-
1
-
-
84860930957
-
Symantec Early Warning Solutions
-
Symantec Corp.: [Online]. Available
-
Symantec Corp.: Symantec Early Warning Solutions [Online]. Available: http://enterprisesecurity.symantec.com/SecurityServices/
-
-
-
-
2
-
-
0038289958
-
ida "Code Red" Worm
-
eEye Digital Security: [Online]. Available
-
eEye Digital Security: ida "Code Red" Worm (2001). [Online]. Available: http://www.eeye.com/html/Research/Advisories/AL20010717.html
-
(2001)
-
-
-
3
-
-
8644275018
-
Blaster Worm Analysis
-
eEye Digital Security: [Online]. Available
-
eEye Digital Security: Blaster Worm Analysis (2003). [Online]. Available: http://www.eeye.com/html/Research/Advisories/AL20030811.html
-
(2003)
-
-
-
5
-
-
0003964874
-
"Next-Generation Intrusion Detection Expert System (Nides): A Summary"
-
SRI International, Tech. Rep. SRI-CSL-95-07, May
-
D. Anderson, T. Frivold, and A. Valdes, "Next-Generation Intrusion Detection Expert System (Nides): A Summary," SRI International, Tech. Rep. SRI-CSL-95-07, May 1995.
-
(1995)
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
6
-
-
1642434224
-
"Using sensor networks and data fusion for early detection of active worms"
-
presented at the SPIE AeroSense Symp., Orlando, FL
-
V. H. Berk, R. S. Gray, and G. Bakos, "Using sensor networks and data fusion for early detection of active worms," presented at the SPIE AeroSense Symp., Orlando, FL, 2003.
-
(2003)
-
-
Berk, V.H.1
Gray, R.S.2
Bakos, G.3
-
7
-
-
28044458400
-
-
Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available
-
Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available: http://www.caida.org
-
-
-
-
8
-
-
28044460690
-
-
CERT Coordination Center. [Online]. Available
-
CERT Coordination Center. [Online]. Available: http://www.cert.org
-
-
-
-
9
-
-
28044432636
-
-
CERT/CC Advisories. [Online]. Available
-
CERT/CC Advisories. [Online]. Available: http://www.cert.orgladvisories/
-
-
-
-
10
-
-
0042474227
-
"Modeling the spread of active worms"
-
Mar
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. IEEE INFOCOM, Mar. 2003, pp. 1890-1900.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
11
-
-
35048879637
-
"Honeystat: Local worm detection using honeypots"
-
Sep
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levin, and H. Owen. "Honeystat: Local worm detection using honeypots," in Proc. 7th Int. Symp. Recent Advances in Intrusion Detection (RAID), Sep. 2004, pp. 39-58.
-
(2004)
Proc. 7th Int. Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levin, J.6
Owen, H.7
-
13
-
-
0023294428
-
"An intrusion detection model"
-
Feb
-
D. Denning, "An intrusion detection model," IEEE Trans. Software Eng., vol. SE-13, no. 2, pp. 222-232, Feb. 1987.
-
(1987)
IEEE Trans. Software Eng.
, vol.SE-13
, Issue.2
, pp. 222-232
-
-
Denning, D.1
-
14
-
-
50049130457
-
Incidents Maillist: Possible Codered Connection Attempts
-
[Online]. Available
-
D. Goldsmith. Incidents Maillist: Possible Codered Connection Attempts. [Online]. Available: http://lists.jammed.comlincidents/2001/07/0149.html
-
-
-
Goldsmith, D.1
-
15
-
-
0032313923
-
"Intrusion detection using sequences of system calls"
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion detection using sequences of system calls," J. Comput. Security, vol. 6, no. 3, pp. 151-180, 1998.
-
(1998)
J. Comput. Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
16
-
-
0038294879
-
-
Honeynet Project [Online]. Available
-
Honeynet Project. Know Your Enemy: Honeynets. [Online]. Available: http://www.honeynet.org/papers/gen2/index.html
-
Know Your Enemy: Honeynets
-
-
-
17
-
-
28044459744
-
-
Internet Storm Center [Online]. Available
-
Internet Storm Center. [Online]. Available: http://isc.sans.org/
-
-
-
-
18
-
-
3543096392
-
"Fast portscan detection using sequential hypothesis testing"
-
May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. IEEE Symp. Security and Privacy, May 2004, pp. 211-225.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
19
-
-
35048831757
-
"Fast detection of scanning worm infections"
-
Sep
-
J. Jung, S. E. Schechter, and A. W. Berger, "Fast detection of scanning worm infections," in Proc. 7th Int. Symp. Recent Advances in Intrusion Detection (RAID), Sep. 2004, pp. 59-81.
-
(2004)
Proc. 7th Int. Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 59-81
-
-
Jung, J.1
Schechter, S.E.2
Berger, A.W.3
-
20
-
-
84943680959
-
"Computers and epidemiology"
-
May
-
J. O. Kephart, S. R. White, and D. M. Chess, "Computers and epidemiology," IEEE Spectrum, vol. 30, no. 5, pp. 20-26, May 1993.
-
(1993)
IEEE Spectrum
, vol.30
, Issue.5
, pp. 20-26
-
-
Kephart, J.O.1
White, S.R.2
Chess, D.M.3
-
23
-
-
85084163246
-
"Autograph: Toward automated, distributed worm signature detection"
-
San Diego, CA, Aug
-
H. Kim and B. Karp, "Autograph: Toward automated, distributed worm signature detection," in Proc. 13th USENIX Security Symp., San Diego, CA, Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symp.
-
-
Kim, H.1
Karp, B.2
-
24
-
-
84885774862
-
"A framework for constructing features and models for intrusion detection systems"
-
Nov
-
W. Lee and S. Stolfo, "A framework for constructing features and models for intrusion detection systems," ACM Trans. Inf. Syst. Security, vol. 3, no. 4, pp. 227-261, Nov. 2000.
-
(2000)
ACM Trans. Inf. Syst. Security
, vol.3
, Issue.4
, pp. 227-261
-
-
Lee, W.1
Stolfo, S.2
-
26
-
-
0742276097
-
"Inside the Slammer worm"
-
Jul
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security and Privacy Mag., vol. 1, no. 4, pp. 33-39, Jul. 2003.
-
(2003)
IEEE Security and Privacy Mag.
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
27
-
-
0141762461
-
"Code-Red: A case study on the spread and victims of an Internet worm"
-
Nov
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: A case study on the spread and victims of an Internet worm," in Proc. 2nd ACM SIGCOMM Workshop an Internet Measurement, Nov. 2002, pp. 273-284.
-
(2002)
Proc. 2nd ACM SIGCOMM Workshop an Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
28
-
-
0042474173
-
"Internet quarantine: Requirements for containing self-propagating code"
-
Mar
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proc. IEEE INFOCOM, Mar. 2003, pp. 1901-1910.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
29
-
-
28044457069
-
"Network Telescopes"
-
CAIDA, Tech. Rep. TR-2004-04
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Network Telescopes," CAIDA, Tech. Rep. TR-2004-04, 2004.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
30
-
-
14944369649
-
"Characteristics of Internet background radiation"
-
Oct
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of Internet background radiation," in Proc. Internet Measurement Conf. (IMC), Oct. 2004, pp. 27-40.
-
(2004)
Proc. Internet Measurement Conf. (IMC)
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
32
-
-
28044452950
-
-
SANS Inst. [Online]. Available
-
SANS Inst. [Online]. Available: http://www.sans.org
-
-
-
-
33
-
-
5644232768
-
"A tour of the worm"
-
Jan
-
D. Seeley, "A tour of the worm," in Proc. Winter USENIXConf., Jan. 1989, pp. 287-304.
-
(1989)
Proc. Winter USENIX Conf.
, pp. 287-304
-
-
Seeley, D.1
-
35
-
-
84991765629
-
"Automated worm fingerprinting"
-
Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proc. 6th ACM/USENIX Symp. Operating System Design and Implementation (OSDI), Dec. 2004, pp. 45-60.
-
(2004)
Proc. 6th ACM/USENIX Symp. Operating System Design and Implementation (OSDI)
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
36
-
-
28044445764
-
"Containment of scanning worms in enterprise networks"
-
to be published
-
S. Staniford, "Containment of scanning worms in enterprise networks," J. Comput. Security, to be published.
-
J. Comput. Security
-
-
Staniford, S.1
-
37
-
-
85084162258
-
"How to own the Internet in your spare time"
-
Aug
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the Internet in your spare time," in Proc. USENIK Security Symp., Aug. 2002, pp. 149-167.
-
(2002)
Proc. USENIK Security Symp.
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
38
-
-
0000949239
-
"GrIDS-A graph-based intrusion detection system for large networks"
-
Oct
-
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle, "GrIDS-A graph-based intrusion detection system for large networks," in Proc. 19th Nat. Information Systems Security Cong, Oct. 1996, pp. 361-370.
-
(1996)
Proc. 19th Nat. Information Systems Security Conf.
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
40
-
-
28044454620
-
-
DHS Launches Cybersecurity Monitoring Project (Oct.) [Online]. Available
-
D. Verton. (2003, Oct.) DHS Launches Cybersecurity Monitoring Project. [Online]. Available: http://www.peworld.com/news/article/ 0,aid,112764,00.asp
-
(2003)
-
-
Verton, D.1
-
41
-
-
85084164480
-
"Very fast containment of scanning worms"
-
Aug
-
N. Weaver, S. Staniford, and V. Paxson, "Very fast containment of scanning worms," in Proc. 13th USENIX Security Symp., Aug. 2004, pp. 29-44.
-
(2004)
Proc. 13th USENIX Security Symp.
, pp. 29-44
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
42
-
-
84948951525
-
"Throttling viruses: Restricting propagation to defeat mobile malicious code"
-
presented at the 18th Annu. Computer Security Applications Conf., Las Vegas, NV, Dec
-
M. M. Williamson, "Throttling viruses: Restricting propagation to defeat mobile malicious code," presented at the 18th Annu. Computer Security Applications Conf., Las Vegas, NV, Dec. 2002.
-
(2002)
-
-
Williamson, M.M.1
-
43
-
-
28044454216
-
"An efficient architecture and algorithm for detecting worms with various scan techniques"
-
presented at the 11th Annu. Network and Distributed System Security Symp. (NDSS'04), San Diego, CA, Feb
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat, "An efficient architecture and algorithm for detecting worms with various scan techniques," presented at the 11th Annu. Network and Distributed System Security Symp. (NDSS'04), San Diego, CA, Feb. 2004.
-
(2004)
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
44
-
-
67249097346
-
-
(Feb.) [Online]. Available
-
C. C. Zou. (2004, Feb.) Internet Worm Propagation Simulator. [Online]. Available: http://www.cs.uef.edu/~czou/research/wormSimulation.html
-
(2004)
Internet Worm Propagation Simulator
-
-
Zou, C.C.1
-
45
-
-
16344396406
-
"Monitoring and early warning for Internet worms"
-
Washington, DC, Oct
-
C. C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and early warning for Internet worms," in Proc. 10th ACM Conf. Computer and Communications Security (CCS'03), Washington, DC, Oct. 2003, pp. 190-199.
-
(2003)
Proc. 10th ACM Conf. Computer and Communications Security (CCS'03)
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
46
-
-
0038349210
-
"Code red worm propagation modeling and analysis"
-
C. C. Zou, W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. 9th ACM Conf. Computer and Communications Security (CCS'02), 2002, pp. 138-147.
-
(2002)
Proc. 9th ACM Conf. Computer and Communications Security (CCS'02)
, pp. 138-147
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
47
-
-
14944368398
-
"Worm propagation modeling and analysis under dynamic quarantine defense"
-
Oct
-
C. C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," in Proc. ACM CCS Workshop on Rapid Malcode (WORM'03), Oct. 2003, pp. 51-60.
-
(2003)
Proc. ACM CCS Workshop on Rapid Malcode (WORM'03)
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
48
-
-
33646150900
-
"On the performance of Internet worm scanning strategies"
-
to be published
-
C. C. Zou, D. Towsley, and W. Gong, "On the performance of Internet worm scanning strategies," J. Performance Evaluation, to be published.
-
J. Performance Evaluation
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
49
-
-
17444378633
-
"Email worm modeling and defense"
-
Oct
-
C. C. Zou, D. Towsley, and W. Gong, "Email worm modeling and defense," in Proc. 13th Int. Conf. Computer Communications and Networks (ICCCN'04), Oct. 2004, pp. 409-414.
-
(2004)
Proc. 13th Int. Conf. Computer Communications and Networks (ICCCN'04)
, pp. 409-414
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
50
-
-
26844507894
-
"Routing worm: A fast, selective attack worm based on IP address information"
-
Jun
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on IP address information," in Proc. 19th Workshop on Principles of Advanced and Distributed Simulation (PADS'05), Jun. 2005, pp. 199-206.
-
(2005)
Proc. 19th Workshop on Principles of Advanced and Distributed Simulation (PADS'05)
, pp. 199-206
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
|