-
1
-
-
25744465894
-
Towards a more functional and secure network infrastructure
-
University of California, Berkeley
-
D. Adkins, K. Lakshminarayanan, A. Perrig and I. Stoica, Towards a more functional and secure network infrastructure, University of California, Berkeley, Tech. Rep. UCB/CSD-03-1242, 2003.
-
(2003)
Tech. Rep.
, vol.UCB-CSD-03-1242
-
-
Adkins, D.1
Lakshminarayanan, K.2
Perrig, A.3
Stoica, I.4
-
2
-
-
0003914522
-
State of the practice of intrusion detection technologies
-
Carnegie Mellon University, Software Engineering Institute, Jan. [Online]
-
J. Allen, A. Christie, W. Fithen, J. McHugh, J. Pickel and E. Stoner, State of the practice of intrusion detection technologies, Carnegie Mellon University, Software Engineering Institute, Tech. Rep. CMU/SEI-99-TR-028, Jan. 2000. [Online] Available: http://www.cert.org/archive/pdf/99tr028.pdf.
-
(2000)
Tech. Rep.
, vol.CMU-SEI-99-TR-028
-
-
Allen, J.1
Christie, A.2
Fithen, W.3
McHugh, J.4
Pickel, J.5
Stoner, E.6
-
3
-
-
3042742908
-
An analysis of the Slapper worm
-
I. Arce and E. Levy, An analysis of the Slapper worm, IEEE Security & Privacy 1(1) (2003), 82-87.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
5
-
-
12544260240
-
Format string vulnerability
-
Hacker Emergency Response Team, July
-
P. Bouchareine, Format string vulnerability, Hacker Emergency Response Team, Tech. Rep., July 2000.
-
(2000)
Tech. Rep.
-
-
Bouchareine, P.1
-
6
-
-
0032154023
-
Detecting disruptive routers: A distributed network monitoring approach
-
K.A. Bradley, S. Cheung, N. Puketza, B. Mukherjee and R.A. Olsson, Detecting disruptive routers: A distributed network monitoring approach, IEEE Network 12(5) (1998), 50-60.
-
(1998)
IEEE Network
, vol.12
, Issue.5
, pp. 50-60
-
-
Bradley, K.A.1
Cheung, S.2
Puketza, N.3
Mukherjee, B.4
Olsson, R.A.5
-
7
-
-
29244471414
-
Root name server operational requirements
-
Internet Engineering Task Force, June
-
R. Bush, D. Karrenberg, M. Kosters and R. Plzak, Root name server operational requirements, Internet Engineering Task Force, Request for Comments RFC 2870, June 2000.
-
(2000)
Request for Comments RFC 2870
-
-
Bush, R.1
Karrenberg, D.2
Kosters, M.3
Plzak, R.4
-
8
-
-
4143130116
-
-
Oct. [Online]
-
CERT Coordination Center, Denial of service attacks, Oct. 1997. [Online] Available: http://www.cert.org/tech_tips/denial_of_service.html.
-
(1997)
Denial of Service Attacks
-
-
-
9
-
-
0041488497
-
-
Feb. [Online]
-
CERT Coordination Center, Overview of attack trends, Feb. 2002. [Online] Available: http://www.cert.org/archive/pdf/attack_trends.pdf.
-
(2002)
Overview of Attack Trends
-
-
-
10
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
A. Chakrabarti and G. Manimaran, Internet infrastructure security: A taxonomy, IEEE Network 16(6) (2002), 13-21.
-
(2002)
IEEE Network
, vol.16
, Issue.6
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
11
-
-
0036804084
-
Defending against flooding-based distributed denial-of-service attacks: A tutorial
-
R.K. Chang, Defending against flooding-based distributed denial-of-service attacks: A tutorial, IEEE Commun. Mag. 40(10) (2002), 42-51.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 42-51
-
-
Chang, R.K.1
-
13
-
-
2342591623
-
Software security for open-source systems
-
C. Cowan, Software security for open-source systems, IEEE Security & Privacy 1(1) (2003), 38-45.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 38-45
-
-
Cowan, C.1
-
14
-
-
29244433321
-
Protecting systems from stack smashing attacks with StackGuard
-
Raleigh, NC, USA
-
C. Cowan, S. Beattie, R.F. Day, C. Pu, P. Wagle and E. Walthinsen, Protecting systems from stack smashing attacks with StackGuard, in: Proceedings of the LinuxExpo, Raleigh, NC, USA, 1999.
-
(1999)
Proceedings of the LinuxExpo
-
-
Cowan, C.1
Beattie, S.2
Day, R.F.3
Pu, C.4
Wagle, P.5
Walthinsen, E.6
-
15
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
San Antonio, TX
-
C. Cowan, C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang and H. Hinton, StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks, in: Proceedings of the 7th USENIX Security Conference, San Antonio, TX, 1998, pp. 63-78.
-
(1998)
Proceedings of the 7th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
16
-
-
85010849899
-
Denial of Service via algorithmic complexity attacks
-
Washington, DC, USA
-
S.A. Crosby and D.S. Wallach, Denial of Service via algorithmic complexity attacks, in: Proceedings of the 12th USENIX Security Symposium, Washington, DC, USA, 2003.
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Crosby, S.A.1
Wallach, D.S.2
-
17
-
-
84966620150
-
Testing and evaluating computer intrusion detection systems
-
R. Durst, T. Champion, B. Wirten, E. Miller and L. Spagnuolo, Testing and evaluating computer intrusion detection systems, Communications of the ACM 42(7) (1999), 53-61.
-
(1999)
Communications of the ACM
, vol.42
, Issue.7
, pp. 53-61
-
-
Durst, R.1
Champion, T.2
Wirten, B.3
Miller, E.4
Spagnuolo, L.5
-
19
-
-
1242282792
-
-
July, Internet draft draft-floyd-pushback-messages-00.txt, work in progress
-
S. Floyd, S. Bellovin, J. Ioannidis, K. Kompella, R. Mahajan and V. Paxson, Pushback messages for controlling aggregates in the network, July 2001, Internet draft draft-floyd-pushback-messages-00.txt, work in progress.
-
(2001)
Pushback Messages for Controlling Aggregates in the Network
-
-
Floyd, S.1
Bellovin, S.2
Ioannidis, J.3
Kompella, K.4
Mahajan, R.5
Paxson, V.6
-
20
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA
-
S. Forrest, S.A. Hofmeyr, A. Somayaji and T.A. Longstaff, A sense of self for Unix processes, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1996, pp. 120-128.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
21
-
-
0002000920
-
Denial-of-Service attacks rip the Internet
-
L. Garber, Denial-of-Service attacks rip the Internet, IEEE Computer 33(4) (2000), 12-17.
-
(2000)
IEEE Computer
, vol.33
, Issue.4
, pp. 12-17
-
-
Garber, L.1
-
22
-
-
0004256091
-
-
John Wiley & Sons, Chichester, England
-
D. Gollmann, Computer Security, John Wiley & Sons, Chichester, England, 1999.
-
(1999)
Computer Security
-
-
Gollmann, D.1
-
23
-
-
0031190959
-
Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions
-
B. Guha and B. Mukherjee, Network security via reverse engineering of TCP code: Vulnerability analysis and proposed solutions, IEEE Network 11(4) (1997), 40-48.
-
(1997)
IEEE Network
, vol.11
, Issue.4
, pp. 40-48
-
-
Guha, B.1
Mukherjee, B.2
-
24
-
-
3042821266
-
Validation of sensor alert correlators
-
J. Haines, D.K. Ryder, L. Tinnel and S. Taylor, Validation of sensor alert correlators, IEEE Security & Privacy 1(1) (2003), 46-56.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.1
, pp. 46-56
-
-
Haines, J.1
Ryder, D.K.2
Tinnel, L.3
Taylor, S.4
-
25
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, V. Paxson and C. Kreibich, Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics, in: Proceedings of the 10th USENIX Security Symposium, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
27
-
-
29244470627
-
-
A. Householder, A. Manion, L. Pesante, G.M. Weaver and R. Thomas, Managing the Threat of Denial-of-Service Attacks, CERT Coordination Center, Oct. 2001.
-
(2001)
Managing the Threat of Denial-of-Service Attacks, CERT Coordination Center, Oct.
-
-
Pesante, L.1
Manion, A.2
Householder, A.3
Weaver, M.G.4
Thomas, R.5
-
29
-
-
0004154392
-
-
Prentice Hall PTR, Upper Saddle River, NJ, USA
-
C. Huitema, Routing in the Internet, 2nd edn, Prentice Hall PTR, Upper Saddle River, NJ, USA, 2000.
-
(2000)
Routing in the Internet, 2nd Edn
-
-
Huitema, C.1
-
31
-
-
85039346416
-
-
Dec. [Online]
-
Lawrence Livermore National Laboratory and Sandia National Laboratories, Intrusion detection and response, Dec. 1996. [Online] Available: http://www.all.net/journal/ntb/ids.html.
-
(1996)
Intrusion Detection and Response
-
-
-
32
-
-
2342489650
-
Virus wars: Fewer attacks, new threats
-
G. Lawton, Virus wars: Fewer attacks, new threats, IEEE Computer, 35(12) (2002), 22-24.
-
(2002)
IEEE Computer
, vol.35
, Issue.12
, pp. 22-24
-
-
Lawton, G.1
-
33
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S.J. Stolfo and E. Zadok, Toward cost-sensitive modeling for intrusion detection and response, Journal of Computer Security 10(1-2) (2002).
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.J.4
Zadok, E.5
-
34
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation
-
R.P. Lippmann, D.J. Fried, I. Graf, J.W. Haines, K.R. Kendall, D. McClung, D. Weber, S.E. Webster, D. Wyschogrod, R.K. Cunningham and M.A. Zissman, Evaluating intrusion detection systems: The 1998 DARPA off-line intrusion detection evaluation, in: Proceedings of the DARPA Information Survivability Conference and Exposition, 2000.
-
(2000)
Proceedings of the DARPA Information Survivability Conference and Exposition
-
-
Lippmann, R.P.1
Fried, D.J.2
Graf, I.3
Haines, J.W.4
Kendall, K.R.5
McClung, D.6
Weber, D.7
Webster, S.E.8
Wyschogrod, D.9
Cunningham, R.K.10
Zissman, M.A.11
-
35
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
R. Mahajan, S.M. Bellovin, S. Floyd, J. Ioannidis, V. Paxson and S. Shenker, Controlling high bandwidth aggregates in the network, ACM SIGCOMM Computer Communication Review 32(3) (2002), 62-73.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
36
-
-
0036804085
-
Network intrusion and fault detection: A statistical anomaly approach
-
C. Manikopoulos and S. Papavassiliou, Network intrusion and fault detection: A statistical anomaly approach, IEEE Commun. Mag. 40(10) (2002), 76-82.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 76-82
-
-
Manikopoulos, C.1
Papavassiliou, S.2
-
38
-
-
11144265841
-
Effectiveness of rate-limiting in mitigating flooding DoS attacks
-
M.H. Hamza, ed., ACTA Press, Anaheim, CA, USA
-
J. Mölsä, Effectiveness of rate-limiting in mitigating flooding DoS attacks, in: Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology at St. Thomas, US Virgin Islands, M.H. Hamza, ed., ACTA Press, Anaheim, CA, USA, 2004, pp. 155-160.
-
(2004)
Proceedings of the Third IASTED International Conference on Communications, Internet, and Information Technology at St. Thomas, US Virgin Islands
, pp. 155-160
-
-
Mölsä, J.1
-
39
-
-
29244457359
-
Mitigating DoS attacks against the DNS with dynamic TTL values
-
S. Liimatainen and T. Virtanen, eds, Espoo, Finland
-
J. Mölsä, Mitigating DoS attacks against the DNS with dynamic TTL values, in: Proceedings of the Ninth Nordic Workshop on Secure IT Systems, S. Liimatainen and T. Virtanen, eds, Espoo, Finland, 2004, pp. 118-124.
-
(2004)
Proceedings of the Ninth Nordic Workshop on Secure IT Systems
, pp. 118-124
-
-
Mölsä, J.1
-
40
-
-
0742276097
-
Inside the Slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, Inside the Slammer worm, IEEE Security & Privacy 1(4) (2003), 33-39.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
41
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Marseille, France
-
D. Moore, C. Shannon and J. Brown, Code-Red: a case study on the spread and victims of an Internet worm, in: Proceedings of the Internet Measurement Workshop, Marseille, France, 2002.
-
(2002)
Proceedings of the Internet Measurement Workshop
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
43
-
-
85084161486
-
Inferring Internet denial-of-service activity
-
Washington, DC
-
D. Moore, G.M. Voelker and S. Savage, Inferring Internet denial-of-service activity, in: Proceedings of the 10th USENIX Security Symposium, Washington, DC, 2001.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
44
-
-
3543130426
-
Dragon claws its way to the top
-
August 20
-
P. Mueller and G. Shipley, Dragon claws its way to the top, Network Computing (August 20) (2001) 45-67.
-
(2001)
Network Computing
, pp. 45-67
-
-
Mueller, P.1
Shipley, G.2
-
45
-
-
0028430224
-
Network intrusion detection
-
B. Mukherjee, L.T. Heberlein and K.N. Levitt, Network intrusion detection, IEEE Network 8(3) (1994), 26-41.
-
(1994)
IEEE Network
, vol.8
, Issue.3
, pp. 26-41
-
-
Mukherjee, B.1
Heberlein, L.T.2
Levitt, K.N.3
-
46
-
-
0004145060
-
-
New Riders Publishing, Indiana, IN
-
S. Northcutt and J. Novak, Network Intrusion Detection, 3rd edn, New Riders Publishing, Indiana, IN, 2002.
-
(2002)
Network Intrusion Detection, 3rd Edn
-
-
Northcutt, S.1
Novak, J.2
-
47
-
-
0036805086
-
Securing the Internet routing infrastructure
-
P. Papadimitratos and Z.J. Haas, Securing the Internet routing infrastructure, IEEE Commun. Mag. 40(10) (2002), 60-68.
-
(2002)
IEEE Commun. Mag.
, vol.40
, Issue.10
, pp. 60-68
-
-
Papadimitratos, P.1
Haas, Z.J.2
-
48
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, Bro: A system for detecting network intruders in real-time, Computer Networks 31(23-24) (1999), 2435-2463.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
49
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson, An analysis of using reflectors for distributed denial-of-service attacks, ACM SIGCOMM Computer Communication Review 31(3) (2001).
-
(2001)
ACM SIGCOMM Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
-
50
-
-
0004145058
-
-
Secure Networks, Inc.
-
T.H. Ptacek and T.N. Newsham, Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection, Secure Networks, Inc., 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
52
-
-
0030715989
-
Analysis of a Denial of Service attack on TCP
-
Oakland, CA. [Online]
-
C.L. Schuba, I.V. Krsul, M.G. Kuhn, E.H. Spafford, A. Sundaram and D. Zamboni, Analysis of a Denial of Service attack on TCP, in: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, 1997, pp. 208-223. [Online] Available: https://www.cerias.purdue.edu/techreports-ssl/public/97-06.ps.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
55
-
-
24344486810
-
The spread of the Witty worm
-
CAIDA
-
C. Shannon and D. Moore, The spread of the Witty worm, CAIDA, Tech. Rep., 2004.
-
(2004)
Tech. Rep.
-
-
Shannon, C.1
Moore, D.2
-
56
-
-
0036947484
-
Beyond folklore: Observations on fragmented traffic
-
C. Shannon, D. Moore and K.C. Claffy, Beyond folklore: Observations on fragmented traffic, IEEE/ACM Trans. Networking 10(6) (2002) 709-720.
-
(2002)
IEEE/ACM Trans. Networking
, vol.10
, Issue.6
, pp. 709-720
-
-
Shannon, C.1
Moore, D.2
Claffy, K.C.3
-
57
-
-
85084162258
-
How to Own the Internet in your spare time
-
San Francisco, CA
-
S. Staniford, V. Paxson and N. Weaver, How to Own the Internet in your spare time, in: Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, 2002.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
58
-
-
1242327631
-
Autonomic response to distributed Denial of Service attacks
-
Davis, CA
-
D. Sterne, K. Djahandari, B. Wilson, B. Babson, D. Schnackenberg, H. Holliday and T. Reid, Autonomic response to distributed Denial of Service attacks, in: Proceedings of Recent Advances in Intrusion Detection, 4th International Symposium, Davis, CA, 2001, pp. 134-149.
-
(2001)
Proceedings of Recent Advances in Intrusion Detection, 4th International Symposium
, pp. 134-149
-
-
Sterne, D.1
Djahandari, K.2
Wilson, B.3
Babson, B.4
Schnackenberg, D.5
Holliday, H.6
Reid, T.7
-
59
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
Denver, CO
-
R. Stone, Centertrack: An IP overlay network for tracking DoS floods, in: Proceedings of the 9th USENIX Security Symposium, Denver, CO, 2000.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Stone, R.1
-
61
-
-
0003636986
-
-
Prentice Hall, Upper Saddle River, NJ, USA
-
C.D. Wickens and J.G. Hollands, Engineering Psychology and Human Performance, 3rd edn, Prentice Hall, Upper Saddle River, NJ, USA, 2000.
-
(2000)
Engineering Psychology and Human Performance, 3rd Edn
-
-
Wickens, C.D.1
Hollands, J.G.2
-
62
-
-
4243483478
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
HP laboratories, Bristol, June
-
M.M. Williamson, Throttling viruses: Restricting propagation to defeat malicious mobile code, HP laboratories, Bristol, Tech. Rep. HPL-2002-172, June 2002.
-
(2002)
Tech. Rep.
, vol.HPL-2002-172
-
-
Williamson, M.M.1
-
63
-
-
3042826627
-
A call to action: Look beyond the horizon
-
J.M. Wing, A call to action: Look beyond the horizon, IEEE Security & Privacy 1(6) (2003), 62-67.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 62-67
-
-
Wing, J.M.1
|