2009
DOI: 10.1007/978-3-642-00975-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Beyond Shannon: Characterizing Internet Traffic with Generalized Entropy Metrics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
20
0
4

Year Published

2014
2014
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 38 publications
(25 citation statements)
references
References 13 publications
1
20
0
4
Order By: Relevance
“…Nychis in [8], based on his results of pairwise correlation reported dependencies between addresses and ports and recommended the use of volume-based and behavior-based feature distributions. In opposite, Tellenbach in [15] found no correlation among header-based features.…”
Section: Detection Via Feature Distributionsmentioning
confidence: 92%
See 4 more Smart Citations
“…Nychis in [8], based on his results of pairwise correlation reported dependencies between addresses and ports and recommended the use of volume-based and behavior-based feature distributions. In opposite, Tellenbach in [15] found no correlation among header-based features.…”
Section: Detection Via Feature Distributionsmentioning
confidence: 92%
“…In several review papers [26][27][28][29][30][31][32] various network anomaly detection methods have been summarized. From aforementioned surveys one can find that the most effective methods of network anomaly detection are Principle Component Analysis [33][34][35], Wavelet analysis [36][37][38], Markovian models [39,40], Clustering [41][42][43], Histograms [44,45], Sketches [46,47], and Entropies [8,15,48].…”
Section: General Overview Of Network Anomaly Techniquesmentioning
confidence: 99%
See 3 more Smart Citations