-
1
-
-
24344436426
-
The Blaster Worm Then and
-
July/Aug
-
M. Bailey, E. Cooke, F. Jahanian, and D. Watson, "The Blaster Worm Then and Now," IEEE Security and Privacy Magazine, vol. 3, no. 4, pp. 26-31, July/Aug. 2005.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
-
2
-
-
34249007032
-
Worm Propagation Strategies in an IPV6 Internet
-
Feb
-
S.M. Bellovin, A. Keromytis, and B. Cheswick, "Worm Propagation Strategies in an IPV6 Internet," ;LOCIN: The USENIX Magazine, vol. 31, no. 1, pp. 70-76, Feb. 2006.
-
(2006)
LOCIN: The USENIX Magazine
, vol.31
, Issue.1
, pp. 70-76
-
-
Bellovin, S.M.1
Keromytis, A.2
Cheswick, B.3
-
3
-
-
20844436808
-
Collaborative Internet Worm Containment
-
May/June
-
M. Cai, K. Hwang, Y.-K. Kwok, S. Song, and Y. Chen, "Collaborative Internet Worm Containment," IEEE Security and Privacy Magazine, vol. 3, no. 3, pp. 25-33, May/June 2005.
-
(2005)
IEEE Security and Privacy Magazine
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.-K.3
Song, S.4
Chen, Y.5
-
4
-
-
84885827067
-
Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting
-
Aug
-
M. Cai, J. Pan, Y.-K. Kwok, and K. Hwang, "Fast and Accurate Traffic Matrix Measurement Using Adaptive Cardinality Counting," Proc. ACM SIGCOMM MineNet '05 Workshop, Aug. 2005.
-
(2005)
Proc. ACM SIGCOMM MineNet '05 Workshop
-
-
Cai, M.1
Pan, J.2
Kwok, Y.-K.3
Hwang, K.4
-
5
-
-
84978382732
-
Secure Routing for Structured Peer-to-Peer Overlay Networks
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D.S. Wallach, "Secure Routing for Structured Peer-to-Peer Overlay Networks," Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI '02), pp. 299-314, 2002.
-
(2002)
Proc. Fifth Symp. Operating Systems Design and Implementation (OSDI '02)
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
6
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
Oct
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham, "Vigilante: End-to-End Containment of Internet Worms," Proc. 20th ACM Symp. Operating Systems Principles (SOSP), Oct. 2005.
-
(2005)
Proc. 20th ACM Symp. Operating Systems Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
7
-
-
33745788387
-
On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits
-
Nov
-
J.R. Crandall, Z. Su, S.F. Wu, and F.T. Chong, "On Deriving Unknown Vulnerabilities from Zero-Day Polymorphic and Metamorphic Worm Exploits," Proc. 12th ACM Conf. Computer and Comm. Security, Nov. 2005.
-
(2005)
Proc. 12th ACM Conf. Computer and Comm. Security
-
-
Crandall, J.R.1
Su, Z.2
Wu, S.F.3
Chong, F.T.4
-
8
-
-
0037853497
-
Possible Origin of Power-Law Behavior in n-Tuple Zipf Analysis
-
June
-
A. Czirok, H.E. Stanley, and T. Vicsek, "Possible Origin of Power-Law Behavior in n-Tuple Zipf Analysis," Physical Rev. E, vol. 53, no. 6, June 1996.
-
(1996)
Physical Rev. E
, vol.53
, Issue.6
-
-
Czirok, A.1
Stanley, H.E.2
Vicsek, T.3
-
11
-
-
2442583610
-
New Directions in Traffic Measurement and Accounting: Focusing on the Elephants, Ignoring the Mice
-
C. Estan and G. Varghese, "New Directions in Traffic Measurement and Accounting: Focusing on the Elephants, Ignoring the Mice," ACM Trans. Computer Systems, 2003.
-
(2003)
ACM Trans. Computer Systems
-
-
Estan, C.1
Varghese, G.2
-
13
-
-
33846144789
-
DHT-Based Security Infrastructure for Trusted Internet and Grid Computing
-
K. Hwang, Y.-K. Kwok, S. Song, M. Cai, Y. Chen, and Y. Chen, "DHT-Based Security Infrastructure for Trusted Internet and Grid Computing," Int'l J. Critical Infrastructures, vol. 2, no. 4, 2005.
-
(2005)
Int'l J. Critical Infrastructures
, vol.2
, Issue.4
-
-
Hwang, K.1
Kwok, Y.-K.2
Song, S.3
Cai, M.4
Chen, Y.5
Chen, Y.6
-
14
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
May
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," Proc. IEEE Symp. Security and Privacy, May 2004.
-
(2004)
Proc. IEEE Symp. Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
15
-
-
79957872505
-
Analyzing Cooperative Containment of Fast Scanning Worms
-
July
-
J. Kannan, L. Subramanian, I. Stoica, and R.H. Katz, "Analyzing Cooperative Containment of Fast Scanning Worms," Proc. Usenix SRUTI 2005 Workshop, July 2005.
-
(2005)
Proc. Usenix SRUTI 2005 Workshop
-
-
Kannan, J.1
Subramanian, L.2
Stoica, I.3
Katz, R.H.4
-
16
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
H.-A. Kim and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection," Usenix Security, 2004.
-
(2004)
Usenix Security
-
-
Kim, H.-A.1
Karp, B.2
-
17
-
-
33746389292
-
Polymorphic Worm Detection Using Structural Information of Executables
-
Sept
-
C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and G. Vigna, "Polymorphic Worm Detection Using Structural Information of Executables," Proc. Eighth Symp. Recent Advances in Intrusion Detection (RAID), Sept. 2005.
-
(2005)
Proc. Eighth Symp. Recent Advances in Intrusion Detection (RAID)
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
18
-
-
8344259982
-
Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution
-
A. Kumar, M. Sung, J. Xu, and J. Wang, "Data Streaming Algorithms for Efficient and Accurate Estimation of Flow Size Distribution," ACM SIGMETRICS Performance Evaluation Rev., pp. 177-188, 2004.
-
(2004)
ACM SIGMETRICS Performance Evaluation Rev
, pp. 177-188
-
-
Kumar, A.1
Sung, M.2
Xu, J.3
Wang, J.4
-
20
-
-
0026953429
-
Random Texts Exhibit Zipf's-Law-Like Word Frequency Distribution
-
Nov
-
W. Li, "Random Texts Exhibit Zipf's-Law-Like Word Frequency Distribution," IEEE Trans. Information Theory, vol. 38, no. 6, Nov. 1992.
-
(1992)
IEEE Trans. Information Theory
, vol.38
, Issue.6
-
-
Li, W.1
-
21
-
-
33751064824
-
Hamsa: Fast Signature Generation for Zero-Day Polymorphic Worms with Provable Attack Resilience
-
May
-
Z. Li, M. Sanghi, B. Chavez, Y. Chen, and M.-Y. Kao, "Hamsa: Fast Signature Generation for Zero-Day Polymorphic Worms with Provable Attack Resilience," Proc. IEEE Symp. Security and Privacy, May 2006.
-
(2006)
Proc. IEEE Symp. Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chavez, B.3
Chen, Y.4
Kao, M.-Y.5
-
22
-
-
18844367440
-
Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing
-
M. Liljenstam, D.M. Nicol, V.H. Berk, and R.S. Gray, "Simulating Realistic Network Worm Traffic for Worm Warning System Design and Testing," Proc. 2003 ACM Workshop Rapid Malcode (WORM '03), pp. 24-33, 2003.
-
(2003)
Proc. 2003 ACM Workshop Rapid Malcode (WORM '03)
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
23
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
June
-
M.E. Locasto, J. Parekh, A.D. Keromytis, and S. Stolfo, "Towards Collaborative Security and P2P Intrusion Detection," Proc. Sixth Ann. IEEE SMC Information Assurance Workshop (IAW), pp. 333-339, June 2005.
-
(2005)
Proc. Sixth Ann. IEEE SMC Information Assurance Workshop (IAW)
, pp. 333-339
-
-
Locasto, M.E.1
Parekh, J.2
Keromytis, A.D.3
Stolfo, S.4
-
24
-
-
0742276097
-
Inside the Slammer Worm
-
Aug
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer Worm," IEEE Security and Privacy, Aug. 2003.
-
(2003)
IEEE Security and Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
25
-
-
0141762461
-
Code-Red: A Case Study on the Spread and Victims of an Internet Worm
-
D. Moore, C. Shannon, and K. Claffy, "Code-Red: A Case Study on the Spread and Victims of an Internet Worm," Proc. Second ACM SIGCOMM Workshop Internet Measurement, pp. 273-284, 2002.
-
(2002)
Proc. Second ACM SIGCOMM Workshop Internet Measurement
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
26
-
-
11244348692
-
Internet Quarantine: Requirements for Containing Self-Propagating Code
-
D. Moore, C. Shannon, G.M. Voelker, and S. Savage, "Internet Quarantine: Requirements for Containing Self-Propagating Code," Proc. 22nd Conf. Computer Comm., 2003.
-
(2003)
Proc. 22nd Conf. Computer Comm
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
28
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real Time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real Time," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
29
-
-
0003676885
-
Fingerprinting by Random Polynomials
-
Center for Research in Computing Technology, Harvard Univ
-
M.O. Rabin, "Fingerprinting by Random Polynomials," technical report, Center for Research in Computing Technology, Harvard Univ., 1981.
-
(1981)
technical report
-
-
Rabin, M.O.1
-
31
-
-
1142267351
-
Winnowing: Local Algorithms for Document Fingerprinting
-
S. Schleimer, D.S. Wilkerson, and A. Aiken, "Winnowing: Local Algorithms for Document Fingerprinting," Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '03), pp. 76-85, 2003.
-
(2003)
Proc. 2003 ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '03)
, pp. 76-85
-
-
Schleimer, S.1
Wilkerson, D.S.2
Aiken, A.3
-
32
-
-
84991765629
-
Automated Worm Fingerprinting
-
Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated Worm Fingerprinting," Proc. ACM/Usenix Symp. Operating System Design and Implementation, Dec. 2004.
-
(2004)
Proc. ACM/Usenix Symp. Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
35
-
-
0034782005
-
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications, Proc. 2001 ACM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm. (SIGCOMM), 2001.
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. 2001 ACM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm. (SIGCOMM), 2001.
-
-
-
-
36
-
-
21844456680
-
Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits
-
H.J. Wang, C. Guo, D.R. Simon, and A. Zugenmaier, "Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits," Proc. 2004 ACM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm. (SIGCOMM), pp. 193-204, 2004.
-
(2004)
Proc. 2004 ACM Conf. Applications, Technologies, Architectures, and Protocols for Computer Comm. (SIGCOMM)
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
38
-
-
12244311689
-
A Taxonomy of Computer Worms
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A Taxonomy of Computer Worms," Proc. 2003 ACM Workshop Rapid Malcode (WORM '03), pp. 11-18, 2003.
-
(2003)
Proc. 2003 ACM Workshop Rapid Malcode (WORM '03)
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
39
-
-
85084164480
-
Very Fast Containment of Scanning Worms
-
N. Weaver, S. Staniford, and V. Paxson, "Very Fast Containment of Scanning Worms," Proc. Usenix Security Symp., pp. 29-44, 2004.
-
(2004)
Proc. Usenix Security Symp
, pp. 29-44
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
40
-
-
0025449292
-
A Linear-Time Probabilistic Counting Algorithm for Database Applications
-
K.-Y. Whang, B.T. Vander-Zanden, and H.M. Taylor, "A Linear-Time Probabilistic Counting Algorithm for Database Applications," ACM Trans. Database Systems, vol. 15, no. 2, pp. 208-229, 1990.
-
(1990)
ACM Trans. Database Systems
, vol.15
, Issue.2
, pp. 208-229
-
-
Whang, K.-Y.1
Vander-Zanden, B.T.2
Taylor, H.M.3
-
42
-
-
16344396406
-
Monitoring and Early Warning for Internet Worms
-
C.C. Zou, L. Gao, W. Gong, and D.F. Towsley, "Monitoring and Early Warning for Internet Worms," Proc. ACM Conf. Computer and Comm. Security, pp. 190-199, 2003.
-
(2003)
Proc. ACM Conf. Computer and Comm. Security
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.F.4
|