-
1
-
-
0742283589
-
Snort
-
[Online]. Available
-
M. Roesch, Snort. [Online]. Available: http://www.snort.org
-
-
-
Roesch, M.1
-
2
-
-
0141427794
-
"A signal analysis of network traffic anomalies"
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in Proc. 2nd ACM SIGCOMM Internet Measurement Workshop, 2002, pp. 71-82.
-
(2002)
Proc. 2nd ACM SIGCOMM Internet Measurement Workshop
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
3
-
-
14944367082
-
"Sketch-based change detection: Methods, evaluation, and applications"
-
B. Krishnamurthy, S. Sen, Y. Zhang, and Y. Chen, "Sketch-based change detection: Methods, evaluation, and applications," in Proc. 3rd ACM SIGCOMM Internet Measurement Conf., 2003, pp. 234-247.
-
(2003)
Proc. 3rd ACM SIGCOMM Internet Measurement Conf.
, pp. 234-247
-
-
Krishnamurthy, B.1
Sen, S.2
Zhang, Y.3
Chen, Y.4
-
4
-
-
14844308379
-
"Containment of scanning worms in enterprise networks"
-
to be published
-
S. J. Staniford, "Containment of scanning worms in enterprise networks," J. Computer Security, 2004, to be published.
-
(2004)
J. Computer Security
-
-
Staniford, S.J.1
-
5
-
-
33947524219
-
-
ForeScout Technologies. [Online]. Available
-
ForeScout Technologies. [Online]. Available: http://www.forescout.com
-
-
-
-
6
-
-
85084161486
-
"Inferring Internet denial of service activity"
-
in Aug
-
D. Moore, G. Voelker, and S. Savage, "Inferring Internet denial of service activity," in Proc. 10th USENIX Security Symp., Aug. 2001, pp. 9-22.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
7
-
-
33947516390
-
-
Mazu Publishing. [Online]. Available
-
Mazu Publishing. [Online]. Available: http://www.mazu.com
-
-
-
-
8
-
-
33947518663
-
-
Arbor Networks. [Online]. Available
-
Arbor Networks. [Online]. Available: http://www.arbornetworks.com
-
-
-
-
9
-
-
0036343692
-
"Detecting SYN flooding attacks"
-
H. Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks," in Proc. IEEE INFOCOM, 2002, pp. 1530-1539.
-
(2002)
Proc. IEEE INFOCOM
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
10
-
-
0033295259
-
"Bro: A system for detecting network intruders in realtime"
-
V. Paxson, "Bro: A system for detecting network intruders in realtime," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
11
-
-
14844303748
-
"On the difficulty of scalably detecting network attacks"
-
K. Levchenko, R. Paturi, and G. Varghese, "On the difficulty of scalably detecting network attacks," in Proc. 11th ACM Conf. Computer and Communications Security, 2004, pp. 12-20.
-
(2004)
Proc. 11th ACM Conf. Computer and Communications Security
, pp. 12-20
-
-
Levchenko, K.1
Paturi, R.2
Varghese, G.3
-
12
-
-
33947547005
-
"The Naptha DoS vulnerabilities"
-
[Online]. Available
-
R. Keyes, "The Naptha DoS vulnerabilities," [Online]. Available: http://www.cert.org/advisories/CA-2000-21.html
-
-
-
Keyes, R.1
-
13
-
-
12244311689
-
"A taxonomy of computer worms"
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in Proc. ACM Workshop of Rapid Malcode (WORM), 2003, pp. 11-18.
-
(2003)
Proc. ACM Workshop of Rapid Malcode (WORM)
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
14
-
-
85084162258
-
"How to Own the Internet in your spare time"
-
in Aug
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in your spare time," in Proc. 11th USENIX Security Symp., Aug. 2002, pp. 149-167.
-
(2002)
Proc. 11th USENIX Security Symp.
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
15
-
-
33947508872
-
-
MyDoom.B Virus. [Online]. Available
-
MyDoom.B Virus. [Online]. Available: http://www.us-cert.gov/cas/ techalerts/TA04-028A.html
-
-
-
-
16
-
-
33947520221
-
"Code Red"
-
CERT Advisory CA-2001-19, Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, [Online]. Available
-
CERT Advisory CA-2001-19, "Code Red" Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, [Online]. Available: http://www.cert.org/advisories/CA-2001-19.html
-
-
-
-
17
-
-
33947505183
-
-
CERT Advisory CA-2001-26 Nimda Worm, [Online]. Available
-
CERT Advisory CA-2001-26 Nimda Worm, [Online]. Available: http://www.cert.org/advisories/CA-2001-26.html
-
-
-
-
18
-
-
33947530508
-
-
CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, [Online]. Available
-
CERT Advisory CA-1998-01 Smurf IP Denial-of-Service Attacks, [Online]. Available: http://www.cert.org/advisories/CA-1998-01.html
-
-
-
-
19
-
-
0003375670
-
"An analysis of using reflectors for distributed denial-of-service attacks"
-
Jul
-
V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," Comput. Commun. Rev., vol. 31, no. 3, Jul. 2001.
-
(2001)
Comput. Commun. Rev.
, vol.31
, Issue.3
-
-
Paxson, V.1
-
20
-
-
85084163167
-
"MULTOPS: A data-structure for bandwidth attack detection"
-
T. M. Gill and M. Poletto, "MULTOPS: A data-structure for bandwidth attack detection," in Proc. 10th USENIX Security Symp., 2001, pp. 23-38.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 23-38
-
-
Gill, T.M.1
Poletto, M.2
-
22
-
-
0004317693
-
"Quicksand: Quick summary and analysis of network data"
-
A. C. Gilbert, S. Guha, P. Indyk, S. Muthukrishnan, and M. J. Strauss, "Quicksand: Quick summary and analysis of network data," DIMACS, Tech. Rep. 2001-43, 2001.
-
(2001)
DIMACS, Tech. Rep. 2001-43
-
-
Gilbert, A.C.1
Guha, S.2
Indyk, P.3
Muthukrishnan, S.4
Strauss, M.J.5
-
23
-
-
0141440878
-
"New directions in traffic measurement and accounting"
-
C. Estan and G. Varghese, "New directions in traffic measurement and accounting," in Proc. ACM SIGCOMM, 2002, pp. 271-282.
-
(2002)
Proc. ACM SIGCOMM
, pp. 271-282
-
-
Estan, C.1
Varghese, G.2
-
24
-
-
14944380706
-
"Autofocus: A tool for automatic traffic analysis"
-
C. Estan and G. Varghese, "Autofocus: A tool for automatic traffic analysis," in Proc. ACM SIGCOMM, 2003, pp. 137-148.
-
(2003)
Proc. ACM SIGCOMM
, pp. 137-148
-
-
Estan, C.1
Varghese, G.2
-
25
-
-
33947493181
-
-
Cisco NetFlow. [Online]. Available
-
Cisco NetFlow. [Online]. Available: http://www.cisco.com/en/US/products/ ps6601/products_ios_protocol_group_home.html
-
-
-
-
26
-
-
0014814325
-
"Space/time tradeoffs in hash coding with allowable errors"
-
Jul
-
B. H. Bloom, "Space/time tradeoffs in hash coding with allowable errors," Commun. ACM, vol. 13, no. 7, pp. 422-426, Jul. 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
27
-
-
1542300231
-
"On the constancy of internet path properties"
-
Y. Zhang, N. Duffleld, V. Paxson, and S. Shenker, "On the constancy of internet path properties," in Proc. ACM SIGCOMM Internet Measurement Workshop, 2001, pp. 197-211.
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
, pp. 197-211
-
-
Zhang, Y.1
Duffleld, N.2
Paxson, V.3
Shenker, S.4
-
29
-
-
33947511386
-
-
NMap. [Online]. Available
-
NMap. [Online]. Available: http://www.insecure.org/nmap
-
-
-
-
30
-
-
33947501830
-
-
Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available
-
Cooperative Association for Internet Data Analysis (CAIDA). [Online]. Available: http://www.caida.org
-
-
-
-
31
-
-
1242287724
-
"A framework for classifying denial of service attacks"
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. ACM SIGCOMM, 2003, pp. 99-110.
-
(2003)
Proc. ACM SIGCOMM
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
32
-
-
0024984013
-
"A network security monitor"
-
L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee,, J. Wood, and D. Wolber, "A network security monitor," in Proc. IEEE Symp. Research in Security and Privacy, 1990, pp. 296-304.
-
(1990)
Proc. IEEE Symp. Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
33
-
-
84942250809
-
"Surveillance detection in high bandwidth environments"
-
S. Robertson, E. V. Siegel, M. Miller, and S. J. Stolfo, "Surveillance detection in high bandwidth environments," in Proc. 2003 DARPA DISCEX III Conf., pp. 229-238.
-
Proc. 2003 DARPA DISCEX III Conf.
, pp. 229-238
-
-
Robertson, S.1
Siegel, E.V.2
Miller, M.3
Stolfo, S.J.4
-
34
-
-
3543096392
-
"Fast portscan detection using sequential hypothesis testing"
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. IEEE Symp. Security and Privacy, 2004, pp. 211-225.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
35
-
-
33947525075
-
"Another new thought on dealing with SYN flooding"
-
[Online]. Available
-
E. Shenk, "Another new thought on dealing with SYN flooding," 1996 [Online]. Available: http://www.wcug.wwu.edu/lists/netdev/199609/ msg00171.html
-
(1996)
-
-
Shenk, E.1
-
36
-
-
33947502399
-
-
Riverhead Networks. [Online]. Available
-
Riverhead Networks. [Online]. Available: http://www.riverhead.com
-
-
-
-
37
-
-
0018456171
-
"Universal classes of hash functions"
-
L. Carter and M. N. Wegman, "Universal classes of hash functions," J. Comput. Syst. Sci., vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
J. Comput. Syst. Sci.
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, L.1
Wegman, M.N.2
-
38
-
-
3543097593
-
"SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks"
-
A. Yaar, A. Perrig, and D. Song, "SIFF: A stateless Internet flow filter to mitigate DDoS flooding attacks," in Proc. IEEE Symp. Security and Privacy, 2004, pp. 130-143.
-
(2004)
Proc. IEEE Symp. Security and Privacy
, pp. 130-143
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
39
-
-
0037810705
-
"Pi: A path identification mechanism to defend against DDoS attacks"
-
A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against DDoS attacks," in Proc. IEEE Symp. Security and Privacy, 2003, pp. 93-107.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
40
-
-
0036375286
-
"SYN-dog: Sniffing SYN flooding sources"
-
H. Wang, D. Zhang, and K. Shin, "SYN-dog: Sniffing SYN flooding sources," in Proc. IEEE Int. Conf. Distributed Computing Systems (ICDCS), 2002, pp. 421-428.
-
(2002)
Proc. IEEE Int. Conf. Distributed Computing Systems (ICDCS)
, pp. 421-428
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
41
-
-
14944374775
-
"SYN Cookies"
-
[Online]. Available
-
D. J. Bernstein, "SYN Cookies," 1997 [Online]. Available: http://cr.yp.to/syncookies.html
-
(1997)
-
-
Bernstein, D.J.1
-
42
-
-
3042859154
-
"Resisting syn flooding dos attacks with a syn cache"
-
J. Lemon, "Resisting syn flooding dos attacks with a syn cache," in Proc. USENIX BSDCon' 2002, pp. 89-98.
-
Proc. USENIX BSDCon'2002
, pp. 89-98
-
-
Lemon, J.1
-
43
-
-
0030715989
-
"Analysis of a denial of service attack on TCP"
-
C. L. Schuba, I. V. Krsul, M. G. Kuhn, E. H. Spafford, A. Sundaram, and D. Zamboni, "Analysis of a denial of service attack on TCP," in Proc. IEEE Symp. Security and Privacy, 1997, pp. 208-223.
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 208-223
-
-
Schuba, C.L.1
Krsul, I.V.2
Kuhn, M.G.3
Spafford, E.H.4
Sundaram, A.5
Zamboni, D.6
-
44
-
-
33947522106
-
-
Netscreen Technologies. [Online]. Available
-
Netscreen Technologies. [Online]. Available: http://www.netscreen.com
-
-
-
-
45
-
-
17644411571
-
"Hop-count filtering: An effective defense against spoofed ddos traffic"
-
C. Jin, H. Wang, and K. G. Shin, "Hop-count filtering: An effective defense against spoofed ddos traffic," in Proc. 10th ACM Int. Conf. Computer and Communications Security (CCS), 2003, pp. 30-41.
-
(2003)
Proc. 10th ACM Int. Conf. Computer and Communications Security (CCS)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
47
-
-
0242529347
-
"Practical automated detection of stealthy portscans"
-
S. Staniford, J. A. Hoagland, and J. M. McAlerney, "Practical automated detection of stealthy portscans," in Proc. 7th ACM Conf. Computer and Communications Security, 2000, pp. 1-7.
-
(2000)
Proc. 7th ACM Conf. Computer and Communications Security
, pp. 1-7
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
48
-
-
33947511995
-
"Network security platforms will transform security markets"
-
[Online]. Available
-
J. Pescatore, M. Easley, and R. Stiennon, "Network security platforms will transform security markets," 2002 [Online]. Available: http://www.techrepublic.com/ article.jhtml?id=r00220021223jdt01.htm&src=bc
-
(2002)
-
-
Pescatore, J.1
Easley, M.2
Stiennon, R.3
|