[1]
A. Lakhina, M. Crovella, and C. Diot, Diagnosing network-wide traffic anomalies, " in ACM SIGCOMM , 04, Aug. (2004).
DOI: 10.1145/1030194.1015492
Google Scholar
[2]
Kompella, R. R., Singh, S., and Varghese, G. On scalable attack detection in the network. In ACM Internet Measurement Conference (New York, NY, USA, 2004), p.187–200.
DOI: 10.1145/1028788.1028812
Google Scholar
[3]
Estan, C., Savage, S., and Varghese, G. Automatically inferring patterns of resource consumption in network traffic. In ACM SIGCOMM (Karlsruhe, Germany, 2003), p.137–148.
DOI: 10.1145/863955.863972
Google Scholar
[4]
Huang, Y., Feamster, N., Lakhina, A., and Xu, J. J. Diagnosing network disruptions with network-wide analysis. In ACM SIGMETRICS (San Diego, CA, USA, 2007).
DOI: 10.1145/1269899.1254890
Google Scholar
[5]
T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experiences With DETER: A Testbed for Security Research. In 2nd IEEE TridentCom, March (2006).
DOI: 10.1109/tridnt.2006.1649172
Google Scholar
[6]
EMIST project. Evaluation methods for internet security technology. http: /www. isi. edu/deter/emist. temp. html.
Google Scholar
[7]
Graphical network emulator - GNS3, http: /www. gns3. net/, (2009).
Google Scholar
[8]
Wide project. http: /www. wide. ad. jp.
Google Scholar
[9]
Abilene Network operations center. http: /www. abilene. iu. edu.
Google Scholar
[10]
GEANT. The panEuropean research network. http: /www. geant2. net.
Google Scholar
[11]
Xin Li, Fang Bian, Mark Crovella, Christophe Diot, Ramesh Govindan, Gianluca Iannaccone, and Anukool Lakhina. Detection and identification of network anomalies using sketch subspaces. In IMC '06: Proceedings of the 6th ACM.
DOI: 10.1145/1177080.1177099
Google Scholar
[12]
Steve Uhlig, Bruno Quoitin, Jean Lepropre, and Simon Balon. Providing public intradomain traffic matrices to the research community. SIGCOMM Comput. Commun. Rev., 36(1): 83–86, (2006).
DOI: 10.1145/1111322.1111341
Google Scholar
[13]
Haakon Ringberg, Augustin Soule, and Jennifer Rexford. Webclass: adding rigor to manual labeling of traffic anomalies. SIGCOMM Comput. Commun. Rev., 38(1): 35–38, (2008).
DOI: 10.1145/1341431.1341437
Google Scholar
[14]
Joel Sommers and Paul Barford. Self-configuring network traffic generation. In Internet Measurement Conference, (2004).
DOI: 10.1145/1028788.1028798
Google Scholar