References
- D. Moore, G. M. Voelker, and S. Savage, 'Inferring Internet Denial-of-Service Activity,' presented at The 2001 USENIX Security Symposium, 2001
- M. Thottan and C. Ji, 'Anomaly Detection in IP Networks,' IEEE Transactions on Signal Processing, vol. Vol. 51, No.8, 2003 https://doi.org/10.1109/TSP.2003.814797
- A. Hussain, J. Heidemann, and C. Papadopoulos, 'A Framework for Classifying Denial of Service Attacks,' presented at SIGCOMM, 2003
- A. Lakhina, M. Crovella, and C. Diot, 'Characterization of Network-Wide Anomalies in Traffic Flows,' presented at The ACM/SIGCOMM Internet Measurement Conference, 2004 https://doi.org/10.1145/1028788.1028813
- W.-Leland, M.-Taqqu, W.-Willinger, and D.-Wilson, 'On the Self-Similar Nature of Ethernet Traffic,' in Computer Communication Review: ACM, 1992, pp. 203-213 https://doi.org/10.1145/167954.166255
- W. Walter, T. Murad, and S. Robert, 'Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Srouce Level,' in Proceedings of SIGCOMM '95. Cam-brideg, MA, USA, 1995, pp. 100-113 https://doi.org/10.1145/217391.217418
- A. C. G. A. -Feldmann and W. -Willinger, 'Data networks as cascades: Investigating the multi-fractal nature of Internet WAN traffic,' ACM Computer Communication Review, vol. 28 %8 Sept 1998, pp. 42-55, 1998 https://doi.org/10.1145/285243.285256
- V. Paxson, 'An analysis of using reflectors for distributed denial-of-service attacks,' presented at ACM SIGCOMM Computer Communication Review, 2001 https://doi.org/10.1145/505659.505664
- Z.-L. Zhang, V. J Ribeiro, S. Moon, and C. Diot, 'Small-Time Scaling Behaviors of Internet Backbone Traffic: An Empirical Study,' presented at IEEE INFOCOM, 2003 https://doi.org/10.1109/INFCOM.2003.1209205
- P. Barford and D. Plonka, 'Characteristics of Network Traffic Flow Anomalies,' presented at ACM Internet Measurement Workshop '01, San Francisco. CA, USA, 2001 https://doi.org/10.1145/505202.505211
- M. Crovella and E. Kolazcyk, 'Graph Wavelets for Spatial Traffic Analysis,' presented at IEEE INFOCOM, 2003 https://doi.org/10.1109/INFCOM.2003.1209207
- A. Lakhina, M. Crovella, and C. Diot, 'Diagnosing Network-Wide Traffic Anomalies,' presented at ACM SIGCOMM 2004, 2004 https://doi.org/10.1145/1030194.1015492
- A. Lakhina, M. Crovella, and C. Diot, 'Mining Anomalies Using Traffic Feature Distributions' https://doi.org/10.1145/1080091.1080118
- K. Xu, Z.-L. Zhang, and S. Bhattacharyya, 'Profiling Interent Backbone Traffic: Behavior Models and Applications,' presented at ACM SIGCOMM, Philadelphia, Pennsylvania, USA, 2005 https://doi.org/10.1145/1080091.1080112
- L. Feinstein, D. Schnackenberg, R. Balupari, and D. Kindred, 'Statistical Approaches to DDoS Attack Detection and Response,' presented at The DARPA information Survivability Conference and Exposition (DlSCEX'03), 2003
- C. Z. Cliff, G. Weibo, T. Don, and G. Lixin, 'Monitoring and Early Detection of Internet Worms,' IEEE/ACM Trans. on Networking https://doi.org/10.1109/TNET.2005.857113
- tcpdump/lipcap, 'TCPDUMP public repository,' in http://www.tcpdump.org
- Ethereal, 'The world's most popular network protocol analyzer,' in http://www.ethereal.com/.
- Sprint, 'Packet Trace Analysis,' in http://ipmon.sprint.com/packstat/packetoverview.php
- MySQL, 'The World's Most Popular Open Source Database,' in http://www.mysql.com
- T. Darmohray and R. Oliver, ''Hot Spares' For DoS Attacks,' in http://www.usenix.org/publications/login/200-7/apropos.html. ;login:, 2000
- R. R. Panko, Corporate Computer and Network Security: Prentice Hall, 2004
- R. A. Johnson and D. W. Wichern, Applied multivariate statistical analysis, 5 ed: Prentice Hall, 2002
- Anderson and Darling, 'Asymptotic theory of certain goodness of fit criteria based on stochastic process,' Annals of Mathematical Statistics, vol. 23, pp, 193-212, 1952 https://doi.org/10.1214/aoms/1177729437