-
3
-
-
33244459892
-
Improving passive packet capture: Beyond device polling
-
University of Pisa
-
L. Deri. Improving passive packet capture: Beyond device polling. Technical report, University of Pisa, 2003.
-
(2003)
Technical Report
-
-
Deri, L.1
-
4
-
-
0001817861
-
Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic
-
A. Feldmann, A. C. Gilbert, and W. Willinger. Data networks as cascades: Investigating the multifractal nature of Internet WAN traffic. In Proc. of ACM SIGCOMM, 1998.
-
(1998)
Proc. of ACM SIGCOMM
-
-
Feldmann, A.1
Gilbert, A.C.2
Willinger, W.3
-
6
-
-
14844332300
-
-
GNU Binutils. http://www.gnu.org/software/binutils.
-
-
-
-
7
-
-
33750943764
-
Capacity verification for high speed network intrusion detection systems
-
number 2516 in Lecture Notes in Computer Science. Springer-Verlag
-
M. Hall and K. Wiley. Capacity verification for high speed network intrusion detection systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proc. Recent Advances in Intrusion Detection
-
-
Hall, M.1
Wiley, K.2
-
9
-
-
84958957354
-
Performance adaptation in real-time intrusion detection systems
-
number 2516 in Lecture Notes in Computer Science. Springer-Verlag
-
W. Lee, J. B. Cabrera, A. Thomas, N. Balwalli, S. Saluja, and Y. Zhang. Performance adaptation in real-time intrusion detection systems. In Proc. Recent Advances in Intrusion Detection, number 2516 in Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Proc. Recent Advances in Intrusion Detection
-
-
Lee, W.1
Cabrera, J.B.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
10
-
-
85077206746
-
The BSD packet filter: A new architecture for user-level packet capture
-
S. McCanne and V. Jacobson. The BSD packet filter: A new architecture for user-level packet capture. In Proc. Winter 1993 USENIX Conference, 1993.
-
(1993)
Proc. Winter 1993 USENIX Conference
-
-
McCanne, S.1
Jacobson, V.2
-
11
-
-
0742276097
-
Inside the Slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. IEEE Magazine of Security and Privacy, 2003.
-
(2003)
IEEE Magazine of Security and Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
14
-
-
14844285148
-
-
mpatrol. http://www.cbmamiga.demon.co.uk/mpatrol.
-
-
-
-
15
-
-
0028491368
-
Empirically-derived analytic models of wide-area tcp connections
-
V. Paxson. Empirically-derived analytic models of wide-area tcp connections. IEEE/ACM Transactions on Networking, 2(4), 1994.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.4
-
-
Paxson, V.1
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24), 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
-
-
Paxson, V.1
-
17
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks, Inc.
-
T. H. Ptacek and T. N. Newsham. Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks, Inc., 1998.
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
18
-
-
4544269217
-
Experiences benchmarking intrusion detection systems
-
NFR Security, Inc.
-
M. I. Ranum. Experiences benchmarking intrusion detection systems. Technical report, NFR Security, Inc., http://www.itsecurity.com/papers/nfr2.htm, 2001.
-
(2001)
Technical Report
-
-
Ranum, M.I.1
-
20
-
-
14844330582
-
-
Cisco Catalyst 6500 Series
-
Configuring SPAN and RSPAN (Cisco Catalyst 6500 Series). http://www.cisoo.com/univercd/cc/td/doc/produot/lan/cat6000/sw_7_5/conf%g_gd/ span.pdf.
-
Configuring SPAN and RSPAN
-
-
-
21
-
-
14844295360
-
-
Snot
-
Snot, http://www.stolenshoes.net/sniph/index.html.
-
-
-
-
23
-
-
14844305634
-
Exploiting independent state for network intrusion detection
-
TU München
-
R. Sommer and V. Paxson. Exploiting independent state for network intrusion detection. Technical report, TU München, 2004.
-
(2004)
Technical Report
-
-
Sommer, R.1
Paxson, V.2
-
25
-
-
14844319072
-
-
Stick
-
Stick. http://packetstormsecurity.nl/distributed/stick.htm.
-
-
-
-
26
-
-
14844296916
-
-
tcpdump. http://www.tcpdump.org.
-
-
-
-
27
-
-
14844312801
-
-
Valgrind.http://developer.kde.org/~sewardj/.
-
Valgrind
-
-
-
28
-
-
0031078972
-
Self-similarity through high-variability: Statistical analysis of ethemet lan traffic at the source level
-
W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson. Self-similarity through high-variability: statistical analysis of ethemet lan traffic at the source level. IEEE/ACM Transactions on Networking, 5(1), 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.1
-
-
Willinger, W.1
Taqqu, M.S.2
Sherman, R.3
Wilson, D.V.4
|