Sciweavers

20 search results - page 1 / 4
» On the Utility of Anonymized Flow Traces for Anomaly Detecti...
Sort
View
CORR
2008
Springer
59views Education» more  CORR 2008»
13 years 4 months ago
On the Utility of Anonymized Flow Traces for Anomaly Detection
Martin Burkhart, Daniela Brauckhoff, Martin May
USS
2008
13 years 6 months ago
FLAME: A Flow-Level Anomaly Modeling Engine
There are several remaining open questions in the area of flow-based anomaly detection, e.g., how to do meaningful evaluations of anomaly detection mechanisms; how to get conclusi...
Daniela Brauckhoff, Arno Wagner, Martin May
CCS
2008
ACM
13 years 6 months ago
The risk-utility tradeoff for IP address truncation
Network operators are reluctant to share traffic data due to security and privacy concerns. Consequently, there is a lack of publicly available traces for validating and generaliz...
Martin Burkhart, Daniela Brauckhoff, Martin May, E...
ICC
2007
IEEE
203views Communications» more  ICC 2007»
13 years 11 months ago
A Multi-Scale Tomographic Algorithm for Detecting and Classifying Traffic Anomalies
—The occurrence of a traffic anomaly is always responsible for a degradation of performance. The anomaly can be observable, at some scale, in different ways: an increase in the n...
Silvia Farraposo, Philippe Owezarski, Edmundo Mont...
SP
2007
IEEE
148views Security Privacy» more  SP 2007»
13 years 10 months ago
DSSS-Based Flow Marking Technique for Invisible Traceback
Law enforcement agencies need the ability to conduct electronic surveillance to combat crime, terrorism, or other malicious activities exploiting the Internet. However, the prolif...
Wei Yu, Xinwen Fu, Steve Graham, Dong Xuan, Wei Zh...