-
1
-
-
84859682953
-
-
[Online]
-
CERT, CERT/CC advisories. [Online], Available: http://www.cert.org/ advisories/
-
-
-
-
2
-
-
0842304838
-
MULTOPS: A data-structure for bandwidth attack detection
-
Aug.
-
T. M. Gil and M. Poletto, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. USENIX Security Symp., Aug. 2002, pp. 23-38.
-
(2002)
Proc. USENIX Security Symp.
, pp. 23-38
-
-
Gil, T.M.1
Poletto, M.2
-
4
-
-
17644411571
-
Hop-count filtering: An effective defense against spoofed DDoS traffic
-
Oct.
-
C. Jin, H. Wang, and K. G. Shin, "Hop-count filtering: An effective defense against spoofed DDoS traffic," in Proc. 10th ACM Conf. Comput. Commun. Security, Oct. 2003, pp. 30-41.
-
(2003)
Proc. 10th ACM Conf. Comput. Commun. Security
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
5
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. IEEE Symp. Security Privacy, May 2004, pp. 211-225.
-
(2004)
Proc. IEEE Symp. Security Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
6
-
-
35048831757
-
Fast detection of scanning worm infections
-
Sep.
-
J. Jung, S. E. Schechter, and A. W. Berger, "Fast detection of scanning worm infections," in Proc. 7th Int. Symp. Recent Advances in Intrusion Detection (RAID), Sep. 2004, pp. 59-81.
-
(2004)
Proc. 7th Int. Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 59-81
-
-
Jung, J.1
Schechter, S.E.2
Berger, A.W.3
-
7
-
-
33744945767
-
SOS: Secure overlay services
-
Aug.
-
A. Keromytis, V. Misra, and D. Rubenstein, "SOS: Secure overlay services," in Proc. ACM SIGCOMM, Aug. 2002, pp. 61-72.
-
(2002)
Proc. ACM SIGCOMM
, pp. 61-72
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
8
-
-
1242287724
-
A framework for classifying denial of service attacks
-
Aug.
-
A. Keromytis, V. Misra, and D. Rubenstein, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM, Aug. 2003, pp. 99-110.
-
(2003)
Proc. ACM SIGCOMM
, pp. 99-110
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
9
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Aug.
-
H. Kim and B. Karp, "Autograph : Toward automated, distributed worm signature detection," in Proc. 13th USENIX Security Symp., Aug. 2004, pp. 271-286.
-
(2004)
Proc. 13th USENIX Security Symp.
, pp. 271-286
-
-
Kim, H.1
Karp, B.2
-
10
-
-
8344261545
-
Packetscore: Statistical-based overload control against distributed denial-of-service attacks
-
Mar.
-
Y. Kim, W. Lau, M. Chuah, and H. Chao, "Packetscore: Statistical-based overload control against distributed denial-of-service attacks," in Proc. IEEE INFOCOM, Mar. 2004, pp. 2594-2604.
-
(2004)
Proc. IEEE INFOCOM
, pp. 2594-2604
-
-
Kim, Y.1
Lau, W.2
Chuah, M.3
Chao, H.4
-
11
-
-
0036093229
-
Toward cost-sensitive modeling for intrusion detection and response
-
W. Lee, W. Fan, M. Miller, S. Stolfo, and E. Zadok, "Toward cost-sensitive modeling for intrusion detection and response," J. Comput. Security, vol. 10, no. 1, 2, pp. 5-22, 2002.
-
(2002)
J. Comput. Security
, vol.10
, Issue.1-2
, pp. 5-22
-
-
Lee, W.1
Fan, W.2
Miller, M.3
Stolfo, S.4
Zadok, E.5
-
12
-
-
25844492549
-
On the effectiveness of ddos attacks on statistical filtering
-
Mar.
-
Q. Li, E.-C. Chang, and M. Chan, "On the effectiveness of ddos attacks on statistical filtering," in Proc. IEEE INFOCOM, Mar. 2005, pp. 1373-1383.
-
(2005)
Proc. IEEE INFOCOM
, pp. 1373-1383
-
-
Li, Q.1
Chang, E.-C.2
Chan, M.3
-
13
-
-
84904888755
-
Attacking DDoS at the source
-
Nov.
-
J. Mirkovic, G. Prier, and P. Reiher, "Attacking DDoS at the source," in Proc. 10th IEEE Int. Conf. Netw. Protocols (ICNP), Nov. 2002, pp. 312-321.
-
(2002)
Proc. 10th IEEE Int. Conf. Netw. Protocols (ICNP)
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
15
-
-
0742276097
-
Inside the Slammer worm
-
Jul.
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Mag. Security Privacy, vol. 1, no. 4, pp. 33-39, Jul. 2003.
-
(2003)
IEEE Mag. Security Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
16
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Mar.
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage, "Internet quarantine: Requirements for containing self-propagating code," in Proc. IEEE INFOCOM, Mar. 2003, pp. 1901-1910.
-
(2003)
Proc. IEEE INFOCOM
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
17
-
-
0033650584
-
Practical network support for IP traceback
-
Aug.
-
S. Savage, D. Wetherall, A. Karlin, and T. Anderson, "Practical network support for IP traceback," in Proc. ACM SIGCOMM, Aug. 2000, pp. 295-306.
-
(2000)
Proc. ACM SIGCOMM
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
18
-
-
84991765629
-
Automated worm fingerprinting
-
Dec.
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proc. 6th ACM/USENIX Symp. Operating System Des. Implementation (OSDI), Dec. 2004, pp. 45-60.
-
(2004)
Proc. 6th ACM/USENIX Symp. Operating System Des. Implementation (OSDI)
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
19
-
-
14844308379
-
Containment of scanning worms in enterprise networks
-
to be published
-
S. Staniford, "Containment of scanning worms in enterprise networks," J. Comput. Security, to be published.
-
J. Comput. Security
-
-
Staniford, S.1
-
20
-
-
85084162258
-
How to own the Internet in your spare time
-
Aug.
-
S. Staniford, V. Paxson, and N. Weaver, "How to own the Internet in your spare time," in Proc. USENIX Security Symp., Aug. 2002, pp. 149-167.
-
(2002)
Proc. USENIX Security Symp.
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
21
-
-
0036343692
-
Detecting SYN flooding attacks
-
Jun.
-
H. Wang, D. Zhang, and K. G. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, Jun. 2002, pp. 1530-1539.
-
(2002)
Proc. IEEE INFOCOM
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
22
-
-
12244311689
-
A taxonomy of computer worms
-
Oct.
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proc. ACM CCS Workshop Rapid Malcode (WORM'03), Oct. 2003, pp. 11-18.
-
(2003)
Proc. ACM CCS Workshop Rapid Malcode (WORM'03)
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
23
-
-
85084164480
-
Very fast containment of scanning worms
-
Aug.
-
N. Weaver, S. Staniford, and V. Paxson, "Very fast containment of scanning worms," in Proc. 13th USENIX Security Symp., Aug. 2004, pp. 29-44.
-
(2004)
Proc. 13th USENIX Security Symp.
, pp. 29-44
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
24
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat mobile malicious code
-
Dec.
-
M. M. Williamson, "Throttling viruses: Restricting propagation to defeat mobile malicious code," in Proc. 18th Annu. Comput. Security Appl. Conf., Dec. 2002, pp. 61-68.
-
(2002)
Proc. 18th Annu. Comput. Security Appl. Conf.
, pp. 61-68
-
-
Williamson, M.M.1
-
25
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
Oct.
-
C. C. Zou, W. Gong, and D. Towsley, "Worm propagation modeling and analysis under dynamic quarantine defense," Proc. ACM CCS Workshop on Rapid Malcode (WORM'03), pp. 51-60, Oct. 2003.
-
(2003)
Proc. ACM CCS Workshop on Rapid Malcode (WORM'03)
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
|