-
2
-
-
0036036742
-
Resilient overlay networks
-
Banff, Canada, Oct
-
D. Andersen, H. Balakrishnan, F. Kaashoek, and R. Morris. Resilient overlay networks. In Proceedings of the 18th ACM Symposium on Operating System Principles, Banff, Canada, Oct. 2001.
-
(2001)
Proceedings of the 18th ACM Symposium on Operating System Principles
-
-
Andersen, D.1
Balakrishnan, H.2
Kaashoek, F.3
Morris, R.4
-
3
-
-
85081770459
-
The Internet Motion Sensor - A Distributed Blackhole Monitoring System
-
San Diego, CA, Feb
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet Motion Sensor - A Distributed Blackhole Monitoring System. In Proceedings of the 12th Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
4
-
-
22344449516
-
An analysis of the Skype peer-to-peer Internet telephony protocol
-
Technical Report CUCS-039-04, Columbia University, September
-
S.A. Baset and H. Schulzrinne. An analysis of the Skype peer-to-peer Internet telephony protocol. Technical Report CUCS-039-04, Columbia University, September 2004.
-
(2004)
-
-
Baset, S.A.1
Schulzrinne, H.2
-
5
-
-
18844462726
-
Epidemic profiles and defense of scale-free networks
-
Washington, DC, Oct
-
L. Briesemeister, P. Lincoln, and P. Porras. Epidemic profiles and defense of scale-free networks. In Proceedings of the 1st ACM workshop on Rapid Malcode, Washington, DC, Oct. 2003.
-
(2003)
Proceedings of the 1st ACM workshop on Rapid Malcode
-
-
Briesemeister, L.1
Lincoln, P.2
Porras, P.3
-
6
-
-
33646042112
-
Can we contain Internet worms?
-
San Diego, CA, Nov
-
M. Costa, J. Crowcroft, M. Castro, and A. Rowstron. Can we contain Internet worms? In Proceedings of the Third Workshop on Hot Topics in Networks, San Diego, CA, Nov. 2004.
-
(2004)
Proceedings of the Third Workshop on Hot Topics in Networks
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
-
9
-
-
33746906191
-
-
Last accessed: November
-
B. Ediger. Simulating network worms. http://www.users.qwest.net/ ~eballen1/nws/. Last accessed: November 2005.
-
(2005)
Simulating network worms
-
-
Ediger, B.1
-
11
-
-
14944379887
-
A behavioral approach to worm detection
-
Washington, DC, Oct
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia. A behavioral approach to worm detection. In Proceedings of the 2nd ACM workshop on Rapid Malcode, Washington, DC, Oct. 2004.
-
(2004)
Proceedings of the 2nd ACM workshop on Rapid Malcode
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
13
-
-
21644482790
-
Worm Detection, Early Warning and Response Based on Local Victim Information
-
Tucson, AZ, Dec
-
G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley. Worm Detection, Early Warning and Response Based on Local Victim Information. In Proceedings of the 20th Annual Computer Security Applications Conference, Tucson, AZ, Dec. 2004.
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
14
-
-
21644443485
-
Measurement, modeling, and analysis of a peer-to-peer file-sharing workload
-
Bolton Landing, NY, Oct
-
K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload. In Proceedings of the 19th ACM Symposium on Operating System Principles, Bolton Landing, NY, Oct. 2003.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating System Principles
-
-
Gummadi, K.P.1
Dunn, R.J.2
Saroiu, S.3
Gribble, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
15
-
-
0003134671
-
Proceedings of the Fifth ACM International Conference on Knowledge Discovery and Data Mining
-
San Diego, CA, Aug
-
V. Guralnik and J. Srivastava. Event detection from time series data. In Proceedings of the Fifth ACM International Conference on Knowledge Discovery and Data Mining, San Diego, CA, Aug. 1999.
-
(1999)
Event detection from time series data
-
-
Guralnik, V.1
Srivastava, J.2
-
16
-
-
84947927399
-
Mapping peer behavior to packet-level details: A framework for packet-level simulation of peer-to-peer systems
-
Orlando, FL, Oct
-
Q. He, M. Ammar, G. Riley, H. Raj, and R. Fujimoto. Mapping peer behavior to packet-level details: A framework for packet-level simulation of peer-to-peer systems. In Proceedings of the 11th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems, Orlando, FL, Oct. 2003.
-
(2003)
Proceedings of the 11th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunications Systems
-
-
He, Q.1
Ammar, M.2
Riley, G.3
Raj, H.4
Fujimoto, R.5
-
17
-
-
0034486891
-
The mathematics of infectious diseases
-
Oct
-
H. W. Hethcote. The mathematics of infectious diseases. SIAM Review, 42(4), Oct. 2000.
-
(2000)
SIAM Review
, vol.42
, Issue.4
-
-
Hethcote, H.W.1
-
18
-
-
85084164812
-
-
X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
X. Jiang and D. Xu. Collapsar: A VM-Based Architecture for Network Attack Detention Center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
-
-
-
19
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
Berkeley, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In Proceedings of the 2004'IEEE Symposium on Security and Privacy, Berkeley, CA, May 2004.
-
(2004)
Proceedings of the 2004'IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
22
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
Washington, DC, Oct
-
M. Liljenstam, D. M. Nicol, V. H. Berk, and R. S. Gray. Simulating realistic network worm traffic for worm warning system design and testing. In Proceedings of the 1st ACM workshop on Rapid Malcode, pages 24-33, Washington, DC, Oct. 2003.
-
(2003)
Proceedings of the 1st ACM workshop on Rapid Malcode
, pp. 24-33
-
-
Liljenstam, M.1
Nicol, D.M.2
Berk, V.H.3
Gray, R.S.4
-
24
-
-
4544377233
-
Robust Aggregation Protocols for Large-Scale Overlay Networks
-
Florence, Italy, June
-
A. Montresor, M. Jelasity, and O. Babaoglu. Robust Aggregation Protocols for Large-Scale Overlay Networks. In Proceedings of the 2004 International Conference on Dependable Systems and Networks, Florence, Italy, June 2004.
-
(2004)
Proceedings of the 2004 International Conference on Dependable Systems and Networks
-
-
Montresor, A.1
Jelasity, M.2
Babaoglu, O.3
-
25
-
-
0742276097
-
Inside the Slammer Worm
-
July-August
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4), July-August 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
26
-
-
0141762461
-
-
D. Moore, C. Shannon, and k claffy. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the Second ACM Internet Measurement Workshop, 2002.
-
D. Moore, C. Shannon, and k claffy. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the Second ACM Internet Measurement Workshop, 2002.
-
-
-
-
27
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
San Francisco, CA, Mar
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Internet quarantine: requirements for containing self-propagating code. In Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, pages 1901-1910, San Francisco, CA, Mar. 2003.
-
(2003)
Proceedings of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
28
-
-
14944381614
-
Network telescopes: Technical report
-
Technical report, Cooperative Association for Internet Data Analysis CAIDA, July
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage. Network telescopes: Technical report. Technical report, Cooperative Association for Internet Data Analysis (CAIDA), July 2004.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
31
-
-
34547251529
-
-
H. Project. Know your enemy: Honeynets, Nov. 2003.
-
H. Project. Know your enemy: Honeynets, Nov. 2003.
-
-
-
-
34
-
-
0003007594
-
Pastry: Scalable, distributed object location and routing for large-scale peerto-peer systems
-
Heidelberg, Germany, Nov
-
A. Rowstron and P. Druschel. Pastry: Scalable, distributed object location and routing for large-scale peerto-peer systems. In Proceedings of the 2001 International Middleware Conference, Heidelberg, Germany, Nov. 2001.
-
(2001)
Proceedings of the 2001 International Middleware Conference
-
-
Rowstron, A.1
Druschel, P.2
-
35
-
-
1442284120
-
Measuring and analyzing the characteristics of Napster and Gnutella hosts
-
S. Saroiu, K. P. Gummadi, and S. D. Gribble. Measuring and analyzing the characteristics of Napster and Gnutella hosts. Multimedia Systems, 9(2), 2003.
-
(2003)
Multimedia Systems
, vol.9
, Issue.2
-
-
Saroiu, S.1
Gummadi, K.P.2
Gribble, S.D.3
-
37
-
-
2442537008
-
Analyzing peer-to-peer traffic across large networks
-
Apr
-
S. Sen and J. Wang. Analyzing peer-to-peer traffic across large networks. IEEE/ACM Transactions on Networking, 12(2), Apr. 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.2
-
-
Sen, S.1
Wang, J.2
-
38
-
-
34547374965
-
-
M. Singer. Benjamin worm plagues KaZaA. Internetnews.com, May 2002.
-
M. Singer. Benjamin worm plagues KaZaA. Internetnews.com, May 2002.
-
-
-
-
39
-
-
84991765629
-
Automated Worm Fingerprinting
-
San Francisco, CA, Dec
-
S. Singh, C. Estan, and G. V. S. Savage. Automated Worm Fingerprinting. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, San Francisco, CA, Dec. 2004.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation
-
-
Singh, S.1
Estan, C.2
Savage, G.V.S.3
-
40
-
-
0242444735
-
The Internet worm: Crisis and aftermath
-
June
-
E. H. Spafford. The Internet worm: Crisis and aftermath. Communications of the ACM, 32(6), June 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.6
-
-
Spafford, E.H.1
-
41
-
-
85084162258
-
How to Own the Internet in Your Spare Time
-
San Francisco, CA, Aug
-
S. Stamford, V. Paxson, and N. Weaver. How to Own the Internet in Your Spare Time. In Proceedings of the 11th USENIXSecurity Symposium, San Francisco, CA, Aug. 2002.
-
(2002)
Proceedings of the 11th USENIXSecurity Symposium
-
-
Stamford, S.1
Paxson, V.2
Weaver, N.3
-
42
-
-
0000949239
-
GrIDS - a graph-based intrusion detection system for large networks
-
S. Staniford-Chen, S. Cheung, R. Crawford, M. Dilger, J. Frank, J. Hoagland, K. Levitt, C. Wee, R. Yip, and D. Zerkle. GrIDS - a graph-based intrusion detection system for large networks. In Proceedings of the 19th National Information Systems Security Conference, 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
43
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, CA, Aug
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the 2001 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, San Diego, CA, Aug. 2001.
-
(2001)
Proceedings of the 2001 ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
44
-
-
84878711344
-
Characterizing unstructured overlay topologies in modern P2P file-sharing systems
-
Berkeley, CA, Oct
-
D. Stutzbach, R. Rejaie, and S. Sen. Characterizing unstructured overlay topologies in modern P2P file-sharing systems. In Proceedings of the Fifth ACM Internet Measurement Conference, pages 49-62, Berkeley, CA, Oct. 2005.
-
(2005)
Proceedings of the Fifth ACM Internet Measurement Conference
, pp. 49-62
-
-
Stutzbach, D.1
Rejaie, R.2
Sen, S.3
-
45
-
-
85112686126
-
New Streaming Algorithms for Fast Detection of Superspreaders
-
San Diego, CA, Feb
-
S. Venkataraman, D. Song, P. B. Gibbons, and A. Blum. New Streaming Algorithms for Fast Detection of Superspreaders. In Proceedings of the 12th Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.B.3
Blum, A.4
-
46
-
-
14944358991
-
Preliminary results using scale-down to explore worm dynamics
-
Washington, DC, Oct
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson. Preliminary results using scale-down to explore worm dynamics. In Proceedings of the 2nd ACM workshop on Rapid Malcode, pages 65-72, Washington, DC, Oct. 2004.
-
(2004)
Proceedings of the 2nd ACM workshop on Rapid Malcode
, pp. 65-72
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
47
-
-
12244311689
-
A taxonomy of computer worms
-
Washington, DC, Oct
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In Proceedings of the 1st ACM workshop on Rapid Malcode, Washington, DC, Oct. 2003.
-
(2003)
Proceedings of the 1st ACM workshop on Rapid Malcode
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
48
-
-
85068681376
-
DNS-based Detection of Scanning Worms in an Enterprise Network
-
San Diego, CA, Feb
-
D. Whyte, E. Kranakis, and P. van Oorschot. DNS-based Detection of Scanning Worms in an Enterprise Network. In Proceedings of the 12th Network and Distributed System Security Symposium, San Diego, CA, Feb. 2005.
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium
-
-
Whyte, D.1
Kranakis, E.2
van Oorschot, P.3
-
50
-
-
4544303625
-
Dynamic Quarantine of Internet Worms
-
Florence, Italy, June
-
C. Wong, C. Wang, D. Song, S. Bielski, and G. R. Ganger. Dynamic Quarantine of Internet Worms. In Proceedings of the 2004 International Conference on Dependable Systems and Networks, Florence, Italy, June 2004.
-
(2004)
Proceedings of the 2004 International Conference on Dependable Systems and Networks
-
-
Wong, C.1
Wang, C.2
Song, D.3
Bielski, S.4
Ganger, G.R.5
-
51
-
-
85137546697
-
Global Intrusion Detection in the DOMINO Overlay System
-
San Diego, CA, Feb
-
V. Yegneswaran, P. Barford, and S. Jha. Global Intrusion Detection in the DOMINO Overlay System. In Proceedings of the 11th Network and Distributed System Security Symposium, San Diego, CA, Feb. 2004.
-
(2004)
Proceedings of the 11th Network and Distributed System Security Symposium
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
52
-
-
24344475143
-
Analyzing impacts of peer-to-peer systems on propagation of active worm attacks
-
Technical report, Department of Computer Science and Engineering, The Ohio-State University, Mar
-
W. Yu, C. Boyer, and D. Xuan. Analyzing impacts of peer-to-peer systems on propagation of active worm attacks. Technical report, Department of Computer Science and Engineering, The Ohio-State University, Mar. 2004.
-
(2004)
-
-
Yu, W.1
Boyer, C.2
Xuan, D.3
-
53
-
-
33746562303
-
A first look at peer-to-peer worms: Threats and defenses
-
Ithaca, NY, Feb
-
L. Zhou, L. Zhang, F. McSherry, N. immorlica, M. Costa, and S. Chien. A first look at peer-to-peer worms: Threats and defenses. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems, Ithaca, NY, Feb. 2005.
-
(2005)
Proceedings of the 4th International Workshop on Peer-to-Peer Systems
-
-
Zhou, L.1
Zhang, L.2
McSherry, F.3
immorlica, N.4
Costa, M.5
Chien, S.6
-
54
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Washington, DC, Oct
-
C. C. Zou, L. Gao, W. Gong, and D. Towsley. Monitoring and early warning for internet worms. In Proceedings of the 10th ACM Conference on Computer and Communications Security, Washington, DC, Oct. 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
55
-
-
17444378633
-
Email worm modeling and defense
-
Chicago, IL, Oct
-
C. C. Zou, D. Towsley, and W. Gong. Email worm modeling and defense. In Proceedings of the 13th International Conference on Computer Communications and Networks, Chicago, IL, Oct. 2004.
-
(2004)
Proceedings of the 13th International Conference on Computer Communications and Networks
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
|