-
4
-
-
84860101729
-
-
Mazu networks, http://www.mazu.com.
-
-
-
-
5
-
-
84860101881
-
-
Mydoom.b virus. http://www.us-cert.gov/cas/alerts/SA04-028A.html.
-
Mydoom.b Virus
-
-
-
6
-
-
84860093028
-
-
Sco inc. http://www.sco.com.
-
-
-
-
7
-
-
84860096401
-
-
ARBOR NETWORKS, http://www.arbornetworks.com.
-
-
-
-
8
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Nov.
-
BARFORD, P., KLINE, J., PLONKA, D., AND RON, A. A signal analysis of network traffic anomalies. In Proceedings of ACM SIGCOMM Internet Measurement Workshop (Nov. 2002).
-
(2002)
Proceedings of ACM SIGCOMM Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
10
-
-
0014814325
-
Space/time tradeoffs in hash coding with allowable errors
-
July
-
BLOOM, B. H. Space/time tradeoffs in hash coding with allowable errors. Communications of the ACM 13, 7 (July 1970), 422-426.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
11
-
-
0010053289
-
-
CHECK POINT SOFTWARE TECHNOLOGIES LTD. Syndefender. http://www. checkpoint.com/products/firewall-1.
-
Syndefender
-
-
-
12
-
-
14944363876
-
Estimating rarity and similarity over data stream windows
-
DIMACS, Nov.
-
DATAR, M., AND MUTHUKRISHNAN, S. Estimating rarity and similarity over data stream windows. Technical report, 2001-21, DIMACS, Nov. 2001.
-
(2001)
Technical Report
, vol.2001
, Issue.21
-
-
Datar, M.1
Muthukrishnan, S.2
-
13
-
-
4544360452
-
New directions in traffic measurement and accounting
-
Aug.
-
ESTAN, C., AND VARGHESE, G. New directions in traffic measurement and accounting. In ACM SIGCOMM (Aug. 2002).
-
(2002)
ACM SIGCOMM
-
-
Estan, C.1
Varghese, G.2
-
15
-
-
84860105045
-
-
FORESCOUT TECHNOLOGIES, http://www.forescout.com.
-
-
-
-
16
-
-
84860105064
-
-
FYODOR, http://www.insecure.org/nmap.
-
-
-
-
17
-
-
0004317693
-
Quicksand : Quick summary and analysis of network data
-
DIMACS, Nov.
-
GILBERT, A., GUHA, S., INDYK, P., MUTHUKRISHNAN, S., AND STRAUSS, M. Quicksand : Quick summary and analysis of network data. Technical report, 2001-43, DIMACS, Nov. 2001.
-
(2001)
Technical Report
, vol.2001
, Issue.43
-
-
Gilbert, A.1
Guha, S.2
Indyk, P.3
Muthukrishnan, S.4
Strauss, M.5
-
18
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
GILL, T. M., AND POLETTO, M. MULTOPS: a data-structure for bandwidth attack detection. In USENIX Security Symposium (2001).
-
(2001)
USENIX Security Symposium
-
-
Gill, T.M.1
Poletto, M.2
-
20
-
-
0024984013
-
A network security monitor
-
HEBERLEIN, L. T., DIAS, G. V., LEVITT, K. N., MUKHERJEE, B., J.WOOD, AND D.WOLBER. A network security monitor. In Proc. IEEE Symposium on Research in Security and Privacy (1990), pp. 296-304.
-
(1990)
Proc. IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
23
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
JUNG, J., PAXSON, V., BERGER, A., AND BALAKRISHNAN, H. Fast portscan detection using sequential hypothesis testing. In Proceedings of IEEE Symposium on Security and Privacy (2004).
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
25
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
ACM Press
-
KRISHNAMURTHY, B., SEN, S., ZHANG, Y., AND CHEN, Y. Sketch-based change detection: methods, evaluation, and applications. In Proceedings of the conference on Internet measurement conference (2003), ACM Press, pp. 234-247.
-
(2003)
Proceedings of the Conference on Internet Measurement Conference
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
26
-
-
0003912423
-
-
Prentice Hall, Upper Saddle River, NJ 07458
-
LARSEN, R. J., AND MARX, M. L. An Introduction to Mathematical Statistics and Its Applications. Prentice Hall, Upper Saddle River, NJ 07458, 2001.
-
(2001)
An Introduction to Mathematical Statistics and Its Applications
-
-
Larsen, R.J.1
Marx, M.L.2
-
28
-
-
3042859154
-
Resisting syn flooding dos attacks with a syn cache
-
Feb.
-
LEMON, J. Resisting syn flooding dos attacks with a syn cache. In Proceedings of USENIX BSDCon'2002 (Feb. 2002).
-
(2002)
Proceedings of USENIX BSDCon'2002
-
-
Lemon, J.1
-
29
-
-
14844303748
-
On the difficulty of scalably detecting network attacks
-
Oct.
-
LEVCHENKO, K., PATURI, R., AND VARGHESE, G. On the difficulty of scalably detecting network attacks. In Proceedings of the ACM Conference on Computer and Communications Security, Washington, D.C. (Oct. 2004).
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security, Washington, D.C.
-
-
Levchenko, K.1
Paturi, R.2
Varghese, G.3
-
30
-
-
84860105028
-
-
Snort
-
MARTIN ROESCH. Snort, http://www.snort.org.
-
-
-
Roesch, M.1
-
33
-
-
84860105029
-
-
NETFLOW, C. http://www.cisco.com/warp/public/732/Tech/netflow.
-
-
-
-
34
-
-
84860105030
-
-
NETSCREEN 100 FIREWALL APPLIANCE
-
NETSCREEN 100 FIREWALL APPLIANCE. http://www.netscreen.com.
-
-
-
-
35
-
-
84860103290
-
-
NETSCREEN TECHNOLOGIES, http://www.netscreen.com.
-
-
-
-
36
-
-
0031247411
-
End-to-end routing behavior in the internet
-
Oct.
-
PAXSON, V. End-to-end routing behavior in the internet. IEEE/ACM Transactions on Networking 5, 5 (Oct. 1997), 601-615.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.5
, pp. 601-615
-
-
Paxson, V.1
-
37
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Dec.
-
PAXSON, V. Bro: A system for detecting network intruders in real-time. In Computer Networks, 31(23-24), pp. 2435-2463 (Dec. 1999).
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
38
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
PAXSON, V. An analysis of using reflectors for distributed denial-of-service attacks. In Computer Communication Review 31(3) (July 2001).
-
(2001)
Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
40
-
-
84942250809
-
Surveillance detection in high bandwidth environments
-
Apr.
-
ROBERTSON, S., SIEGEL, E., MILLER, M., AND STOLFO, S. Surveillance detection in high bandwidth environments. In Proceedings of the 2003 DARPA DISCEX III Conference (Apr. 2003), pp. 229-238.
-
(2003)
Proceedings of the 2003 DARPA DISCEX III Conference
, pp. 229-238
-
-
Robertson, S.1
Siegel, E.2
Miller, M.3
Stolfo, S.4
-
41
-
-
0030715989
-
Analysis of a denial of service attack on tcp
-
May
-
SCHUBA, C., KRSUL, I., KUHN, M., SPAFFORD, E., SUNDARAM, A., AND ZAMBONI, D. Analysis of a denial of service attack on tcp. In Proceedings of IEEE Symposium on Security and Privacy (May 1997).
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Schuba, C.1
Krsul, I.2
Kuhn, M.3
Spafford, E.4
Sundaram, A.5
Zamboni, D.6
-
44
-
-
14944384392
-
Containment of scanning worms in enterprise networks
-
Nov.
-
STANIFORD, S. J. Containment of scanning worms in enterprise networks. In Journal of Computer Security (Nov. 2003).
-
(2003)
Journal of Computer Security
-
-
Staniford, S.J.1
-
46
-
-
14944370119
-
Syn-dog: Sniffing syn flooding sources
-
Vienna, Austria
-
WANG, H., ZHANG, D., AND SHIN, K. Syn-dog: Sniffing syn flooding sources. In IEEE ICDCS (Vienna, Austria, 2002).
-
(2002)
IEEE ICDCS
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
47
-
-
12244311689
-
A taxonomy of computer worms
-
WEAVER, N., PAXSON, V., STANIFORD, S., AND CUNNINGHAM, R. A taxonomy of computer worms. In Proceedings of the ACM Workshop of Rapid Malcode (WORM) (2003).
-
(2003)
Proceedings of the ACM Workshop of Rapid Malcode (WORM)
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
50
-
-
1542300231
-
On the constancy of internet path properties
-
Nov.
-
ZHANG, Y., DUFFIELD, N., PAXSON, V., AND SHENKER, S. On the constancy of internet path properties. In Proc. ACM SIGCOMM Internet Measurement Workshop (Nov. 2001).
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
-
-
Zhang, Y.1
Duffield, N.2
Paxson, V.3
Shenker, S.4
|