 2006
|
4 |
Venkataraman S , Song D , Gibbons P et al. New streaming algorithms for fast detection of superspreaders.In: Network and Distributed System Security Symposium(NDSS), San Diego, February 2004
|
5 |
Androulidakis G , Papavassiliou S . Improving network anomaly detection via selective flow-based sampling. IET Communications, 2008,2(3): 399~409.
|
6 |
Zhang Y , Singh S , Sen S et al. Online identification of hierarchical heavy hitters:algorithms,evaluation and applications.In: The 4th ACM SIGCOMM Conference on Internet Measurement, Taormina, 2004
|
7 |
Charikar M , Chen K , Colton M F . Finding frequent items in data streams.In: Proceedings of the 29th International Colloquium on Automata,Languages and Programming, Springer-Verlag, 2002
|
8 |
Demaine E , Ortiz A L , Munro J I . Frequency estimation of Internet packet streams with limited space.In: The 10th Annual European Symposium on Algorithms, Springer-Verlag, 2002
|
9 |
Barakat C , Iannaccone G , Diot C . Ranking flows from sampled traffic.In: The 2005 ACM Conference on Emerging Network Experiment and Technology, Toulouse, 2005
|
10 |
Haining Wang , Danlu Zhang , Shin K G . Change-point monitoring for the detection of DoS attacks. IEEE Transactions on Dependable and Secure Computing, 2004,1(4):193~208.
|
11 |
Cormode G , Muthukrishnan S . An improved data stream summary:the count-min sketch and its applications. Journal of Algorithms, 2005,55(1):58~75.
|
12 |
Cormode G , Muthukrishnan S . Whatˊs hot and whatˊs not:tracking most frequent items dynamically.In: The Twenty-Second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, San Diego, 2003
|
13 |
Manku G , Motwani R . Approximate frequency counts over data streams.In: The 28th International Conference on Very Large Data Bases, August 2002
|
14 |
Metwally A , Agrawal D , Abbadi A . Efficient computation of frequent and top-k elements in data streams. Database Theory-ICDT 2005, 2005:398~412.
|
15 |
Lee W , Stolfo S J . A framework for constructing features and models for intrusion detection systems. ACM Transactions on Information and System Security, 2000,3(4):227~261.
|
16 |
Barbarra D , Couto J , Jajodia S , et al. ADAM:detecting intrusions by data mining.In: Proceedings of the 2001 IEEE,Workshop on Information Assurance and Security, West Point, 2001
|
17 |
Staniford S , Hoagland J A , stealthy J M . Practical automated detection of stealthy portscans Journal of Computer Security, 2002,10(1-2):105~136.
|