-
3
-
-
2642555499
-
Performance analysis of content matching intrusion detection systems
-
Jan.
-
S. Antonatos, K.G. Anagnostakis, M. Polychronakis, and E.P. Markatos, "Performance Analysis of Content Matching Intrusion Detection Systems," Proc. Fourth IEEE/IPSJ Symp. Applications and the Internet (SAINT 2004), Jan. 2004.
-
(2004)
Proc. Fourth IEEE/IPSJ Symp. Applications and the Internet (SAINT 2004)
-
-
Antonatos, S.1
Anagnostakis, K.G.2
Polychronakis, M.3
Markatos, E.P.4
-
4
-
-
0242624600
-
MET: An experimental system for malicious email tracking
-
Sept.
-
M. Bhattacharyya, M.G. Schultz, E. Eskin, S. Hershkop, and S.J. Stolfo, "MET: An Experimental System for Malicious Email Tracking," Proc. New Security Paradigms Workshop (NSPW), pp. 1-12, Sept. 2002.
-
(2002)
Proc. New Security Paradigms Workshop (NSPW)
, pp. 1-12
-
-
Bhattacharyya, M.1
Schultz, M.G.2
Eskin, E.3
Hershkop, S.4
Stolfo, S.J.5
-
5
-
-
0033885344
-
Performance of hashing-based schemes for internet load balancing
-
Z. Cao, Z. Wang, and E.W. Zegura, "Performance of Hashing-Based Schemes for Internet Load Balancing," Proc. IEEE Infocom, pp. 323-341, 2000.
-
(2000)
Proc. IEEE Infocom
, pp. 323-341
-
-
Cao, Z.1
Wang, Z.2
Zegura, E.W.3
-
6
-
-
35248828109
-
Code generation for packet header intrusion analysis on the IXP1200 network processor
-
Sept.
-
I. Charitakis, D. Pnevmatikatos, E.P. Markatos, and K.G. Anagnostakis, "Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor," Proc. Seventh Int'l Workshop Software and Compilers for Embedded Systems (SCOPES '03), Sept. 2003.
-
(2003)
Proc. Seventh Int'l Workshop Software and Compilers for Embedded Systems (SCOPES '03)
-
-
Charitakis, I.1
Pnevmatikatos, D.2
Markatos, E.P.3
Anagnostakis, K.G.4
-
8
-
-
84882798973
-
A hardware platform for network intrusion detection and prevention
-
Feb.
-
C. Clark, W. Lee, D. Schimmel, D. Contis, M. Kone, and A. Thomas, "A Hardware Platform for Network Intrusion Detection and Prevention," Proc. Third Workshop Network Processors and Applications (NP3), Feb. 2004.
-
(2004)
Proc. Third Workshop Network Processors and Applications (NP3)
-
-
Clark, C.1
Lee, W.2
Schimmel, D.3
Contis, D.4
Kone, M.5
Thomas, A.6
-
9
-
-
84964497101
-
Towards faster pattern matching for intrusion detection, or exceeding the speed of snort
-
June
-
C.J. Coit, S. Staniford, and J. McAlerney, "Towards Faster Pattern Matching for Intrusion Detection, or Exceeding the Speed of Snort," Proc. Second DARPA Information Survivability Conf. and Exposition (DISCEX II), June 2002.
-
(2002)
Proc. Second DARPA Information Survivability Conf. and Exposition (DISCEX II)
-
-
Coit, C.J.1
Staniford, S.2
McAlerney, J.3
-
11
-
-
2442461381
-
An analysis of fast string matching applied to content-based forwarding and intrusion detection
-
Univ. of California at San Diego
-
M. Fisk and G. Vargheseau, "An Analysis of Fast String Matching Applied to Content-Based Forwarding and Intrusion Detection," Technical Report CS2001-0670 (updated version), Univ. of California at San Diego, 2002.
-
(2002)
Technical Report CS2001-0670 (Updated Version)
-
-
Fisk, M.1
Vargheseau, G.2
-
13
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, V. Paxson, and C. Kreibich, "Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics," Proc. 10th USENIX Security Symp., 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
14
-
-
84858544273
-
Intel IXP1200 network processor
-
Intel Corporation, "Intel IXP1200 Network Processor,"white paper, 2000, http://developer.intel.com.
-
(2000)
White Paper
-
-
-
15
-
-
84858541201
-
-
Internet Security Systems Inc., http://www.iss.net, 2006.
-
-
-
-
16
-
-
14944345677
-
Transport layer identification of P2P traffic
-
Oct.
-
T. Karagiannis, A. Broido, M. Faloutsos, and K. Claffy, "Transport Layer Identification of P2P Traffic," Proc. Internet Measurement Conf. (IMC), Oct. 2004.
-
(2004)
Proc. Internet Measurement Conf. (IMC)
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
Claffy, K.4
-
17
-
-
0036088115
-
Stateful intrusion detection for high-speed networks
-
May
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer, "Stateful Intrusion Detection for High-Speed Networks," Proc. IEEE Symp. Security and Privacy, pp. 285-294, May 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 285-294
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
19
-
-
84964411176
-
Real-time data mining based intrusion detection
-
June
-
W. Lee, S.J. Stolfo, P.K. Chan, E. Eskin, W. Fan, M. Miller, S. Hershkop, and J. Zhang, "Real-Time Data Mining Based Intrusion Detection," Proc. DISCEX II, June 2001.
-
(2001)
Proc. DISCEX II
-
-
Lee, W.1
Stolfo, S.J.2
Chan, P.K.3
Eskin, E.4
Fan, W.5
Miller, M.6
Hershkop, S.7
Zhang, J.8
-
21
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
Oct.
-
R. Lippmann, J.W. Haines, D.J. Fried, J. Korba, and K. Das, "The 1999 DARPA Off-Line Intrusion Detection Evaluation," Computer Networks, vol. 34, no. 4, pp. 579-595, Oct. 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
22
-
-
0036952161
-
Web-conscious storage management for web proxies
-
E.P. Markatos, D.N. Pnevmatikatos, M.D. Flouris, and M.G.H. Katevenis, "Web-Conscious Storage Management for Web Proxies," IEEE/ACM Trans. Networks, vol. 10, no. 6, pp. 735-748, 2002.
-
(2002)
IEEE/ACM Trans. Networks
, vol.10
, Issue.6
, pp. 735-748
-
-
Markatos, E.P.1
Pnevmatikatos, D.N.2
Flouris, M.D.3
Katevenis, M.G.H.4
-
25
-
-
84858550421
-
-
Network Associates, Inc., http://www.networkassociates.com, 2005.
-
-
-
-
26
-
-
32844466110
-
-
Sept.
-
NLANR, "MRA Traffic Archive," Sept. 2002, http://pma.nlanr. net/PMA/Sites/MRA.html.
-
(2002)
MRA Traffic Archive
-
-
-
27
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Jan.
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Proc. Seventh USENIX Security Symp., Jan. 1998.
-
(1998)
Proc. Seventh USENIX Security Symp.
-
-
Paxson, V.1
-
28
-
-
84858541303
-
-
Peapod, "Radware Linkproof,"http://www.peapod.co.uk/ radware_linkproof.htm, 2006.
-
(2006)
Radware Linkproof
-
-
-
31
-
-
1842583287
-
Architecture for a hardware-based, TCP/IP content-processing system
-
D.V. Schuehler, J. Moscola, and J.W. Lockwood, "Architecture for a Hardware-Based, TCP/IP Content-Processing System," IEEE Micro, vol. 24, no. 1, pp. 62-69, 2004.
-
(2004)
IEEE Micro
, vol.24
, Issue.1
, pp. 62-69
-
-
Schuehler, D.V.1
Moscola, J.2
Lockwood, J.W.3
-
34
-
-
84858541202
-
-
TippingPoint Technolgies Inc., http://www.tippingpoint.com, 2005.
-
(2005)
-
-
-
35
-
-
84858546652
-
-
Top Layer Networks, http://www.toplayer.com, 2006.
-
(2006)
-
-
-
36
-
-
84858534946
-
-
TopLayer, "IDS Load Balancer,"http://www.toplayer.com/, 2006.
-
(2006)
IDS Load Balancer
-
-
|