[1]
Internet Storm Center (DShield), http: /www. dshield. org.
Google Scholar
[2]
http: /www. predict. org.
Google Scholar
[3]
Y. Shavitt and E. Shir, DIMES: Let the Internet Measures Itself, ACM(Sigcomm) Computer Communication Review, Vol. 35, Issue 5, pp.71-74, Oct. (2005).
DOI: 10.1145/1096536.1096546
Google Scholar
[4]
M. Allman, P. Barford, B. Krishnamuthy, J. Wang, Tracking the Role of Adversaries in Measuring Unwanted Traffic, Proc. Of The Unix Second Workshop on Steps to Reducing Unwanted Traffic on the Internet, July (2006).
Google Scholar
[5]
Z. Chen, C. Ji, and P. Barford, Spatial-temporal characteristics of malicious sources, " Proc. of INFOCOM, 08 Mini-Conference, Phoenix, AZ, April (2008).
DOI: 10.1109/infocom.2008.299
Google Scholar
[6]
F. Soldo, A. Le, and A. Markopoulou, Predicative Blacklisting as an Implicit Recommendation System, Proc. Infocom (2010).
DOI: 10.1109/infcom.2010.5461982
Google Scholar
[7]
L. Huang, X. Nguyen, M. Garofalakis, J. Hellerstein, M. Jordon, A. Joseph, N. Taft, Communication-Efficient Online Detection of Network-Wide Anomalies, Proc. Infocom (2007).
DOI: 10.1109/infcom.2007.24
Google Scholar
[8]
S. Kandula, R. Mahajan, P. Verkaik, S. Agawal, J. Padhye, P. Bahl, Detailed Diagnosis in Enterprise Networks, Proc. Sigcomm (2009).
DOI: 10.1145/1592568.1592597
Google Scholar
[9]
M. Thottan, G. Liu and C. Ji, Anomaly Detection Approaches for Communication Networks, in Algorithms for Next Generation Networks, edited by G. Cormode and M. Thottan, Springer London, 239-261, Feb. (2010).
DOI: 10.1007/978-1-84882-765-3_11
Google Scholar
[10]
Z. Chen and C. Ji, Information Theoretical View of Network-Aware Attacks, IEEE Trans. Information Security and Forensics, Vol. 4, Issue 3, 530-541, Sept. (2009).
DOI: 10.1109/tifs.2009.2025847
Google Scholar
[11]
J. N. Tsitsiklis, Decentralized Detection, in Advances in Signal Processing, Vol. 2, H. V. Poor and J. B. Thomas, editors, JAI Press, 1993, pp.297-344.
Google Scholar
[12]
V. V. Veeravalli, T. Basar and H. V. Poor. Decentralized Sequential Detection with Sensors Performing Sequential Tests., Journal on Mathematics of Control Signals and Systems, 7(4): 292-305, December (1994).
DOI: 10.1007/bf01211521
Google Scholar
[13]
R. Duda, P. Hart and D. Stork, Pattern Classification, 2nd edition, John Willy and Sons, (2001).
Google Scholar