-
1
-
-
0034721164
-
The Internet's achilles' heel: Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A. László Barabási, "The Internet's Achilles' Heel: Error and Attack Tolerance of Complex Networks," Nature, pp. 406:378-382, 2000.
-
(2000)
Nature
, pp. 406
-
-
Albert, R.1
Jeong, H.2
Barabási, A.L.3
-
2
-
-
0003964874
-
Next-generation intrusion detection expert system (NIDES): A summary
-
Computer Science Laboratory, SRI International, Menlo Park, CA
-
D. Anderson, T. Frivold, and A. Valdes, "Next-generation intrusion detection expert system (NIDES): A summary," Computer Science Laboratory, SRI International, Menlo Park, CA, Tech. Rep. SRI-CSL-95-07, 1995.
-
(1995)
Tech. Rep.
, vol.SRI-CSL-95-07
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
3
-
-
0004075434
-
ICMP traceback message
-
draft-bellovin-itrace-00.txt
-
S. M. Bellovin, "ICMP Traceback Message," Internet Draft, draft-bellovin-itrace-00.txt, 2000.
-
(2000)
Internet Draft
-
-
Bellovin, S.M.1
-
4
-
-
0002346271
-
Anarchitecture for differentiated services
-
IETF
-
S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, "Anarchitecture for differentiated services," IETF, RFC 2475, 1998.
-
(1998)
RFC
, vol.2475
-
-
Blake, S.1
Black, D.2
Carlson, M.3
Davies, E.4
Wang, Z.5
Weiss, W.6
-
7
-
-
0003209840
-
Integrated services in the Internet architecture: An overview
-
IETF
-
R. Braden, D. Clark, and S. Shenker, "Integrated services in the Internet architecture: An overview," IETF, RFC 1633, 1994.
-
(1994)
RFC
, vol.1633
-
-
Braden, R.1
Clark, D.2
Shenker, S.3
-
9
-
-
0028714365
-
Automated detection of vulnerabilities in privileged programs by execution monitoring
-
C. Ko, G. Fink, and K. Levitt, "Automated detection of vulnerabilities in privileged programs by execution monitoring," in Proc. 10th Annu. Conf. Comput. Security Applicat., 1994, pp. 134-144.
-
(1994)
Proc. 10th Annu. Conf. Comput. Security Applicat.
, pp. 134-144
-
-
Ko, C.1
Fink, G.2
Levitt, K.3
-
11
-
-
0004135984
-
IDIOT - Users guide
-
COAST Lab., Purdue Univ., West Lafayette, IN
-
M. Crosbie, B. Dole, T. Ellis, I. Krsul, and E. Spafford, "IDIOT - Users guide," COAST Lab., Purdue Univ., West Lafayette, IN, Tech. Rep. TR-96-050, 1996.
-
(1996)
Tech. Rep.
, vol.TR-96-050
-
-
Crosbie, M.1
Dole, B.2
Ellis, T.3
Krsul, I.4
Spafford, E.5
-
13
-
-
84954439087
-
Autonomia: An autonomic computing environment
-
Apr.
-
X. Dong et al., "Autonomia: An autonomic computing environment," in Proc. Int. Conf. Comput. Commun., Apr. 2003, pp. 61-68.
-
(2003)
Proc. Int. Conf. Comput. Commun.
, pp. 61-68
-
-
Dong, X.1
-
16
-
-
0003336855
-
Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing
-
IETF
-
P. Ferguson and D. Senie, "Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing," IETF, RFC 2267, 1998.
-
(1998)
RFC
, vol.2267
-
-
Ferguson, P.1
Senie, D.2
-
18
-
-
85084163167
-
MULTOPS: A data-structure for bandwidth attack detection
-
Aug.
-
T. M. Gil and M. Poletter, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. USENIX Security Symp., Aug. 2001.
-
(2001)
Proc. USENIX Security Symp.
-
-
Gil, T.M.1
Poletter, M.2
-
19
-
-
84888926928
-
-
Pittsburg, PA
-
S. Hariri, C. S. Raghavendra, Y. Kim, M. Djunaedi, R. P. Nellipudi, A. Rajagopalan, P. Vadlamani, and Y. Zhang, Proc. CATALINA: A Smart Applicat. Contr. Manage. Active Middleware Serv. Conf., Pittsburg, PA, 2000, pp. 43-55.
-
(2000)
Proc. CATALINA: A Smart Applicat. Contr. Manage. Active Middleware Serv. Conf.
, pp. 43-55
-
-
Hariri, S.1
Raghavendra, C.S.2
Kim, Y.3
Djunaedi, M.4
Nellipudi, R.P.5
Rajagopalan, A.6
Vadlamani, P.7
Zhang, Y.8
-
20
-
-
4544270125
-
Impact analysis of faults and attacks in large-scale networks
-
Sep./Oct.
-
S. Hariri, G. Qu, T. Dharmagadda, and R. Modukuri, "Impact analysis of faults and attacks in large-scale networks," IEEE Security and Privacy, vol. 1, no. 5, pp. 49-54, Sep./Oct. 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.5
, pp. 49-54
-
-
Hariri, S.1
Qu, G.2
Dharmagadda, T.3
Modukuri, R.4
-
21
-
-
0027593257
-
Nadir: An automated system for detecting network intrusion and misuse
-
J. Hochberg et al., "Nadir: An automated system for detecting network intrusion and misuse," Comput. Security, vol. 12, no. 3, pp. 235-248, 1993.
-
(1993)
Comput. Security
, vol.12
, Issue.3
, pp. 235-248
-
-
Hochberg, J.1
-
24
-
-
85180745018
-
Implementing pushback: Router-based defense against DDoS attacks
-
San Diego, CA, Feb.
-
J. Ioannidis and S. M. Bellovin, "Implementing pushback: Router-based defense against DDoS attacks," in Proc. NDSS, San Diego, CA, Feb. 2002.
-
(2002)
Proc. NDSS
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
25
-
-
0034590196
-
Survivability analysis of network specifications
-
S. Jha, R. Linger, T. Longstaff, and J. Wing, "Survivability analysis of network specifications," in Proc. Workshop Dependability Despite Malicious Faults, 2000, pp. 613-622.
-
(2000)
Proc. Workshop Dependability Despite Malicious Faults
, pp. 613-622
-
-
Jha, S.1
Linger, R.2
Longstaff, T.3
Wing, J.4
-
26
-
-
0035359901
-
Automatic feature extraction of waveform signals for in-process diagnostic performance improvement
-
J. Jin and J. Shi, "Automatic feature extraction of waveform signals for in-process diagnostic performance improvement," J. Intell. Manuf, vol. 12, pp. 257-268, 2001.
-
(2001)
J. Intell. Manuf
, vol.12
, pp. 257-268
-
-
Jin, J.1
Shi, J.2
-
28
-
-
25844457130
-
Recommended Internet service provider security services and procedures
-
IETF
-
T. Killalea, "Recommended Internet service provider security services and procedures," IETF, RFC 3013, 2000.
-
(2000)
RFC
, vol.3013
-
-
Killalea, T.1
-
29
-
-
0029267472
-
State transition analysis: A rule-based intrusion detection approach
-
Mar.
-
K. Ilgun, A. R. Kemmerer, and A. P. Porras, "State transition analysis: A rule-based intrusion detection approach," IEEE Trans. Softw. Eng., vol. 21, no. 3, pp. 181-199, Mar. 1995.
-
(1995)
IEEE Trans. Softw. Eng.
, vol.21
, Issue.3
, pp. 181-199
-
-
Ilgun, K.1
Kemmerer, A.R.2
Porras, A.P.3
-
30
-
-
0003451777
-
A real time intrusion detection expert system (IDES)
-
Menlo Park, CA
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali, P. G. Neumann, H. S. Javitz, A. Valdes, and T. D. Garvey, "A real time intrusion detection expert system (IDES)," SRI Int., Menlo Park, CA, 1992.
-
(1992)
SRI Int.
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Neumann, P.G.6
Javitz, H.S.7
Valdes, A.8
Garvey, T.D.9
-
31
-
-
0003952768
-
Resource reservation protocol (RSVP) version 1, applicability statement
-
IETF
-
A. Mankin, F. Baker, R. Braden, M. O'Dell, A. Romanow, A. Weinrib, and L. Zhang, "Resource reservation protocol (RSVP) version 1, applicability statement," IETF, RFC 2208, 1997.
-
(1997)
RFC
, vol.2208
-
-
Mankin, A.1
Baker, F.2
Braden, R.3
O'Dell, M.4
Romanow, A.5
Weinrib, A.6
Zhang, L.7
-
32
-
-
84888897029
-
-
[Online]
-
(2003) Slammer Worm. Matrix. [Online]. Available: http://www. matrixnetsystems.com/ea/2003/20 030 130.jsp
-
(2003)
Slammer Worm. Matrix
-
-
-
33
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Jul.
-
R. Manajan et al., "Controlling high bandwidth aggregates in the network," in ACM SIGCOMM Comput. Commun. Revi., Jul. 2002, 32(3).
-
(2002)
ACM SIGCOMM Comput. Commun. Revi.
, vol.32
, Issue.3
-
-
Manajan, R.1
-
36
-
-
84888892425
-
-
[Online]
-
McAfee Security. (2004). McAfee virusscan real-time virus protection. [Online]. Available: http://us.mcafee.com/root/package.asp?pkgid=100&cid= 9052
-
(2004)
McAfee Virusscan Real-time Virus Protection
-
-
-
38
-
-
84888918189
-
Multivariate statistical online analysis for self protection against network attacks
-
G. Qu, S. Hariri, X. Zhu, J. Jin, and Y. Mazin, "Multivariate statistical online analysis for self protection against network attacks," in Proc. 3rd ACS/IEEE Int. Conf. Comput. Syst. Applicat., 2005, page(s):93.
-
(2005)
Proc. 3rd ACS/IEEE Int. Conf. Comput. Syst. Applicat.
, pp. 93
-
-
Qu, G.1
Hariri, S.2
Zhu, X.3
Jin, J.4
Mazin, Y.5
-
39
-
-
27644496932
-
A new dependency and correlation analysis for features
-
Sep.
-
G. Qu, S. Hariri, and Y. Mazin, "A new dependency and correlation analysis for features," in IEEE Trans. Knowl. Data Eng., Special Issue on Intelligent Data Preparation, Sep. 2005, pp. 1199-1207.
-
(2005)
IEEE Trans. Knowl. Data Eng., Special Issue on Intelligent Data Preparation
, pp. 1199-1207
-
-
Qu, G.1
Hariri, S.2
Mazin, Y.3
-
41
-
-
84888911501
-
Quantifying vulnerabilities in the networked environment: Methods and uses
-
C. Sample and I. Poynter, "Quantifying vulnerabilities in the networked environment: Methods and uses," in Proc. TISC2000/S9, 2000.
-
(2000)
Proc. TISC2000/S9
-
-
Sample, C.1
Poynter, I.2
-
42
-
-
0033650584
-
Practical network support for IP traceback
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, Aug. 2000, pp. 295-306.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
44
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
R. Sekar, A. Gupta, J. Frullo, T. Shanbhag, A. Tiwari, H. Yang, and S. Zhou, "Specification-based anomaly detection: A new approach for detecting network intrusions," in Proc. 9th ACM Conf. Comput. Commun. Security, 2002, pp. 265-274.
-
(2002)
Proc. 9th ACM Conf. Comput. Commun. Security
, pp. 265-274
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
46
-
-
84888910839
-
Advanced and authenticated marking schemes for IP traceback
-
Mar.
-
D. Song and A. Perrig, "Advanced and authenticated marking schemes for IP traceback," in Proc. ACM SIGCOMM, Mar. 2001.
-
(2001)
Proc. ACM SIGCOMM
-
-
Song, D.1
Perrig, A.2
-
47
-
-
85084163540
-
CenterTrack: An IP overlay network for tracking DoS floods
-
Denver, CO, Aug.
-
R. Stone, "CenterTrack: An IP overlay network for tracking DoS floods," in Proc. 9th USENIX Security Symp., Denver, CO, Aug. 2000, pp.199-212.
-
(2000)
Proc. 9th USENIX Security Symp.
, pp. 199-212
-
-
Stone, R.1
-
49
-
-
0034775309
-
Hash-based IP traceback
-
Mar.
-
A. C. Snoren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, "Hash-based IP traceback," in Proc. ACM SIGCOMM, Mar. 2001, pp. 3-14.
-
(2001)
Proc. ACM SIGCOMM
, pp. 3-14
-
-
Snoren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
50
-
-
1042267106
-
A graph-based network-vulnerability analysis system
-
Sandia Nat. Lab.
-
L. P. Swiler, C. Phillips, and T. Gaylor, "A Graph-Based Network-Vulnerability Analysis System," Sandia Rep. SAND97-3010/1, Sandia Nat. Lab., vol. 31, pp. 517-527, 1998.
-
(1998)
Sandia Rep. SAND97-3010/1
, vol.31
, pp. 517-527
-
-
Swiler, L.P.1
Phillips, C.2
Gaylor, T.3
-
53
-
-
0036343692
-
Detecting SYN flooding attacks
-
New York, Jun.
-
H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, New York, Jun. 2002, pp. 1530-1539.
-
(2002)
Proc. IEEE INFOCOM
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
54
-
-
84888892472
-
-
[Online]
-
DoS attack. [Online]. Available: http://www.webopedia.com/TERM/ D/DoS_attack.html
-
DoS Attack
-
-
-
55
-
-
0038404196
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Miami Beach, FL, May
-
D. Yau, J. Liu, and F. Liang, "Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles," in Proc. IWQoS, Miami Beach, FL, May 2002, pp. 35-44.
-
(2002)
Proc. IWQoS
, pp. 35-44
-
-
Yau, D.1
Liu, J.2
Liang, F.3
-
56
-
-
0003254080
-
2 multivariate profiling for anomaly detection
-
West Point, NY, Jun.
-
2 multivariate profiling for anomaly detection," in Proc. IEEE Syst., Man, Cybern. Inf. Assur. Security Workshop, West Point, NY, Jun. 2000, pp. 180-186.
-
(2000)
Proc. IEEE Syst., Man, Cybern. Inf. Assur. Security Workshop
, pp. 180-186
-
-
Ye, N.1
-
57
-
-
0035271352
-
An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems
-
N. Ye and Q. Chen, "An anomaly detection technique based on a chisquare statistic for detecting intrusions into information systems," Qual. Reliab. Eng. J., vol. 17, pp. 105-112, 2001.
-
(2001)
Qual. Reliab. Eng. J.
, vol.17
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
-
58
-
-
0003750241
-
An architecture for intrusion detection using autonomous agents
-
COAST Lab., Purdue Univ., West Lafayette, IN, IN 47907-1398
-
D. Zamboni et al., "An architecture for intrusion detection using autonomous agents," COAST Lab., Purdue Univ., West Lafayette, IN, Tech. Rep. 98/05, IN 47907-1398, 1998.
-
(1998)
Tech. Rep.
, vol.98
, Issue.5
-
-
Zamboni, D.1
-
59
-
-
84947211158
-
Self-adapting, self-optimizing runtime management of grid applications using pragma
-
Apr.
-
H. Zhu, M. Parashar, J. Yang, Z. Zhang, S. Rao, and S. Hariri, "Self-adapting, self-optimizing runtime management of grid applications using pragma," in Proc. IEEE/ACM Int. Parallel Distrib. Process. Symp., NSF Next Generation Syst. Prog. Workshop, Apr. 2003, page(s):7
-
(2003)
Proc. IEEE/ACM Int. Parallel Distrib. Process. Symp., NSF Next Generation Syst. Prog. Workshop
, pp. 7
-
-
Zhu, H.1
Parashar, M.2
Yang, J.3
Zhang, Z.4
Rao, S.5
Hariri, S.6
|