-
1
-
-
0242314805
-
The spread of the Sapphire/Slammer worm, technical report
-
CAIDA
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: The spread of the Sapphire/Slammer worm, technical report. Technical report, CAIDA (2003) http://www.caida.org/outreach/papers/2003/sapphire/.
-
(2003)
Technical Report
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
2
-
-
0004208503
-
-
Usenix; login:, Special issue on Security
-
Bellovin, S.M,: Distributed firewalls. Usenix; login:, Special issue on Security (1999) 37-39
-
(1999)
Distributed Firewalls
, pp. 37-39
-
-
Bellovin, S.M.1
-
3
-
-
0034449536
-
Implementing a distributed firewall
-
ACM Press
-
Ioannidis, S., Keromytis, A.D., Bellovin, S.M., Smith, J.M.: Implementing a distributed firewall. In: CCS '00: Proceedings of the 7th ACM conference on Computer and communications security, ACM Press (2000) 190-199
-
(2000)
CCS '00: Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 190-199
-
-
Ioannidis, S.1
Keromytis, A.D.2
Bellovin, S.M.3
Smith, J.M.4
-
4
-
-
8844253507
-
A hardware platform for network intrusion detection and prevention
-
Madrid, Spain
-
Clark, C., Lee, W., Schimmel, D., Contis, D., Koné, M., Thomas, A.: A hardware platform for network intrusion detection and prevention. In: Third Workshop on Network Processors and Applications, Madrid, Spain (2004)
-
(2004)
Third Workshop on Network Processors and Applications
-
-
Clark, C.1
Lee, W.2
Schimmel, D.3
Contis, D.4
Koné, M.5
Thomas, A.6
-
5
-
-
77958468530
-
Supporting intrusion detection by graph clustering and graph drawing
-
Toulouse, France
-
Toelle, J., Niggemann, O.: Supporting intrusion detection by graph clustering and graph drawing. In: Proc. RAID'00, Toulouse, France (2000)
-
(2000)
Proc. RAID'00
-
-
Toelle, J.1
Niggemann, O.2
-
6
-
-
1242330656
-
A signal analysis of network traffic anomalies
-
Miami, FLA
-
Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: SIGCOMM Internet Measurement Workshop, Miami, FLA (2003)
-
(2003)
SIGCOMM Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
7
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
Miami, FLA
-
Krishnamurthy, B., Sen, S., Zhang, Y., Chen, Y.: Sketch-based change detection: Methods, evaluation, and applications. In: SIGCOMM Internet Measurement Workshop, Miami, FLA (2003)
-
(2003)
SIGCOMM Internet Measurement Workshop
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
9
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Estan, C., Savage, S., Varghese, G.: Automatically inferring patterns of resource consumption in network traffic. In: Proc. of SIGCOMM'03. (2003)
-
(2003)
Proc. of SIGCOMM'03
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
10
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
Aho, A.V., Corasick, M.J.: Efficient string matching: an aid to bibliographic search. Communications of the ACM 18 (1975) 333-340
-
(1975)
Communications of the ACM
, vol.18
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
11
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V.: Bro: A system for detecting network intruders in real-time. Computer Networks 31(23-24) (1999) 2435-2463
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
12
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA
-
Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast Portscan Detection Using Sequential Hypothesis Testing. In: IEEE SP'04, Oakland, CA (2004)
-
(2004)
IEEE SP'04
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
15
-
-
84949683057
-
Extensible routers for active networks
-
N.Shalaby, L.Peterson, A.Bavier, Y.Gottlieb, S.Karlin, A.Nakao, X.Qie, T.Spalink, M.Wawrzoniak: Extensible routers for active networks. In: DANCE'02. (2002)
-
(2002)
DANCE'02
-
-
Shalaby, N.1
Peterson, L.2
Bavier, A.3
Gottlieb, Y.4
Karlin, S.5
Nakao, A.6
Qie, X.7
Spalink, T.8
Wawrzoniak, M.9
-
16
-
-
35248828109
-
S2I: A tool for automatic rule match compilation for the IXP network processor
-
Vienna, Austria
-
I.Charitakis, D.Pnevmatikatos, E.Markatos, K.Anagnostakis: S2I: a tool for automatic rule match compilation for the IXP network processor. In: SCOPES 2003, Vienna, Austria (2003) 226-239
-
(2003)
SCOPES 2003
, pp. 226-239
-
-
Charitakis, I.1
Pnevmatikatos, D.2
Markatos, E.3
Anagnostakis, K.4
-
17
-
-
14844310820
-
TCP offload is a bad idea whose time has come
-
Lihue. Hawaii, USA
-
Mogul, J.: TCP offload is a bad idea whose time has come. In: Proc. of HotOS IX, Lihue. Hawaii, USA (2003)
-
(2003)
Proc. of HotOS IX
-
-
Mogul, J.1
-
18
-
-
8344251916
-
Deterministic memory-efficient string matching algorithms for intrusion detection
-
Hong Kong, China
-
Tuck, N., Sherwood, T., Calder, B., Varghese, G..: Deterministic memory-efficient string matching algorithms for intrusion detection. In: Proceedings of IEEE Infocorn, Hong Kong, China (2004)
-
(2004)
Proceedings of IEEE Infocorn
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
19
-
-
0033890508
-
Transport and application protocol scrubbing
-
Tel-Aviv, Israel
-
Malan, R., Watson, D., Jahanian, F., Howell, P.: Transport and application protocol scrubbing. In: Infocom'2000, Tel-Aviv, Israel (2000)
-
(2000)
Infocom'2000
-
-
Malan, R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
20
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Washington, D.C., USA
-
Handley, M., Paxson, V., Kreibich, C.: Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In: USENIX-Sec'2001, Washington, D.C., USA (2001)
-
(2001)
USENIX-Sec'2001
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
22
-
-
23944487084
-
A revised taxonomy for intrusion-detection systems
-
IBM Research, Zurich
-
Debar, H., Dacier, M., Wepsi, A.: A revised taxonomy for intrusion-detection systems. Technical report, IBM Research, Zurich (1999)
-
(1999)
Technical Report
-
-
Debar, H.1
Dacier, M.2
Wepsi, A.3
-
24
-
-
0004204717
-
The design of GrIDS: A graph-based intrusion detection system
-
UC Davis
-
Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Rowe J., Staniford, S., Yip, R., Zerkle, D.: The design of GrIDS: A graph-based intrusion detection system. Technical Report CSE-99-2, UC Davis (1999)
-
(1999)
Technical Report
, vol.CSE-99-2
-
-
Cheung, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.6
Rowe, J.7
Staniford, S.8
Yip, R.9
Zerkle, D.10
-
26
-
-
0343302299
-
Improving the security of your site by breaking into it
-
Internet White Paper
-
Farmer, D., Venema, W.: Improving the security of your site by breaking into it. Technical report, Internet White Paper (1993) http://www.fish.com/ security/.
-
(1993)
Technical Report
-
-
Farmer, D.1
Venema, W.2
-
27
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
San Francisco, CA
-
Moore, D., Shannon, C., Voelker, G., Savage, S.: Internet quarantine: Requirements for containing self-propagating code, In: Infocom, San Francisco, CA (2003)
-
(2003)
Infocom
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
28
-
-
0004145058
-
Insertion, evasion, and denial of service: Eluding network intrusion detection
-
Secure Networks Inc.
-
Ptacek, T.H., Newsham, T.N.: Insertion, evasion, and denial of service: Eluding network intrusion detection. Technical report, Secure Networks Inc. (1998)
-
(1998)
Technical Report
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
29
-
-
33745651405
-
Performance adaptation in real-time intrusion detection systems
-
Zurich, Switzerland
-
Lee, W., Cabrera, J.B.D., Thomas, A., Balwalli, N., Saluja, S., Zhang, Y.: Performance adaptation in real-time intrusion detection systems. In: RAID'02, Zurich, Switzerland (2002)
-
(2002)
RAID'02
-
-
Lee, W.1
Cabrera, J.B.D.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
30
-
-
0009014466
-
Using embedded sensors for detecting network attack
-
Purdue University
-
Kerschbaum, F., Spafford, E.H., Zamboni, D.: Using embedded sensors for detecting network attack. Technical report, Purdue University (2000)
-
(2000)
Technical Report
-
-
Kerschbaum, F.1
Spafford, E.H.2
Zamboni, D.3
|