SCIE, EI, Scopus, INSPEC, DBLP, CSCD, etc.
Citation: | Jinoh Kim, Alex Sim. A New Approach to Multivariate Network Traffic Analysis[J]. Journal of Computer Science and Technology, 2019, 34(2): 388-402. DOI: 10.1007/s11390-019-1915-y |
[1] |
Liu D P, Zhao Y J, Xu H W Sun Y Q, Pei D, Luo J, Jing X W, Feng M. Opprentice: Towards practical and automatic anomaly detection through machine learning. In Proc. the 2015 ACM Internet Measurement Conference, October 2015, pp.211-224.
|
[2] |
Krishnamurthy B, Sen S Zhang Y, Chen Y. Sketch-based change detection: Methods, evaluation, and applications. In Proc. the 3rd ACM SIGCOMM Conference on Internet Measurement, October 2003, pp.234-247.
|
[3] |
Choi J, Hu K J, Sim A. Relational dynamic Bayesian networks with locally exchangeable measures. Technical Report LBNL-6341E, Lawrence Berkeley National Laboratory, 2013. https://www.osti.gov/servlets/purl/1165582,November2018.
|
[4] |
Yu M L, Jose L, Miao R. Software defined traffic measurement with OpenSketch. In Proc. the 10th USENIX Conference on Networked Systems Design and Implementation, April 2013, pp.29-42.
|
[5] |
Cho K, Fukuda K, Esaki H, Kato A. Observing slow crustal movement in residential user traffic. In Proc. the 2008 ACM Conference on Emerging Network Experiment and Technology, December 2008, Article No. 12.
|
[6] |
Schweller R, Gupta A, Parsons E, Chen Y. Reversible sketches for efficient and accurate change detection over network data streams. In Proc. the 4th ACM SIGCOMM Conference on Internet Measurement, Oct. 2004, pp.207- 212.
|
[7] |
Liu Z X, Manousis A, Vorsanger G, Sekar V, Braverman V. One sketch to rule them all: Rethinking network flow monitoring with UnivMon. In Proc. the 2016 ACM SIGCOMM Conference, August 2016, pp.101-114.
|
[8] |
Kim J, Sim A. A new approach to online, multivariate network traffic analysis. In Proc. the 26th International Conference on Computer Communications and Networks, July 2017.
|
[9] |
Manku G S, Motwani R. Approximate frequency counts over data streams. In Proc. the 28th International Conference on Very Large Data Bases, August 2002, pp.346-357.
|
[10] |
Das S, Antony S, Agrawal D, Abbadi A E. CoTS: A scalable framework for parallelizing frequency counting over data streams. In Proc. the 25th IEEE International Conference on Data Engineering, March 2009, pp.1323-1326.
|
[11] |
Das S, Antony S, Agrawal D, Abbadi A E. Thread cooperation in multicore architectures for frequency counting over multiple data streams. Proceedings of the VLDB Endowment, 2009, 2(1): 217-228.
|
[12] |
Guha S, Koudas N, Shim K. Data-streams and histograms. In Proc. the 33rd Annual ACM Symposium on Theory of Computing, July 2001, pp.471-475.
|
[13] |
Aggarwal C, Han J, Wang J, Yu P. A framework for clustering evolving data streams. In Proc. the 29th International Conference on Very Large Data Bases, September 2003, pp.81-92.
|
[14] |
Domingos P, Hulten G. A general method for scaling up machine learning algorithms and its application to clustering. In Proc. the 8th International Conference on Machine Learning, June 2001, pp.106-113.
|
[15] |
Guha S, Mishra N, Motwani R, O'Callaghan L. Clustering data streams. In Proc. the 41st Annual Symposium on Foundations of Computer Science, November 2000, pp.356- 366.
|
[16] |
Guha S, Meyerson A, Mishra N, Motwani R, O'Callaghan L. Clustering data streams: Theory and practice. IEEE Transactions on Knowledge and Data Engineering, 2003, 15(3): 515-528.
|
[17] |
Datar M, Gionis A, Indyk P, Motwani R. Maintaining stream statistics over sliding windows. In Proc. the 13th Annual ACM-SIAM Symposium on Discrete Algorithms, January 2002, pp.635-644.
|
[18] |
Matias Y, Vitter J S, Wang M. Wavelet-based histograms for selectivity estimation. In Proc. the 1998 ACM SIGMOD International Conference on Management of Data, June 1998, pp.448-459.
|
[19] |
Vitter J S, Wang M. Approximate computation of multidimensional aggregates of sparse data using wavelets. In Proc. the 1999 ACM SIGMOD International Conference on Management of Data, June 1999, pp.193-204.
|
[20] |
Keogh E, Chakrabarti K, Pazzani M, Mehrotra S. Locally adaptive dimensionality reduction for indexing large time series databases. In Proc. the 2001 ACM SIGMOD International Conference on Management of Data, May 2001, pp.151-162.
|
[21] |
Papadimitriou S, Sun J, Faloutsos C. Dimensionality reduction and forecasting on streams. In Data Streams, Models and Algorithms, Aggarwal C C (ed.), Springer, 2007, pp.261-288.
|
[22] |
Lee S, Kim H, Barman D, Lee S, Kim C K, Kwon T, Choi Y. NeTraMark: A network traffic classification benchmark. SIGCOMM Comput. Commun. Rev., 2011, 41(1): 22-30.
|
[23] |
Karagiannis T, Papagiannaki K, Faloutsos M. BLINC: Multilevel traffic classification in the dark. SIGCOMM Comput. Commun. Rev., 2005, 35(4): 229-240.
|
[24] |
Iliofotou M, Pappu P, Faloutsos M, Mitzenmacher M, Singh S, Varghese G. Network monitoring using traffic dispersion graphs. In Proc. the 7th ACM SIGCOMM Conference on Internet Measurement, October 2007, pp.315-320.
|
[25] |
Kim J, Sim A, Suh S, Kim I. An approach to online network monitoring using clustered patterns. In Proc. the 2007 International Conference on Computing, Networking and Communication, January 2017, pp.656-661.
|
[26] |
Bahmani B, Moseley B, Vattani A, Kumar R, Vassilvitskii S. Scalable k-means++. Proceedings of the VLDB Endowment, 2012, 5(7): 622-633.
|
[27] |
Mills-Tettey A, Stentz A, Dias S B. The dynamic Hungarian algorithm for the assignment problem with changing costs. Technical Report, Carnegie Mellon University, 2007. https://www.ri.cmu.edu/pubfiles/pub4/millstetteygayorkor20073/millstetteygayorkor20073.pdf, November 2018.
|
[28] |
Dusi M, Este A, Gringoli F, Salgarelli L. Using GMM and SVM-based techniques for the classification of SSHencrypted traffic. In Proc. IEEE International Conference on Communications, June 2009.
|
[29] |
Rgringoli F, Salgarelli L, Dusa M, Cascarano N, Risso F, Claffy K. GT: Picking up the truth from the ground for internet traffic. ACM SIGCOMM Computer Communication Review, 2009 39(5): 13-18.
|
[30] |
Fontugne R, Borgnat P, Abry P, Fukuda K. MAWILab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In Proc. the 2010 ACM Conference on Emerging Networking Experiments and Technology, November 2010, Article No. 8.
|
[31] |
Estan C, Keys K, Moore D, Varghese G. Building a better NetFlow. In Proc. the 2004 ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, August 2004, pp.245-256.
|
[32] |
Wang M, Li B C, Li Z P. sFlow: Towards resource-efficient and agile service federation in service overlay networks. In Proc. the 24th International Conference on Distributed Computing Systems, March 2004, pp.628-635.
|
[33] |
Schikuta E. Grid-clustering: A fast hierarchical clustering method for very large data sets. Technical Report, Rice University, 1993. https://www.researchgate.net/publication/210242098_Grid_Clustering_An_efficient_hierarchical_C_lustering_method_for_very_large_data_sets,November2018.
|
[34] |
Kim J, Yoo W, Sim A, Suh S, Kim I. A lightweight network anomaly detection technique. In Proc. the International Workshop on Computing, Networking and Communications, January 2017, pp.896-900.
|
[35] |
Tavallaee M, Bagheri E, Lu W, Ghorbani A A. A detailed analysis of the KDD CUP 99 data set. In Proc. the 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, July 2009, Article No. 38.
|
[36] |
Glazer A, Lindenbaum M, Markovitch S. q-OCSVM: A q-quantile estimator for high-dimensional distributions. In Proc. the 27th Annual Conference on Neural Information Processing Systems, December 2013, pp.503-511.
|
[37] |
Solomon J, de Goes F, Peyré G, Cuturi M, Butscher A, Nguyen A, Du T, Guibas L. Convolutional wasserstein distances: Efficient optimal transportation on geometric domains. ACM Trans. Graph. 2015, 34(4): Article No. 66.
|
[38] |
Seguy V, Cuturi M. Principal geodesic analysis for probability measures under the optimal transport metric. In Proc. the 2015 Annual Conference on Neural Information Processing Systems, December 2015, pp.3312-3320.
|
[39] |
Mellia M, Cigno R L, Neri F. Measuring IP and TCP behavior on edge nodes with Tstat. Comput. Netw., 2005, 47(1): 1-21.
|
[1] | Quentin Pajon, Swan Serre, Hugo Wissocq, Léo Rabaud, Siba Haidar, Antoun Yaacoub. Balancing Accuracy and Training Time in Federated Learning for Violence Detection in Surveillance Videos: A Study of Neural Network Architectures[J]. Journal of Computer Science and Technology, 2024, 39(5): 1029-1039. DOI: 10.1007/s11390-024-3702-7 |
[2] | Xin-Chen Liu, Wu Liu, Hua-Dong Ma, Shuang-Qun Li. PVSS: A Progressive Vehicle Search System for Video Surveillance Networks[J]. Journal of Computer Science and Technology, 2019, 34(3): 634-644. DOI: 10.1007/s11390-019-1932-x |
[3] | Shuo Shang, Lisi Chen, Zhe-Wei Wei, Dan-Huai Guo, Ji-Rong Wen. Dynamic Shortest Path Monitoring in Spatial Networks[J]. Journal of Computer Science and Technology, 2016, 31(4): 637-648. DOI: 10.1007/s11390-016-1653-3 |
[4] | FENG Jing, MA Xiaojun, GU Boxuan, GU Guanqun. An Aided Tool for Enterprise Network Design[J]. Journal of Computer Science and Technology, 2000, 15(5): 491-497. |
[5] | LUO Junzhou, GU Guanqun, FEI Xiang. An Architectural Model for Intelligent Network Management[J]. Journal of Computer Science and Technology, 2000, 15(2): 136-143. |
[6] | SHU Yantai, XUE Fei, JIN Zhigang, Oliver Yang. The Impact of Self-Similar Traffic on Network Delay[J]. Journal of Computer Science and Technology, 1999, 14(6): 585-589. |
[7] | Hou Zhengfeng. A Topology Designing System for a Computer Network[J]. Journal of Computer Science and Technology, 1998, 13(1): 91-96. |
[8] | Luo Junzhou, Gu Guanqun. CIMS Network Protocol and Its Net Models[J]. Journal of Computer Science and Technology, 1997, 12(5): 476-481. |
[9] | Peng Chenglian. Combining Gprof and Event-Driven Monitoring for Analyzing Distributed Programs:A Rough View of NCSA Mosaic[J]. Journal of Computer Science and Technology, 1996, 11(4): 427-432. |
[10] | Weigeng Shi. Reconnectable Network with Limited Resources[J]. Journal of Computer Science and Technology, 1991, 6(3): 243-249. |
1. | Zhongping Zhang, Yuehan Hou, Daoheng Liu, et al. HGOD: Outlier detection based on a hybrid graph. Neurocomputing, 2024, 602: 128288. DOI:10.1016/j.neucom.2024.128288 |
2. | Anis Nariesha Alizan, Mohamad Fadli Zolkipli. A Comparative Study Between Wireshark and Paessler Router Traffic Grapher (PRTG) in Network Monitoring and Analysis.. INTI Journal, 2024, 2024(1) DOI:10.61453/INTIj.202451 |
3. | Amadou Sara Camara. The Role of Cognitive-Information Technologies in Cybersecurity: Threat Detection and Adaptive Defense Systems. Вопросы безопасности, 2024. DOI:10.25136/2409-7543.2024.1.69882 |
4. | Ying Song, Chaohao Sun, Wanyi Feng, et al. Cubic-Permutation-Polynomial-Based Sliding Window Network Coding Algorithm in IoT. IEEE Internet of Things Journal, 2023, 10(21): 19234. DOI:10.1109/JIOT.2023.3281735 |
5. | Chencheng Ma, Xuehui Du, Lifeng Cao. Improved KNN Algorithm for Fine-Grained Classification of Encrypted Network Flow. Electronics, 2020, 9(2): 324. DOI:10.3390/electronics9020324 |
6. | Regis Francisco Teles Martins, Rodolfo da Silva Villaça, Fábio Luciano Verdi. BitMatrix: A Multipurpose Sketch for Monitoring of Multi-tenant Networks. Journal of Network and Systems Management, 2020, 28(4): 1745. DOI:10.1007/s10922-020-09556-7 |
7. | FeiXian Zhao, LiXin Ji, XiaoRui Gong, et al. Design and implementation of a 5G signaling parsing system using HTTP/2 protocol. Third International Conference on Electronic Information Engineering and Data Processing (EIEDP 2024), DOI:10.1117/12.3033197 |
8. | Salma Abdullah Aswad, Emrullah Sonuc. Classification of VPN Network Traffic Flow Using Time Related Features on Apache Spark. 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT), DOI:10.1109/ISMSIT50672.2020.9254893 |