... of anomaly detection schemes in network intrusion de-tection,” in Proc. SIAM Conf. Data Mining, 2003, pp. 2 5–3 6.[26] W. Lee and D. Xiang, “Information-theoretic measures for anomaly detection, ” ... techniques for identifying traffic anomalies,mostly from the perspective of link-level traffic aggregates. Sig-nature -based intrusion detection systems look for well-knownsignatures or patterns in network ... 2005, pp. 9–1 5.[12] B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, “Sketch -based change detection: Methods, evaluation, and applications,” in Proc.ACM/USENIX IMC, 2003, pp. 23 4–2 47.[13]...