Discrete wavelet transform-based time series analysis and mining
P Chaovalit, A Gangopadhyay, G Karabatis… - ACM Computing …, 2011 - dl.acm.org
Time series are recorded values of an interesting phenomenon such as stock prices,
household incomes, or patient heart rates over a period of time. Time series data mining …
household incomes, or patient heart rates over a period of time. Time series data mining …
Performance debugging for distributed systems of black boxes
MK Aguilera, JC Mogul, JL Wiener… - ACM SIGOPS …, 2003 - dl.acm.org
Many interesting large-scale systems are distributed systems of multiple communicating
components. Such systems can be very hard to debug, especially when they exhibit poor …
components. Such systems can be very hard to debug, especially when they exhibit poor …
Blink: Fast connectivity recovery entirely in the data plane
In this paper, we explore new possibilities, created by programmable switches, for fast
rerouting upon signals triggered by Internet traffic disruptions. We present Blink, a data …
rerouting upon signals triggered by Internet traffic disruptions. We present Blink, a data …
Statistical methods for network surveillance
DR Jeske, NT Stevens, AG Tartakovsky… - … Stochastic Models in …, 2018 - Wiley Online Library
The term network surveillance is defined in general terms and illustrated with many
examples. Statistical methodologies that can be used as tools for network surveillance are …
examples. Statistical methodologies that can be used as tools for network surveillance are …
Graph wavelets for spatial traffic analysis
M Crovella, E Kolaczyk - … Annual Joint Conference of the IEEE …, 2003 - ieeexplore.ieee.org
A number of problems in network operations and engineering call for new methods of traffic
analysis. While most existing traffic analysis methods are fundamentally temporal, there is a …
analysis. While most existing traffic analysis methods are fundamentally temporal, there is a …
[PDF][PDF] Network anomaly detection based on wavelet analysis
W Lu, AA Ghorbani - EURASIP Journal on Advances in Signal processing, 2008 - Springer
Signal processing techniques have been applied recently for analyzing and detecting
network anomalies due to their potential to find novel or unknown intrusions. In this paper …
network anomalies due to their potential to find novel or unknown intrusions. In this paper …
[PDF][PDF] On a new class of pulsing denial-of-service attacks and the defense.
In this paper we analyze a new class of pulsing denialof-service (PDoS) attacks that could
seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of …
seriously degrade the throughput of TCP flows. During a PDoS attack, periodic pulses of …
Use of spectral analysis in defense against DoS attacks
We propose using spectral analysis to identify normal TCP traffic so that it will not be
dropped or rate-limited in defense against denial of service (DoS) attacks. The approach can …
dropped or rate-limited in defense against denial of service (DoS) attacks. The approach can …
NetDiagnoser: Troubleshooting network unreachabilities using end-to-end probes and routing data
The distributed nature of the Internet makes it difficult for a single service provider to
troubleshoot the disruptions experienced by its customers. We propose NetDiagnoser, a …
troubleshoot the disruptions experienced by its customers. We propose NetDiagnoser, a …
Application of anomaly detection algorithms for detecting SYN flooding attacks
VA Siris, F Papagalou - Computer communications, 2006 - Elsevier
We investigate statistical anomaly detection algorithms for detecting SYN flooding, which is
the most common type of Denial of Service (DoS) attack. The two algorithms considered are …
the most common type of Denial of Service (DoS) attack. The two algorithms considered are …