References
- KISTI National Supercomputing Center [Internet], https://www.ksc.re.kr
- Bu Young Ahn, Ji Hoon Jang, Sun Il Ahn, Myung Il Kim, Noo Ri On, Jong Hyun Hong, and Sik Lee, “Study of High Performance Computing Activation Strategy,” International Journal of Multimedia and Ubiquitous Engineering, Vol. 9, No. 6, pp. 59-66, 2014. https://doi.org/10.14257/ijmue.2014.9.6.07
- Jae-Kook Lee, Sung-Jun Kim, Chan Yeol Park, Taeyoung Hong, and Huiseung Chae, “Heavy-Tailed Distribution of the SSH Brute-Force Attack Duration in a Multi-user Environment,” Journal of the Korean Physical Society, Vol. 69, No. 2, pp. 253-258, Jul. 2016. https://doi.org/10.3938/jkps.69.253
- Jae-Kook Lee, Sung-Jun Kim, and Taeyoung Hong, “Bruteforce Attacks Analysis against SSH in HPC Multi-user Service Environment,” Indian Journal of Science and Technology, Vol. 9, No. 24, pp. 1-4, Jun. 2016.
- Jae-Kook Lee, Sung-Jun Kim, Joon Woo, and Chan Yeol Park, “Analysis and Response of SSH Brute Force Attacks in Multi-user Computing Environment,” KIPS Transactions on Computer and Communication Systems, Vol. 4, No. 6, pp. 205-212, Jun. 2015. https://doi.org/10.3745/KTCCS.2015.4.6.205
- Alessandro D’Alconzo, Idilio Drago and Andrea Morichetta, “A Survey on Big Data for Network Traffic Monitoring and Analysis,” IEEE Transactions on Network and Service Management, Vol. 16, No. 3, pp. 800-813, Sep. 2019. https://doi.org/10.1109/TNSM.2019.2933358
- A. Callado, Carlos Kamienski, Geza Szabo, Balazs Peter Gero, Judith Kelner, Stenio Fernandes, and Djamel Sadok, “A survey on Internet traffic identification,” IEEE Commun. Surveys Trts., Vol. 11, No. 3, pp. 37-52, 2009. https://doi.org/10.1109/SURV.2009.090304
- I. Drago, M. Mellia, and M. Crovella, "Studying interdomain routing over long timescales," Proceedings of the 2013 Conference on Internet Measurement Conference, Oct. 2013.
- Sung-Jun Kim and Taeyoung Hong, "Implementation supercomputer system dashboard using RESTful API," The KIPS Fall Conference 2019, Vol. 26, No. 2, Nov. 2019.
- Donghwoon Kwon, Hyunjoo Kim, Jinoh Kim, Sang C. Suh, Ikkyun Kim, and Kuinam J. Kim, “A Survey of Deep Learning-based Network Anomaly Detection,” Cluster Computing Journal, Vol. 22, No. 1, pp. 949-961, 2019. https://doi.org/10.1007/s10586-017-1117-8
- Mukrimah Nawir, Amiza Amir, Naimah Yaakob, and Ong Bi Lynn, “Effective and efficient network anomaly detection system using machine learning algorithm,” Bulletine of Electrical Engineering and Informatics, Vol. 8, No. 1, pp. 46-51, Mar. 2019. https://doi.org/10.11591/eei.v8i1.1387
- R. Artusi, P. Verderio, and E. Marubini, “Bravais-Pearson and Spearman correlation coefficients: meaning, test of hypothesis and confidence interval,” The International Journal of Biological Markers, Vol. 17, No. 2, pp. 148-151, 2002. https://doi.org/10.1177/172460080201700213
- Douglas G. Bonett and Thomas A. Wright, “Sample size requirements for estimating pearson, kendall and spearman correlations,” Psychometrika, Vol. 65, No. 1, pp. 23-28, Mar. 2000 https://doi.org/10.1007/BF02294183
- Thuy T.T. Nguyen, and Grenville Armitage, “A survey of techniques for internet traffic classification using machine learning,” IEEE Communications Surveys & Tutorials, Vol. 10, No. 4, pp. 56-76, 2008. https://doi.org/10.1109/SURV.2008.080406