-
1
-
-
85081770459
-
The Internet motion sensor: A distributed blackhole monitoring system
-
San Diego, CA, February
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, February 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium (NDSS '05)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
2
-
-
24344436426
-
The blaster worm: Then and now
-
M. Bailey, E. Cooke, D. Watson, F. Jahanian, and J. Nazario. The Blaster Worm: Then and Now. IEEE Security & Privaey, 3(4):26-31, 2005.
-
(2005)
IEEE Security & Privaey
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Nazario, J.5
-
4
-
-
84860038935
-
-
July
-
Computer Associates. Win32.Agobot. http: //www3.ca.com/securityadvisor/ virusinfo/virus.aspx?id=37776, July 2004.
-
(2004)
Win32.Agobot
-
-
-
5
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
New York, Oct. ACM Press
-
E. Cooke, M. Bailey, Z. M. Mao, D. Watson, and F. Jahanian. Toward understanding distributed blackhole placement. In Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM-04), New York, Oct 2004. ACM Press.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM-04)
-
-
Cooke, E.1
Bailey, M.2
Mao, Z.M.3
Watson, D.4
Jahanian, F.5
-
6
-
-
84888402098
-
The Zombie roundup: Understanding, detecting, and disrupting botnets
-
Cambridge, MA, July
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop), Cambridge, MA, July 2005.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
10
-
-
2642564387
-
-
Prentice-Hall, Inc., Upper Saddle River, NJ 07458, USA
-
P. B. Garrett. Making, Breaking Codes: an Introduction to Cryptology. Prentice-Hall, Inc., Upper Saddle River, NJ 07458, USA, 2001.
-
(2001)
Making, Breaking Codes: An Introduction to Cryptology
-
-
Garrett, P.B.1
-
11
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishna. Fast portscan detection using sequential hypothesis testing. Proceedings 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 9-12, 2004, 2004.
-
(2004)
Proceedings 2004 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 9-12, 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishna, H.4
-
12
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
San Diego, CA, USA, August
-
H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In Proceedings of the 2004 USENIX Security Symposium, San Diego, CA, USA, August 2004.
-
(2004)
Proceedings of the 2004 USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
14
-
-
84860043541
-
-
McAfee. April
-
McAfee. W32/Sdbot.worm. http://vil.nai.com/vil/content/v_100454.htm, April 2003.
-
(2003)
W32/Sdbot.worm.
-
-
-
15
-
-
14344253939
-
Network telescopes: Observing small or distant security events
-
Invited Talk, San Francisco, CA, Aug. 5-9. Unpublished
-
D. Moore. Network telescopes: Observing small or distant security events. In 11th USENIX Security Symposium, Invited talk, San Francisco, CA, Aug. 5-9 2002. Unpublished.
-
(2002)
11th USENIX Security Symposium
-
-
Moore, D.1
-
16
-
-
0742276097
-
Inside the Slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. IEEE Security & Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
17
-
-
85084161486
-
Inferring Internet denial-of-service activity
-
Washington, D.C., Aug.
-
D. Moore, G. M. Voelker, and S. Savage. Inferring Internet denial-of-service activity. In Proceedings of the Tenth USENIX Security Symposium, pages 9-22, Washington, D.C., Aug. 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
18
-
-
14944369649
-
Characteristics of Internet background radiation
-
ACM Press
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 27-40. ACM Press, 2004.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
19
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
Baltimore, MD, August
-
M. A. Rajab, F. Monrose, and A. Terzis. On the effectiveness of distributed worm monitoring. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
20
-
-
0003509661
-
-
Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear. RFC 1918: Address allocation for private internets, 1996. http://www.ietf.org/rfc/ rfc1918.txt.
-
(1996)
RFC 1918: Address Allocation for Private Internets
-
-
Rekhter, Y.1
Moskowitz, B.2
Karrenberg, D.3
De Groot, G.J.4
Lear, E.5
-
23
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
Dec. 21
-
C. Shannon, D. Moore, G. M. Voelker, and S. Savage. Internet quarantine: Requirements for containing self-propagating code. In INFOCOM, Dec. 21 2003.
-
(2003)
INFOCOM
-
-
Shannon, C.1
Moore, D.2
Voelker, G.M.3
Savage, S.4
-
24
-
-
84991765629
-
Automated worm fingerprinting
-
San Francisco, CA, Dec. 6-8
-
S. Singh, C. Estan, G. Varghese, and S. Savage. Automated worm fingerprinting. In 6th Symposium on Operating Systems Design and Implementation (OSDI '04), pages 45-60, San Francisco, CA, Dec. 6-8 2004.
-
(2004)
6th Symposium on Operating Systems Design and Implementation (OSDI '04)
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
26
-
-
14944380936
-
The top speed of flash worms
-
ACM Press
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver. The top speed of flash worms. In WORM '04: Proceedings of the 2004 ACM workshop on Rapid malcode, pages 33-42. ACM Press, 2004.
-
(2004)
WORM '04: Proceedings of the 2004 ACM Workshop on Rapid Malcode
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
28
-
-
26844548971
-
-
March
-
The Honeynet Project. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/bots/, March 2005.
-
(2005)
Know Your Enemy: Tracking Botnets
-
-
-
29
-
-
16344396406
-
Monitoring and early warning for Internet worms
-
ACM Press
-
C. C. Zou, L. Gao, W. Gong, and D. Towsley. Monitoring and early warning for Internet worms. In Proceedings of the 10th ACM conference on Computer and communication security, pages 190-199. ACM Press, 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communication Security
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
|