-
1
-
-
17744375238
-
Rocketfuel: An ISP topology mapping engine (2003)
-
[Accessed: August 2]
-
Anderson, T., Mahajan, R., Spring, N., Wetherall, D.: Rocketfuel: An ISP topology mapping engine (2003). http://www.cs.washington.edu/research/ networking/rocketfuel/ [Accessed: August 2, 2003]
-
(2003)
-
-
Anderson, T.1
Mahajan, R.2
Spring, N.3
Wetherall, D.4
-
2
-
-
0004133549
-
-
Oxford University Press, New York
-
Barbour, A., Holst, L., Janson, S.: Poisson Approximation. Oxford University Press, New York (1992)
-
(1992)
Poisson Approximation
-
-
Barbour, A.1
Holst, L.2
Janson, S.3
-
4
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
Bloom, B.: Space/time trade-offs in hash coding with allowable errors. Commun. ACM 13 (17), 422-426 (1970)
-
(1970)
Commun. ACM
, vol.13
, Issue.17
, pp. 422-426
-
-
Bloom, B.1
-
5
-
-
0036605072
-
On the number of overflown urns and excess balls in an allocation model with limited urn capacity
-
Boutsikas, M., Koutras, M.: On the number of overflown urns and excess balls in an allocation model with limited urn capacity. Stat. Plan. Inference 104, 259-286 (2002)
-
(2002)
Stat. Plan. Inference
, vol.104
, pp. 259-286
-
-
Boutsikas, M.1
Koutras, M.2
-
6
-
-
0033721503
-
Graph structure in the Web
-
Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., Wiener, J.: Graph structure in the Web. Newblock Comput. Netw. 33 (1-6), 309-320 (2000)
-
(2000)
Newblock Comput. Netw.
, vol.33
, Issue.1-6
, pp. 309-320
-
-
Broder, A.1
Kumar, R.2
Maghoul, F.3
Raghavan, P.4
Rajagopalan, S.5
Stata, R.6
Tomkins, A.7
Wiener, J.8
-
7
-
-
70450232823
-
Network applications of Bloom filters: A survey
-
Broder, A., Mitzenmacher, M.: Network applications of Bloom filters: A survey. Internet Math. 1 (4), 485-509 (2003-2004)
-
(2003)
Internet Math
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
9
-
-
22944492300
-
Detecting early worm propagation through packet matching
-
Tech. Rep ISI-TR-2004-585, University of Southern California
-
Chen, X., Heidemann, J.: Detecting early worm propagation through packet matching. Tech. Rep. ISI-TR-2004-585, University of Southern California (2004)
-
(2004)
-
-
Chen, X.1
Heidemann, J.2
-
10
-
-
0004116989
-
-
2nd edn. MIT Press, McGraw-Hill, New York
-
Cormen, T., Leiserson, C., Rivest, R., Stein, C.: Introduction to Algorithms, 2nd edn. MIT Press, McGraw-Hill, New York (2001)
-
(2001)
Introduction to Algorithms
-
-
Cormen, T.1
Leiserson, C.2
Rivest, R.3
Stein, C.4
-
13
-
-
84944030124
-
Deep packet inspection using parallel Bloom filters
-
Stanford, CA
-
Dharmapurikar, S., Krishnamurthy, P., Sproull, T., Lockwood, J.: Deep packet inspection using parallel Bloom filters. In: Symposium on High Performance Interconnects (HotI), pp. 44-51. Stanford, CA (2003)
-
(2003)
Symposium on High Performance Interconnects (HotI)
, pp. 44-51
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Sproull, T.3
Lockwood, J.4
-
14
-
-
1242332554
-
Longest prefix matching using Bloom filters
-
Karlsruhe, Germany
-
Dharmapurikar, S., Krishnamurthy, P., Taylor, D.: Longest prefix matching using Bloom filters. In: Proceedings of the Special Interest Group on Data Communication (SIGCOMM'03), pp. 201-212. Karlsruhe, Germany (2003)
-
(2003)
Proceedings of the Special Interest Group on Data Communication (SIGCOMM'03)
, pp. 201-212
-
-
Dharmapurikar, S.1
Krishnamurthy, P.2
Taylor, D.3
-
16
-
-
0033204106
-
On power-law relationships of the Internet topology
-
Boston/Cambridge, MA
-
Faloutsos, M., Faloutsos, P., Faloutsos, C.: On power-law relationships of the Internet topology. In: Proceedings of the Special Interest Group on Data Communication (SIGCOMM'99), pp. 251-262. Boston/Cambridge, MA (1999)
-
(1999)
Proceedings of the Special Interest Group on Data Communication (SIGCOMM'99)
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
17
-
-
0034206002
-
Summary cache: A scalable wide-area Web cache sharing protocol
-
Fan, L., Cao, P., Almeida, J., Broder, A.: Summary cache: A scalable wide-area Web cache sharing protocol. IEEE/ACM Trans. Netw. 8 (3), 281-293 (2000)
-
(2000)
IEEE/ACM Trans. Netw.
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
19
-
-
8644229619
-
The art of port scanning
-
Fyodor: URL: [Accessed: March 6, 2003]
-
Fyodor: The art of port scanning. Phrack Mag. 7 (51)H(1997). URL: http://www.phrack.org [Accessed: March 6, 2003]
-
(1997)
Phrack Mag
, vol.7
, Issue.51
-
-
-
21
-
-
33244488406
-
Secure indexes
-
Cryptology ePrint Archive, Report 2003/216 URL: [Accessed: January 7, 2004]
-
Goh, E.J.: Secure indexes. Cryptology ePrint Archive, Report 2003/216 (2003). URL: http://eprint.iacr.org/2003/216/ [Accessed: January 7, 2004]
-
(2003)
-
-
Goh, E.J.1
-
22
-
-
84945300922
-
Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512
-
Proceedings of Information Security Conference (ISC 2002) Springer, Sao Paulo, Brazil
-
Grembowski, T., Lien, R., Gaj, K., Nguyen, N., Bellows, P., Flidr, J., Lehman, T., Schott, B.: Comparative analysis of the hardware implementations of hash functions SHA-1 and SHA-512. In: Proceedings of Information Security Conference (ISC 2002), Lecture Notes in Computer Science, vol. 2433, pp. 75-89. Springer, Sao Paulo, Brazil (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2433
, pp. 75-89
-
-
Grembowski, T.1
Lien, R.2
Gaj, K.3
Nguyen, N.4
Bellows, P.5
Flidr, J.6
Lehman, T.7
Schott, B.8
-
23
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, DC
-
Handley, M., Kreibich, C., Paxson, V.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: Proceedings of the 10th USENIX Security Symposium. Washington, DC (2001)
-
(2001)
Proceedings of the 10th USENIX Security Symposium
-
-
Handley, M.1
Kreibich, C.2
Paxson, V.3
-
24
-
-
84959055142
-
Dynamic self-checking techniques for improved tamper resistance
-
Proceedings of the First ACM Workshop on Digital Rights Management (DRM 2001) Springer, Berlin Heidelberg New York
-
Horne, B., Matheson, L., Sheehan, C., Tarjan, R.: Dynamic self-checking techniques for improved tamper resistance. In: Proceedings of the First ACM Workshop on Digital Rights Management (DRM 2001), Lecture Notes in Computer Science, vol. 2320, pp. 141-159. Springer, Berlin Heidelberg New York (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2320
, pp. 141-159
-
-
Horne, B.1
Matheson, L.2
Sheehan, C.3
Tarjan, R.4
-
25
-
-
0000709793
-
Negative association of random variables, with applications
-
Joag-Dev, K., Proschan, F.: Negative association of random variables, with applications. Ann. Stat. 11 (1), 286-295 (1983)
-
(1983)
Ann. Stat.
, vol.11
, Issue.1
, pp. 286-295
-
-
Joag-Dev, K.1
Proschan, F.2
-
26
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland
-
Jung, J., Paxson, V., Berger, A., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy. Oakland (2004)
-
(2004)
Proceedings of the 2004 IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
27
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
San Diego, CA
-
Kim, H.A., Karp, B.: Autograph: Toward automated, distributed worm signature detection. In: Proceedings of 13th USENIX Security Symposium. San Diego, CA (2004)
-
(2004)
Proceedings of 13th USENIX Security Symposium
-
-
Kim, H.A.1
Karp, B.2
-
28
-
-
3543118019
-
Space-code Bloom filter for efficient traffic flow measurement
-
Miami Beach, FL
-
Kumar, A., Xu, J., Li, L., Wang, J.: Space-code Bloom filter for efficient traffic flow measurement. In: Proceedings of IMC. Miami Beach, FL (2003)
-
(2003)
Proceedings of IMC
-
-
Kumar, A.1
Xu, J.2
Li, L.3
Wang, J.4
-
29
-
-
17444431614
-
Worm propagation and generic attacks
-
Levy, E.: Worm propagation and generic attacks. IEEE Secur. Priv. 3 (2), 63-65 (2005)
-
(2005)
IEEE Secur. Priv.
, vol.3
, Issue.2
, pp. 63-65
-
-
Levy, E.1
-
30
-
-
33745119080
-
Modeling of security and systems. A network worm modeling package for SSFNet (2003)
-
[Accessed: September 10]
-
Liljenstam, M.: Modeling of security and systems. A network worm modeling package for SSFNet (2003). http://www.crhc.uiuc.edu/mili/ research/ssf/worm/ [Accessed: September 10, 2004]
-
(2004)
-
-
Liljenstam, M.1
-
31
-
-
0141762468
-
Inferring link weight using end-to-end measurements
-
Marseille, France
-
Mahajan, R., Spring, N., Wetherall, D., Anderson, T.: Inferring link weight using end-to-end measurements. In: Proceedings of the Internet Measurement Workshop 2002 (IMW'02). Marseille, France (2002)
-
(2002)
Proceedings of the Internet Measurement Workshop 2002 (IMW'02)
-
-
Mahajan, R.1
Spring, N.2
Wetherall, D.3
Anderson, T.4
-
32
-
-
26444534457
-
Mitigating network denial-of-service through diversity-based traffic management
-
Proceedings of the 3rd Annual Conference on Applied Cryptography and Network Security (ACNS 2005), Springer, New York
-
Matrawy, A., van Oorschot, P., Somayaji, A.: Mitigating network denial-of-service through diversity-based traffic management. In: Proceedings of the 3rd Annual Conference on Applied Cryptography and Network Security (ACNS 2005), Lecture Notes in Computer Science, vol. 3531, pp. 104-121. Springer, New York (2005)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 104-121
-
-
Matrawy, A.1
van Oorschot, P.2
Somayaji, A.3
-
33
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
McHugh, J.: Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Trans. Inf. Syst. Secur. (TISSEC) 3 (4), 262-294 (2000)
-
(2000)
ACM Trans. Inf. Syst. Secur. (TISSEC)
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
34
-
-
33745145023
-
DARPA intrusion detection evaluation: Data sets (1999)
-
MIT Lincoln Laboratory: [Accessed: April 1]
-
MIT Lincoln Laboratory: DARPA intrusion detection evaluation: Data sets (1999). http://www.ll.mit.edu/IST/ideval/data/data_index.html [Accessed: April 1, 2004]
-
(2004)
-
-
-
36
-
-
0742276097
-
Inside the Slammer worm
-
Moore, D., Paxon, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the Slammer worm. IEEE Secur. Priv. 1 (4), 33-39 (2003)
-
(2003)
IEEE Secur. Priv.
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxon, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
37
-
-
0030736223
-
Computer virus-antivirus coevolution
-
Nachenberg, C.: Computer virus-antivirus coevolution. Commun. ACM 40 (1), 46-51 (1997)
-
(1997)
Commun. ACM
, vol.40
, Issue.1
, pp. 46-51
-
-
Nachenberg, C.1
-
38
-
-
84957663269
-
Software performance of universal hash functions
-
Prague, Czech Republic
-
Nevelsteen, W., Preneel, B.: Software performance of universal hash functions. In: Proceedings of Eurocrypt'99, pp. 24-41. Prague, Czech Republic (1999)
-
(1999)
Proceedings of Eurocrypt'99
, pp. 24-41
-
-
Nevelsteen, W.1
Preneel, B.2
-
39
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
Oakland, CA
-
Newsome, J., Karp, B., Song, D.: Polygraph: Automatically generating signatures for polymorphic worms. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Oakland, CA (2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
40
-
-
0003403663
-
The network simulator - NS-2 (2003)
-
NS-2: [Accessed: September 10]
-
NS-2: The network simulator - NS-2 (2003). http://www.isi.edu/nsnam/ns/ [Accessed: September 10, 2003]
-
(2003)
-
-
-
41
-
-
33745153457
-
A novel visualization technique for network anomaly detection
-
Fredericton, Canada
-
Onut, I.V., Zhu, B., Ghorbani, A.: A novel visualization technique for network anomaly detection. In: Proceedings of the 2nd Annual Conference on Privacy, Security and Trust. Fredericton, Canada (2004)
-
(2004)
Proceedings of the 2nd Annual Conference on Privacy, Security and Trust
-
-
Onut, I.V.1
Zhu, B.2
Ghorbani, A.3
-
42
-
-
33745151490
-
Opnet modeler (2003)
-
OPNET Technologies Inc.: [Accessed: September 10]
-
OPNET Technologies Inc.: Opnet modeler (2003). http://www.opnet.com [Accessed: September 10, 2003]
-
(2003)
-
-
-
43
-
-
0001083965
-
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets
-
San Diego, CA
-
Park, K., Lee, H.: On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. In: Proceedings of the Special Interest Group on Data Communication (SIGCOMM'01). San Diego, CA (2001)
-
(2001)
Proceedings of the Special Interest Group on Data Communication (SIGCOMM'01)
-
-
Park, K.1
Lee, H.2
-
44
-
-
0004145058
-
Insertion, evasion and denial of service: Eluding network intrusion detection
-
Tech. rep., Secure Networks, Inc. [Accessed: November 6, 2005]
-
Ptacek, T.H., Newsham, T.N.: Insertion, evasion and denial of service: Eluding network intrusion detection. Tech. rep., Secure Networks, Inc. (1998). http://www.aciri.org/vern/Ptacek-Newsham-Evasion-98.ps [Accessed: November 6, 2005]
-
(1998)
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
45
-
-
0003676885
-
Fingerprinting by random polynomials
-
Technical Report TR-15-81, Center for Research in Computing Technology, Harvard University, Cambridge, MA
-
Rabin, M.: Fingerprinting by random polynomials. Technical Report TR-15-81, Center for Research in Computing Technology, Harvard University, Cambridge, MA (1981)
-
(1981)
-
-
Rabin, M.1
-
46
-
-
14844288974
-
Payload attribution via hierarchical Bloom filters
-
Washington, DC
-
Shanmugasundaram, K., Brönnimann, H., Memon, N.: Payload attribution via hierarchical Bloom filters. In: Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04). Washington, DC (2004)
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
-
-
Shanmugasundaram, K.1
Brönnimann, H.2
Memon, N.3
-
47
-
-
24344486810
-
The spread of the Witty worm (2004)
-
[Accessed: June 18]
-
Shannon, C., Moore, D.: The spread of the Witty worm (2004). http://www.caida.org/analysis/security/witty/ [Accessed: June 18, 2004]
-
(2004)
-
-
Shannon, C.1
Moore, D.2
-
48
-
-
14844309952
-
The EarlyBird system for real-time detection of unknown worms
-
Technical Report CS2003-0761, University of California, San Diego, CA
-
Singh, S., Estan, C., Varghese, G., Savage, S.: The EarlyBird system for real-time detection of unknown worms. Technical Report CS2003-0761, University of California, San Diego, CA (2003)
-
(2003)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
49
-
-
84991765629
-
Automated worm fingerprinting
-
San Francisco
-
Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the 6th USENIX Symposium on Operating Systems Design & Implementation (OSDI'04). San Francisco (2004)
-
(2004)
Proceedings of the 6th USENIX Symposium on Operating Systems Design & Implementation (OSDI'04)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
50
-
-
0001887844
-
Hash-based IP traceback
-
San Diego, CA
-
Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Kent, S., Strayer, W.: Hash-based IP traceback. In: Proceedings of the Special Interest Group on Data Communication (SIGCOMM'01). San Diego, CA (2001)
-
(2001)
Proceedings of the Special Interest Group on Data Communication (SIGCOMM'01)
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Kent, S.6
Strayer, W.7
-
51
-
-
0038006378
-
Measuring ISP topologies with Rocketfuel
-
Pittsburgh, PA
-
Spring, N., Mahajan, R., Wetherall, D.: Measuring ISP topologies with Rocketfuel. In: Proceedings of the Special Interest Group on Data Communication (SIGCOMM'02). Pittsburgh, PA (2002)
-
(2002)
Proceedings of the Special Interest Group on Data Communication (SIGCOMM'02)
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
-
52
-
-
67650540414
-
Scalable simulation framework network models (2003)
-
SSFNet: [Accessed: September 10]
-
SSFNet: Scalable simulation framework network models (2003). http://www.ssfnet.org/homePage.html [Accessed: September 10, 2003]
-
(2003)
-
-
-
57
-
-
85112686126
-
New streaming algorithms for fast detection of superspreaders
-
San Diego, CA
-
Venkataraman, S., Song, D., Gibbons, P., Blum, A.: New streaming algorithms for fast detection of superspreaders. In: The Internet Society Proceedings of the Network and Distributed System Security Symposium (NDSS'05). San Diego, CA (2005)
-
(2005)
The Internet Society Proceedings of the Network and Distributed System Security Symposium (NDSS'05)
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
60
-
-
12244311689
-
A taxonomy of computer worms
-
Washington, DC
-
Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of ACM WORM'03. Washington, DC (2003)
-
(2003)
Proceedings of ACM WORM'03
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
61
-
-
85084164480
-
Very fast containment of scanning worms
-
San Diego, CA
-
Weaver, N., Staniford, S., Paxson, V.: Very fast containment of scanning worms. In: Proceedings of the 13th USENIX Security Symposium. San Diego, CA (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
63
-
-
0038349210
-
Code Red worm propagation modeling and analysis
-
Washington, DC
-
Zou, C., Gong, W., Towsley, D.: Code Red worm propagation modeling and analysis. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02). Washington, DC (2002)
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS'02)
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
|