Building.Internet.Firewalls(2nd.edt.2000).pdf 27-Aug-2006 04:38 4.9M
Firewall.and.Proxy.Server.HowTo..pdf 27-Aug-2006 04:38 184k
Firewall.and.Proxy.Server.HowTo.pdf 27-Aug-2006 04:38 114k
Network.Security.with.Open.SSL.(2002).pdf 27-Aug-2006 04:38 2.4M
Practical.Firewalls.pdf 27-Aug-2006 04:38 3.2M
hxxp://magickal1.com/security/
01-conceitos.pdf 28-Mar-2003 17:35 94k
02-prevencao.pdf 28-Mar-2003 17:36 118k
03-privacidade.pdf 28-Mar-2003 17:36 78k
04-fraudes.pdf 28-Mar-2003 17:36 93k
05-banda-larga-wireless.pdf 28-Mar-2003 17:36 56k
06-spam.pdf 28-Mar-2003 17:36 48k
07-incidentes.pdf 28-Mar-2003 17:36 67k
08-checklist.pdf 28-Mar-2003 17:36 48k
09-glossario.pdf 28-Mar-2003 17:36 40k
3com Security on Data over Systems 100599.pdf 30-Dec-2002 16:13 552k
5200.28-STD.pdf 30-Dec-2002 16:13 413k
ADM_Checklist.pdf 28-Mar-2003 17:36 37k
ADM_Redes.pdf 28-Mar-2003 17:37 267k
Cisco ACL.pdf 30-Dec-2002 16:13 19k
Cisco Configuring PIX Firewall.pdf 30-Dec-2002 16:13 82k
Cisco IP VPN Solutions for Service Providers 280599.ppt 30-Dec-2002 16:13 1.1M
Cisco ISP Security Issues.pdf 30-Dec-2002 16:13 2.0M
Cisco ISP Security Issues.ppt 30-Dec-2002 16:14 4.0M
Cisco Increasing Security on IP Networks 190996.pdf 30-Dec-2002 16:13 83k
Cisco Internet Firewall Technology Tutorial 280599.ppt 30-Dec-2002 16:13 1.8M
Cisco Secure Internet Access - VPNs.ppt 30-Dec-2002 16:14 1.9M
Demystifying Cisco Access Control Lists.doc 30-Dec-2002 16:14 32k
Demystifying Cisco Access Control Lists.pdf 30-Dec-2002 16:14 14k
FAQ Firewall.ps 30-Dec-2002 16:14 1.8M
FAQ Network Intrusion Detection Systems.doc 30-Dec-2002 16:14 390k
FAQ Windows NT Security.doc 30-Dec-2002 16:14 455k
FAQ ipchains.ps 30-Dec-2002 16:14 53k
FIPS PUB 191 Federal Information Processing Standards Publication 191.doc 30-Dec-2002 16:14 352k
GTER13-Detecao_Ataques_Netflow.ppt 30-Dec-2002 16:15 273k
Hacking Cisco Routers.pdf 30-Dec-2002 16:15 19k
IPSec.ppt 30-Dec-2002 16:15 46k
ISP_security.zip -Dec-2002 16:15 3.7M
ISS Real Secure.pdf 30-Dec-2002 16:15 97k
Microsoft Proxy Server Security Evaluation.doc 30-Dec-2002 16:15 630k
Microsoft Understanding PPTP.doc 30-Dec-2002 16:15 341k
Microsoft Windows NT PPTP.doc 30-Dec-2002 16:16 338k
Microsoft Windows NT Server Security Features.doc 30-Dec-2002 16:16 1.3M
Motorola vpn-vanguard340.ZIP 30-Dec-2002 16:16 8k
NCISSE_practices.pdf 30-Dec-2002 16:16 81k
NCSC-TG-005.pdf 30-Dec-2002 16:16 1.2M
Network_Sniffing.pdf 30-Dec-2002 16:16 164k
Nokia Firewall IP 600.pdf 30-Dec-2002 16:16 144k
PROXIES.ZIP 30-Dec-2002 16:19 40k
Paper - Detec%e7%e3o de Intrus%e3o em Toda a Empresa.PDF 30-Dec-2002 16:16 2.3M
Paper Com%e9rcio Eletr%f4nico.ppt 30-Dec-2002 16:16 6.4M
Paper Considera%e7%f5es de Seguran%e7a em Redes de Cabo N%edvel 2 para Tr%e1fego IP.doc 30-Dec-2002 16:16 959k
Paper Crypto overview.ppt 30-Dec-2002 16:17 2.5M
Paper Firewall.ppt 30-Dec-2002 16:17 516k
Paper Hacking.doc 30-Dec-2002 16:17 2k
Paper Internet Security Policy.doc 30-Dec-2002 16:17 953k
Paper Introduction to Internet Security 2.ppt 30-Dec-2002 16:17 213k
Paper Introduction to Internet Security.ppt 30-Dec-2002 16:17 256k
Paper Intrusion detection with TCPDUMP.doc 30-Dec-2002 16:17 88k
Paper Managing Employee Internet Access.doc 30-Dec-2002 16:17 808k
Paper Norma DNS Server.pdf 30-Dec-2002 16:17 6k
Paper Norma Seguran%e7a.pdf 30-Dec-2002 16:18 17k
Paper Norma Solicita%e7%e3o.pdf 30-Dec-2002 16:18 6k
Paper Practical.Exercise.Securing.OpenVMS.doc 30-Dec-2002 16:18 103k
Paper Pr%e1ticas de Seguran%e7a.pdf 30-Dec-2002 16:18 264k
Paper SPAM.pdf 30-Dec-2002 16:19 69k
Paper Security Considerations at MCI.doc 30-Dec-2002 16:18 568k
Paper Seguranca Redes.pdf 16-Jul-2003 09:00 316k
Paper Seguran%e7a NCISSE.pdf 30-Dec-2002 16:18 81k
Paper Seguran%e7a WWW.ppt 30-Dec-2002 16:18 96k
Paper VPN Virtual Private Networks.pdf 30-Dec-2002 16:19 296k
Paper Windows NT seguranca.ppt 30-Dec-2002 16:19 379k
Quebra Senhas Nortel.txt 30-Dec-2002 16:19 1k
Router Security Confg Ghide.pdf 30-Dec-2002 16:19 2.3M
SEC-2007.pdf 06-Mar-2005 21:50 1.2M
Securing-Optimizing-Linux-RH-Edition-v1.3.pdf 06-Mar-2005 21:46 4.9M
Seguran%e7a em Unix.ppt 30-Dec-2002 16:19 96k
Seguran%e7a no Backbone.pdf 30-Dec-2002 16:19 55k
Seguran%e7a.ZIP 30-Dec-2002 16:19 401k
SpecialReportIPVPNs.pdf 30-Dec-2002 16:20 531k
WG SPAM.doc 30-Dec-2002 16:20 4k
WatchGuard Eval v1.5.doc 30-Dec-2002 16:20 122k
csirts.pdf 07-Mar-2005 08:00 85k
gter14worm.ppt 30-Dec-2002 16:15 4.3M
mac_address_cloning.pdf 30-Dec-2002 16:15 158k
hxxp://www.inforede.net/Technical/Layer_3_and_4/Network_Security/
This is an archive of various document about network flow analysis and how this pertains to the Holt Winters forecasting method.
Network Analysis
.RData 108.8 KB 2005-May-25
.Rhistory 3.9 KB 2005-May-25
06_03_end_arima_corrected[1].pdf 134.4 KB 2005-Feb-04 A practical approach to forecast Quality of Service parameters considering outliers
35JS_Lyon_Melard.pdf 23.5 KB 2004-Oct-20 Using a spreadsheet for temporal series analysis
173.pdf 1.1 MB 2005-Feb-04 A Signal Analysis of Network Traffic Anomalies
511-Classification_Final.pdf 1.8 MB 2005-Jan-04 Flow classification using historgrams (FR)
538-Sigmetrics04.pdf 455.9 KB 2005-Jan-04 How to Identify and Estimate the Largest Traffic Matrix Elements in a Dynamic Environment
2004-008-whole-network-anomalies.pdf 262.4 KB 2005-Mar-04 diagnosing network wide traffic anomalies
2004-020-traffic-flow-anomalies.pdf 102.6 KB 2005-Mar-04 characterization of network-wide anomalies in traffic flows
accurate-scalable-in-network.pdf 185.1 KB 2005-Feb-04 Accurate, Scalable InNetwork Identification of P2P Traffic Using Application Signatures
al.dat 642.0 B 2004-Oct-21 sample data file
an-empirical-analysis-of.pdf 1.4 MB 2005-Feb-04 an empirical analysis of target resident dos filters
Annex_B_The_Holt-Winters_forecasting_method.pdf 30.5 KB 2004-Oct-20 How HoltWinters forecasting works
Annex_C_The_cubic_spline_interpolation_method.pdf 36.0 KB 2004-Oct-20 How CubicSpline interpolation works
appendix-timeseries-regression.pdf 176.8 KB 2004-Oct-21 appendix to R and S-plus to applied regression
automated_generation_of_alert_graphs.pdf 154.6 KB 2005-Mar-04 constructing attack graphs in network security context
barbara-sdm01[1].pdf 152.6 KB 2005-Feb-04 detecting novel network intrusion using bayes estimators
barford01characteristics[1].pdf 458.2 KB 2005-Mar-03 characteristics of network traffic flow anomalies
barford02signal.pdf 1.1 MB 2005-May-25 A Signal Analysis of Network Traffic Anomalies
BasicForecastingMethods.ppt 2.1 MB 2004-Oct-19 slides presenting various methods of forecasting
Behavior-Based.pdf 133.4 KB 2004-Oct-05 behaviour based ids, lanscope
bier.dat 2.8 KB 2004-Oct-21 data file
brutlag.pdf 116.4 KB 2004-Oct-21 aberrant behaviour detection in time series for network monitoring
cabrera01proactive[1].pdf 109.3 KB 2005-Feb-04 proactive detection of distributed denial of services attacks using mib traffic variables
characterization-of-network-wide.pdf 146.4 KB 2005-Feb-04 Characterization of Network-Wide Anomalies in Traffic Flows
comparing-data-streams-using.pdf 148.5 KB 2005-Feb-04 Comparing Data Streams Using Hamming Norms (How to Zero In)
Cours-prevision-Oct-2004.ppt 1,010.0 KB 2004-Oct-20 FR
cow.dat 225.0 B 2004-Oct-20 data file
D-034[1].pdf 42.9 KB 2005-Feb-04 Previsi??e demanda de servicios de banda ancha
data.csv 11.6 KB 2004-Oct-20 data file
data2.txt 13.8 KB 2004-Oct-20 data file
DebWes01.pdf 223.7 KB 2004-Jul-05 Aggregation and Correlation of Intrusion detection alerts
demoHW.xls 63.0 KB 2004-Oct-19 excel demo for Holtwinter forecasting
detecting-traffic-anomalies-at.pdf 464.8 KB 2005-Feb-04 Detecting Traffic Anomalies at the Source through aggregate analysis of packet header data
dibsoverview.ppt 720.5 KB 2004-Dec-15 early detection of internet worms
DSS_Interface_Project.xls 277.0 KB 2004-Oct-20 HoltWinter estimation using excel
elvin_correlation_thesis.ps 449.0 KB 2004-Jul-05 reviews of existing event correlation products and discusses correlation of elvin traffic
emsoft03 (1).pdf 174.9 KB 2004-Jul-05
emsoft03.pdf 186.7 KB 2004-Jul-05 Event Correlation: Language and Semantics
epfl_summer_workshop.pdf 586.5 KB 2004-Oct-19 internet performance measurement
etsfnnm.pdf 121.1 KB 2005-Feb-04 Evolving Time Series Forecasting Neural Network Models
euexp.dat 334.0 B 2004-Oct-21 data file
flow.ps 630.5 KB 2005-Feb-04
forecasting.pdf 99.7 KB 2004-Jul-19 simple description of forecasting algorithms (HW or BoxJenkins)
forecasting_teaching_plan.pdf 26.5 KB 2004-Oct-20
Forecast Pro brochure for web.pdf 2.2 MB 2004-Oct-20
forecast_0.994.zip 1.4 MB 2004-Oct-20
fpbrochure(1).pdf 166.5 KB 2004-Oct-20
fSeries.pdf 370.8 KB 2004-Oct-21 financial software collection for R
fullrefman.pdf 11.2 MB 2004-Oct-21 R usage/programming guide
holtwin.xls 183.0 KB 2004-Oct-20 hw calc using excel
hussain03framework.pdf 612.7 KB 2005-Feb-04 A Framework for Classifying Denial of Service Attacks
idamap99-09.pdf 542.4 KB 2005-Feb-04 modeling multivariate time series
ieee_trans_networking_2001.pdf 479.9 KB 2004-Oct-20 realtime estimation of the parameters of long range dependence
ijofpaper.pdf 266.4 KB 2004-Oct-19 Long lead-time forecasting of UK air passengers by Holt Winters
imi_korea_august_2004.pdf 12.0 MB 2004-Oct-19 Network Tomography and Internet Traffic Matrices
intv2-8[1].pdf 87.0 KB 2005-Feb-04 Interpreting Network Traffic: A Network Intrusion Detector.s Look at Suspicious Events
kruegel03acsac.pdf 365.3 KB 2005-Feb-04 Bayesian Event Classification for Intrusion Detection
lakhina03structural.pdf 693.4 KB 2005-Feb-04 structural analysis of network traffic flows
lakhina04diagnosing.pdf 440.6 KB 2005-Feb-04 diagnosing network wide traffic anomalies
MakridakisbyFaria.pdf 122.9 KB 2004-Oct-20 Review of book on forecasting
manual-a4.pdf 1.4 MB 2004-Oct-20 gretl manual / gnu regression econometrics and TS library
markopoulou04characterization.pdf 669.7 KB 2005-Feb-04 characterization of failures in ip backbone
martingale_queueing_systems.pdf 333.6 KB 2004-Oct-19
mizuno92security.pdf 117.9 KB 2005-Feb-04 a security flow control algorithm and its denotational semantics correctness proof
monitor-ethernet1-2.dump 16.4 KB 2004-Oct-21
monitor-ethernet1-2.txt 125.8 KB 2004-Oct-20
monitor-ethernet1-2.xls 109.0 KB 2004-Oct-21
monitor-ethernet1-2.xml 125.8 KB 2004-Oct-20
monitor-ethernet1-hour.html 183.3 KB 2004-Oct-20
monitor-ethernet1.dump 106.5 KB 2004-Oct-21
monitor-ethernet1.xml 1,013.5 KB 2004-Oct-20
mont1-2.csv 5.9 KB 2004-Oct-21
mont1-3.csv 6.0 KB 2004-Oct-21
moon.pdf 443.4 KB 2004-Nov-05 detection of routing loops and analysis of its causes
MorDeb03.pdf 206.5 KB 2004-Jul-05 Correlation of Intrusion Symptoms : an Application of Chronicles
MPC03-153[1].pdf 2.6 MB 2005-Feb-04 Automated Data Collection, Analysis, and Archival.
nsfpi0402.pdf 45.6 KB 2004-Jul-19 correlating heterogeneous measurement data to achieve system-level analysis
nts13-roughan.pdf 87.4 KB 2004-Oct-20 IP Forwarding Anomalies and Improving their Detection Using Multiple Data Sources
opr02MUC.pdf 610.2 KB 2005-Jan-04 Flow Classification by Histograms
OSSIM-desc-en.pdf 252.3 KB 2004-Jun-29 Open Source Security Information Management
paper336.pdf 38.6 KB 2005-Mar-02 Application of Neural Networks to Intrusion Detection
paperD5.pdf 127.0 KB 2004-Oct-20 A FORECASTING MODEL FOR INTERNET SECURITY ATTACKS
pegels.pdf 141.3 KB 2005-May-08 Forecasting based on state space models for exponential smoothing
ppoly-spyce-pdf-May-04.pdf 335.8 KB 2004-Jul-19 Probabilistic Polynomial-Time Process Calculus for Security Protocol Analysis
protection-against-ddos-attacks.pdf 136.7 KB 2005-Feb-04 Protection Against DDoS Attacks Based On Traffic Level Measurements
ramadas03raid.ps.gz.ps 504.4 KB 2005-Feb-04
randwalk.xls 119.0 KB 2004-Oct-20
rrdtool.ppt 70.5 KB 2004-Dec-02 RRDTOOL presentation
r_workshop.pdf 521.0 KB 2004-Oct-20 Statistical Analysis with R - QuickStart
S10P02.pdf 148.5 KB 2005-Feb-04 Comparing Data Streams Using Hamming Norms
saiscos.pdf 56.1 KB 2004-Oct-21
SAMOA-Bibliografie[1].pdf 559.4 KB 2005-Feb-04 Annotierte Bibliographie zumThemenkreis : Mobile Agenten und Intrusion Detection Systeme
sdm02-13.pdf 178.7 KB 2005-Feb-04 Extracting Precursor Rules from Time Series
server_flows.pdf 94.0 KB 2005-Feb-04 Behavioral Authentication of Server Flows
sigmetrics_2003_poster.pdf 106.1 KB 2004-Oct-20 Performance of estimated traffic matrices in traffic engineering
sigmetrics_2004.pdf 40.7 KB 2004-Oct-20 Combining Routing and Traffic Data for Detection of IP Forwarding Anomalies
sketch-based-change-detection.pdf 204.6 KB 2005-Feb-04 Sketchbased Change Detection: Methods, Evaluation, and Applications
Smoothing.pdf 119.3 KB 2004-Oct-19
ss2002_01.pdf 26.1 KB 2004-Oct-21
ss2002_02.pdf 85.5 KB 2004-Oct-21
ss2002_07.pdf 35.1 KB 2004-Oct-21
StormCast.pdf 944.7 KB 2005-Feb-04 A cooperative caching system using GDSP algorithm
Streilein-Detection-Paper[1].pdf 1.1 MB 2005-Feb-04 Detecting Flood-based Denial-of-Service Attacks with SNMP/RMON
thesis.pdf 1.9 MB 2005-Feb-04 Design and implementation of a network resource service for QOS aware servers
tq.pdf 348.8 KB 2004-Oct-20
traffic-flow-anomalies.pdf 2.7 MB 2005-Feb-04 Characteristics of Network Traffic Flow Anomalies
TRB2003-000655[1].pdf 170.0 KB 2005-Feb-04 Effect of Missing Value Imputations on Traffic Parameters
ts_r_intro.pdf 276.6 KB 2004-Oct-20 Time Series Analysis with R
tui.dat 17.4 KB 2004-Oct-21 data file
urls.txt 378.0 B 2005-Nov-23
yen.dat 3.2 KB 2004-Oct-21 data file
zr_skript_2004.pdf 1.4 MB 2004-Oct-21 Zeitreihenanalysis
zr_skript_korrekturen.pdf 73.6 KB 2004-Oct-21
___contents.txt 8.5 KB 2005-Mar-11
hxxp://www.barbich.net/holt/
index of parent directory
MRTG-Implementation-Manual.pdf 18-May-2006 12:00 1.4M
Network Protocol Analyzers.doc 18-May-2006 12:00 837K
Sniffer Pro 47_Getting Started Guide.pdf 18-May-2006 12:00 2.4M
Sniffer Pro Certification.pdf 18-May-2006 12:00 954K
Using The Domain Name System.doc 18-May-2006 12:00 76K
dns_ptr.pdf 18-May-2006 12:00 117K
packet capture.ppt 18-May-2006 12:00 190K
sniffer_protocol.pdf 18-May-2006 12:00 1.6M
snort_manual.pdf 18-May-2006 12:00 484K
hxxp://ictlab.tyict.vtc.edu.hk/~tsangkt/en/Reference/Network Management/
index of parent directory
Abdelzaher 2004 A Communication Architecture and Programming Abstractions for Real-Time Embedded Sensor Networks.pdf 20-Jun-2005 14:20 60k
Akyildiz 2002 Wireless sensor networks a survey.pdf 29-May-2005 15:25 266k
Al-Karaki 2004 Routing Techniques in Wireless Sensor Networks A Survey.pdf 30-Jan-2005 23:28 435k
Augustin 2005 Pocket Switched Networks Real-world mobility and its consequences for oppourtunistic forwarding.pdf 06-May-2005 20:25 766k
Elson 2005 Wireless Sensor Networks A New Regime for Time Synchronization.pdf 15-May-2005 10:57 81k
Englund 2004 RFID in Wireless Sensor Network.pdf 27-Mar-2005 11:43 705k
Goodman 2004 The Wireless Internet Promises and Challenges.pdf 15-May-2005 10:52 145k
Hill The Platforms ENABLING Wireless Sensor Networks.pdf 23-Mar-2005 22:50 152k
Huang 2005 Dynamic Coverage in Ad-Hoc Sensor Networks.pdf 23-Mar-2005 23:06 196k
Intel 2005 Overview of Wireless Sensor Networks.pdf 20-May-2005 09:37 182k
Krco 2005 P2P Mobile Sensor Network.pdf 23-Mar-2005 22:44 258k
Lewis 2004 WirelessSensorNetChap04.pdf 29-May-2005 15:32 1.9M
Megerian 2002 Exposure in Wireless Sensor Networks Theory and Practical Solutions.pdf 23-Mar-2005 23:03 288k
WSN 2005 Lectures/ 18-Sep-2005 17:54 -
Want 2004 Enabling Ubiquitous Sensing with RFID.pdf 27-Mar-2005 12:25 633k
cs451-WSN-UVa.pdf 20-Jun-2005 14:40 82k
hxxp://www.srcf.ucam.org/~ww250/wsn/
25.3.07
Network Analysis
Posted by
shahidsidd
at
6:35:00 PM
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment