skip to main content
DOE PAGES title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Statistical methods for network surveillance

Authors:
 [1];  [2];  [3];  [2]
  1. Department of Statistics, University of California, Riverside CA USA
  2. Department of Mathematics and Statistics, University of San Francisco, San Francisco CA USA
  3. Moscow Institute of Physics and Technology, Moscow Russia, AGT StatConsult, Los Angeles CA USA
Publication Date:
Sponsoring Org.:
USDOE
OSTI Identifier:
1433427
Resource Type:
Publisher's Accepted Manuscript
Journal Name:
Applied Stochastic Models in Business and Industry
Additional Journal Information:
Journal Name: Applied Stochastic Models in Business and Industry Journal Volume: 34 Journal Issue: 4; Journal ID: ISSN 1524-1904
Publisher:
Wiley Blackwell (John Wiley & Sons)
Country of Publication:
United Kingdom
Language:
English

Citation Formats

Jeske, Daniel R., Stevens, Nathaniel T., Tartakovsky, Alexander G., and Wilson, James D. Statistical methods for network surveillance. United Kingdom: N. p., 2018. Web. doi:10.1002/asmb.2326.
Jeske, Daniel R., Stevens, Nathaniel T., Tartakovsky, Alexander G., & Wilson, James D. Statistical methods for network surveillance. United Kingdom. doi:10.1002/asmb.2326.
Jeske, Daniel R., Stevens, Nathaniel T., Tartakovsky, Alexander G., and Wilson, James D. Tue . "Statistical methods for network surveillance". United Kingdom. doi:10.1002/asmb.2326.
@article{osti_1433427,
title = {Statistical methods for network surveillance},
author = {Jeske, Daniel R. and Stevens, Nathaniel T. and Tartakovsky, Alexander G. and Wilson, James D.},
abstractNote = {},
doi = {10.1002/asmb.2326},
journal = {Applied Stochastic Models in Business and Industry},
number = 4,
volume = 34,
place = {United Kingdom},
year = {2018},
month = {4}
}

Journal Article:
Free Publicly Available Full Text
Publisher's Version of Record
DOI: 10.1002/asmb.2326

Citation Metrics:
Cited by: 5 works
Citation information provided by
Web of Science

Save / Share:

Works referenced in this record:

Remote detection of bottleneck links using spectral and statistical methods
journal, February 2009


Monitoring Time-Varying Network Streams Using State-Space Models
conference, April 2009

  • Cao, J.; Chen, A.; Bu, T.
  • 2009 Proceedings IEEE INFOCOM, IEEE INFOCOM 2009 - The 28th Conference on Computer Communications
  • DOI: 10.1109/INFCOM.2009.5062219

Controlling correlated processes of Poisson counts
journal, January 2007

  • Weiß, Christian H.
  • Quality and Reliability Engineering International, Vol. 23, Issue 6
  • DOI: 10.1002/qre.875

Detecting and identifying malware: a new signal processing goal
journal, September 2006


Anomaly detection in dynamic networks: a survey
journal, March 2015

  • Ranshous, Stephen; Shen, Shitian; Koutra, Danai
  • Wiley Interdisciplinary Reviews: Computational Statistics, Vol. 7, Issue 3
  • DOI: 10.1002/wics.1347

Asymptotically Optimal Quickest Change Detection in Distributed Sensor Systems
journal, November 2008


Adaptive Thresholds: Monitoring Streams of Network Counts
journal, March 2006

  • Lambert, Diane; Liu, Chuanhai
  • Journal of the American Statistical Association, Vol. 101, Issue 473, p. 78-88
  • DOI: 10.1198/016214505000000943

Stochastic blockmodels and community structure in networks
journal, January 2011


A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
journal, September 2006

  • Tartakovsky, A. G.; Rozovskii, B. L.; Blazek, R. B.
  • IEEE Transactions on Signal Processing, Vol. 54, Issue 9
  • DOI: 10.1109/TSP.2006.879308

SPC methods for nonstationary correlated count data with application to network surveillance
journal, May 2014

  • Fu, Yingzhuo; Jeske, Daniel R.
  • Applied Stochastic Models in Business and Industry, Vol. 30, Issue 6
  • DOI: 10.1002/asmb.2038

Monitoring Temporal Homogeneity in Attributed Network Streams
journal, January 2016


An Overview of Phase I Analysis for Process Improvement and Monitoring
journal, July 2014

  • Jones-Farmer, L. Allison; Woodall, William H.; Steiner, Stefan H.
  • Journal of Quality Technology, Vol. 46, Issue 3
  • DOI: 10.1080/00224065.2014.11917969

A bootstrap based space–time surveillance model with an application to crime occurrences
journal, February 2008


Detection of intrusions in information systems by sequential change-point methods
journal, July 2006

  • Tartakovsky, Alexander G.; Rozovskii, Boris L.; Blažek, Rudolf B.
  • Statistical Methodology, Vol. 3, Issue 3
  • DOI: 10.1016/j.stamet.2005.05.003

Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise
journal, August 2008

  • Mirkovic, Jelena; Reiher, Peter; Papadopoulos, Christos
  • IEEE Transactions on Computers, Vol. 57, Issue 8
  • DOI: 10.1109/TC.2008.42

Mining social networks for anomalies: Methods and challenges
journal, June 2016


Understanding sources of variation in syndromic surveillance for early warning of natural or intentional disease outbreaks
journal, June 2010


Towards a taxonomy of intrusion-detection systems
journal, April 1999


Understanding passive and active service discovery
conference, January 2007

  • Bartlett, Genevieve; Heidemann, John; Papadopoulos, Christos
  • Proceedings of the 7th ACM SIGCOMM conference on Internet measurement - IMC '07
  • DOI: 10.1145/1298306.1298314

An overview and perspective on social network monitoring
journal, August 2016


H-likelihood: problems and solutions
journal, February 2007


Some Current Directions in the Theory and Application of Statistical Process Monitoring
journal, January 2014


Mining anomalies using traffic feature distributions
conference, January 2005

  • Lakhina, Anukool; Crovella, Mark; Diot, Christophe
  • Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '05
  • DOI: 10.1145/1080091.1080118

Expectation-based scan statistics for monitoring spatial time series data
journal, July 2009


Portrait of Political Party Polarization
journal, April 2013


Dynamic modularity in protein interaction networks predicts breast cancer outcome
journal, February 2009

  • Taylor, Ian W.; Linding, Rune; Warde-Farley, David
  • Nature Biotechnology, Vol. 27, Issue 2
  • DOI: 10.1038/nbt.1522

Research Issues and Ideas in Statistical Process Control
journal, October 1999


Using signal processing to analyze wireless data traffic
conference, January 2002

  • Partridge, Craig; Cousins, David; Jackson, Alden W.
  • Proceedings of the ACM workshop on Wireless security - WiSE '02
  • DOI: 10.1145/570681.570689

EWMA Monitoring of Correlated Processes of Poisson Counts
journal, January 2009


Efficient Computer Network Anomaly Detection by Changepoint Detection Methods
journal, February 2013

  • Tartakovsky, Alexander G.; Polunchenko, Aleksey S.; Sokolov, Grigory
  • IEEE Journal of Selected Topics in Signal Processing, Vol. 7, Issue 1
  • DOI: 10.1109/JSTSP.2012.2233713

Scan Statistics on Enron Graphs
journal, October 2005

  • Priebe, Carey E.; Conroy, John M.; Marchette, David J.
  • Computational and Mathematical Organization Theory, Vol. 11, Issue 3, p. 229-247
  • DOI: 10.1007/s10588-005-5378-z

On the trail of intrusions into information systems
journal, December 2000


Performance analysis of content matching intrusion detection systems
conference, January 2004

  • Antonatos, S.; Anagnostakis, K. G.; Markatos, E. P.
  • 2004 International Symposium on Applications and the Internet, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436)
  • DOI: 10.1109/SAINT.2004.1266118

Cusum techniques for timeslot sequences with applications to network surveillance
journal, October 2009

  • Jeske, Daniel R.; Montes De Oca, Veronica; Bischoff, Wolfgang
  • Computational Statistics & Data Analysis, Vol. 53, Issue 12
  • DOI: 10.1016/j.csda.2009.05.029

Likelihood-Based EWMA Charts for Monitoring Poisson Count Data With Time-Varying Sample Sizes
journal, May 2012

  • Zhou, Qin; Zou, Changliang; Wang, Zhaojun
  • Journal of the American Statistical Association, Vol. 107, Issue 499
  • DOI: 10.1080/01621459.2012.682811

Quickest detection in censoring sensor networks
conference, July 2011

  • Mei, Yajun
  • 2011 IEEE International Symposium on Information Theory - ISIT, 2011 IEEE International Symposium on Information Theory Proceedings
  • DOI: 10.1109/ISIT.2011.6034390

Identification of Repeated Denial of Service Attacks
conference, April 2006

  • Hussain, A.; Heidemann, J.; Papadopoulos, C.
  • Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications
  • DOI: 10.1109/INFOCOM.2006.126

An Active Splitter Architecture for Intrusion Detection and Prevention
journal, January 2006

  • Xinidis, K.; Charitakis, I.; Antonatos, S.
  • IEEE Transactions on Dependable and Secure Computing, Vol. 3, Issue 1
  • DOI: 10.1109/TDSC.2006.6

A cusum change-point detection algorithm for non-stationary sequences with application to data network surveillance
journal, July 2010

  • Montes De Oca, Veronica; Jeske, Daniel R.; Zhang, Qi
  • Journal of Systems and Software, Vol. 83, Issue 7
  • DOI: 10.1016/j.jss.2010.02.006

Community detection in graphs
journal, February 2010


Fault detection in an Ethernet network using anomaly signature matching
conference, January 1993

  • Feather, Frank; Siewiorek, Dan; Maxion, Roy
  • Conference proceedings on Communications architectures, protocols and applications - SIGCOMM '93
  • DOI: 10.1145/166237.166264

Adaptive thresholding for proactive network problem detection
conference, January 1998


Anomaly detection in online social networks
journal, October 2014