-
2
-
-
17844404852
-
Malicious bots threaten network security
-
D. Geer. Malicious bots threaten network security. IEEE Computer, 38(1):18-20, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.1
, pp. 18-20
-
-
Geer, D.1
-
3
-
-
14944369649
-
Characteristics of internet background radiation
-
Pang Ruoming, Vinod Yenheswaran, Paul Barford, Vern Paxson, and Larry Peterson. Characteristics of internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy, 2004.
-
(2004)
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, Taormina, Sicily, Italy
-
-
Ruoming, P.1
Yenheswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
5
-
-
1642516070
-
The Honeypot Project: Trapping the Hackers
-
Lance Spitzner. The Honeypot Project: Trapping the Hackers. IEEE Security and Privacy, 1:15, 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, pp. 15
-
-
Spitzner, L.1
-
7
-
-
0141762461
-
CodeRed: A Case Study on the Spread and Victims of an Internet Worm
-
D. Moore, C. Shannon, and K. Claffy. CodeRed: A Case Study on the Spread and Victims of an Internet Worm. In Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, 2002.
-
(2002)
Proceedings of ACM SIGCOMM Internet Measurement Workshop, Marseilles, France
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
9
-
-
14944363571
-
Towards understanding distributed blackhole placement
-
Washington D.C
-
Evan Cooke, Michael Bailey, Z. Morley May, Danny McPherson, David Watson, and Farnam Jahanian. Towards understanding distributed blackhole placement. In WORM'04, Washington D.C., 2004.
-
(2004)
WORM'04
-
-
Cooke, E.1
Bailey, M.2
Morley May, Z.3
McPherson, D.4
Watson, D.5
Jahanian, F.6
-
10
-
-
28044457069
-
Network Telescopes
-
Technical Report
-
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Network Telescopes: Technical Report, http://www.caida.org/outreach/papers/2004/ tr-2004-04/tr-2004-04.pdf, 2004.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
11
-
-
84941147155
-
The HoneyTank: A scalable approach to collect malicious Internet traffic
-
Nicolas Vanderavero, Xavier Brouckaert, Olivier Bonaventure, and Baudouin Le Charlier. The HoneyTank: a scalable approach to collect malicious Internet traffic. In Proceedings of the International Infrastructure Survivability Workshop 2004 (IISW'04), Lisbon, Portugal, 2004.
-
(2004)
Proceedings of the International Infrastructure Survivability Workshop 2004 (IISW'04), Lisbon, Portugal
-
-
Vanderavero, N.1
Brouckaert, X.2
Bonaventure, O.3
Charlier, B.L.4
-
12
-
-
84867726835
-
Towards a better understanding of internet threats to enhance survivability
-
F. Pouget, M. Dacier, and V. H. Pham. Towards a better understanding of internet threats to enhance survivability. In Proc. of the International Infrastructure Survivability Workshop (IISW'04), Lisbon, Portugal, 2004.
-
(2004)
Proc. of the International Infrastructure Survivability Workshop (IISW'04), Lisbon, Portugal
-
-
Pouget, F.1
Dacier, M.2
Pham, V.H.3
-
14
-
-
33847178273
-
-
Internet Storm Center
-
Internet Storm Center, http://isc.sans.org/about.php.
-
-
-
-
17
-
-
3543060790
-
Internet intrusions: Global characteristics and prevalence
-
V. Yengeswaran, P. Barford, and J. Ullrich. Internet intrusions: Global characteristics and prevalence. In Proceedings of ACM SIGMETRICS 2003, San Diego, CA., 2003.
-
(2003)
Proceedings of ACM SIGMETRICS 2003, San Diego, CA
-
-
Yengeswaran, V.1
Barford, P.2
Ullrich, J.3
-
20
-
-
33847212035
-
-
Home
-
The Leurre.com Home Page, http://www.leurrecom.org.
-
The Leurre.com
-
-
|