-
1
-
-
31844445856
-
Defending Against Hitlist Worms Using Network Address Space Randomization
-
S. Antonatos, P. Akritidis, E. P. Markatos, and K. G. Anagnostakis. Defending Against Hitlist Worms Using Network Address Space Randomization. In WORM '05: Proceedings of the 2005 ACM workshop on Rapid malcode, pages 30-40, 2005.
-
(2005)
WORM '05: Proceedings of the 2005 ACM workshop on Rapid malcode
, pp. 30-40
-
-
Antonatos, S.1
Akritidis, P.2
Markatos, E.P.3
Anagnostakis, K.G.4
-
4
-
-
33750328206
-
Opportunistic Measurement: Extracting Insight from Spurious Traffic
-
November
-
th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD, November 2005.
-
(2005)
th ACM Workshop on Hot Topics in Networks (HotNets-IV), College Park, MD
-
-
Casado, M.1
Gankel, T.2
Cui, W.3
Paxson, V.4
Savage, S.5
-
5
-
-
34547231798
-
-
Colleen Shannon and David Moore, The CAIDA Dataset on the Witty Worm - March 19-24, 2004, See http://www.caida.org/passive/witty/.
-
Colleen Shannon and David Moore, The CAIDA Dataset on the Witty Worm - March 19-24, 2004, See http://www.caida.org/passive/witty/.
-
-
-
-
7
-
-
34547168121
-
-
CERT. Nimda Worm Advisory CA-2001-26. See http://www.cert.org/advisories/ ca-2001-26.html.
-
CERT. Nimda Worm Advisory CA-2001-26. See http://www.cert.org/advisories/ ca-2001-26.html.
-
-
-
-
8
-
-
0042474227
-
Modeling the Spread of Active Worms
-
Zesheng Chen, Lixin Gao, and Kevin Kwiat. Modeling the Spread of Active Worms. In Proceedings of IEEE INFOCOMM, volume 3, pages 1890-1900, 2003.
-
(2003)
Proceedings of IEEE INFOCOMM
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
10
-
-
84858092896
-
-
Symantec Corporation
-
Symantec Corporation. Witty worm, advisory. See http://securityresponse. Symantec.com/avcenter/venc/data/w32.witty.worm.html.
-
Witty worm, advisory. See
-
-
-
11
-
-
84858090230
-
-
Symantec Corporation, August
-
Symantec Corporation. MS Blaster Worm Advisory, W32.Blaster.Worm. See http://securityresponse.symantec.com/avcenter/venc/data/w32.blaster.worm.html, August 2003.
-
(2003)
MS Blaster Worm Advisory, W32.Blaster.Worm. See
-
-
-
14
-
-
33645759275
-
A Blueprint for Introducing Disruptive Technology into the Internet
-
Larry Peterson, Tom Anderson, David Culler, and Timothy Roscoe. A Blueprint for Introducing Disruptive Technology into the Internet. SIGCOMM Computer Communication Review, 33(1):59-64, 2003.
-
(2003)
SIGCOMM Computer Communication Review
, vol.33
, Issue.1
, pp. 59-64
-
-
Peterson, L.1
Anderson, T.2
Culler, D.3
Roscoe, T.4
-
17
-
-
34547399387
-
Multifaceted Approach to Understanding the Botnet Phenomenon
-
A, to appear Oct
-
Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, and Andreas Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC), to appear Oct., 2006.
-
(2006)
Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC)
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
|