-
1
-
-
38149021772
-
MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis
-
April
-
X. Li, F. Bian, H. Zhang, C. Diot, R. Govindan, W. Hong, G. Iannaccone, "MIND: A Distributed Multi-Dimensional Indexing System for Network Diagnosis," In IEEE INFOCOM, April 2006.
-
(2006)
IEEE INFOCOM
-
-
Li, X.1
Bian, F.2
Zhang, H.3
Diot, C.4
Govindan, R.5
Hong, W.6
Iannaccone, G.7
-
3
-
-
0003676885
-
Fingerprinting by Random Polynomials
-
Technical Report 15-81, Harvard University
-
M. O. Rabin, "Fingerprinting by Random Polynomials," In Technical Report 15-81, Harvard University, 1981.
-
(1981)
-
-
Rabin, M.O.1
-
4
-
-
21644452488
-
Alert Correlation through Triggering Events and Common Resources
-
D. Xu, P. Ning, "Alert Correlation through Triggering Events and Common Resources," In Proceedings of ACSAC '04, 2004.
-
(2004)
Proceedings of ACSAC '04
-
-
Xu, D.1
Ning, P.2
-
5
-
-
0042536226
-
Code Red: A Case Study on the Spread and Victims of an Internet Worm
-
D. Moore, C. Shannon, and K. Claffy, "Code Red: A Case Study on the Spread and Victims of an Internet Worm," In ACM SIGCOMM, 2002.
-
(2002)
ACM SIGCOMM
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
-
6
-
-
0030704545
-
Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the WorldWideWeb
-
May
-
D. R. Karger, et. al., "Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the WorldWideWeb," In Proc. 29th Ann. ACM Symp., May 1997, pp.654-663.
-
(1997)
Proc. 29th Ann. ACM Symp
, pp. 654-663
-
-
Karger, D.R.1
et., al.2
-
7
-
-
73249134721
-
Secure Hash Standard
-
U.S. Dept, Apr
-
U.S. Dept, "Secure Hash Standard," Commerce/NIST, National Technical Information Service, Springfield, VA, FIPS 180-1, Apr. 1995.
-
(1995)
Commerce/NIST, National Technical Information Service, Springfield, VA, FIPS
, pp. 180-181
-
-
-
8
-
-
85015426785
-
A Peer-to-Peer Collaborative Intrusion Detection System
-
November
-
C. V. Zhou, S. Karunasekera and C. Leckie, "A Peer-to-Peer Collaborative Intrusion Detection System," In Proc. ICON '05, November, 2005.
-
(2005)
Proc. ICON '05
-
-
Zhou, C.V.1
Karunasekera, S.2
Leckie, C.3
-
9
-
-
30344438592
-
Anomalous Payload-based Network Intrusion Detection
-
Sept
-
K. Wang, S. Stolfo, "Anomalous Payload-based Network Intrusion Detection," In Proceedings of RAID '04, Sept. 2004.
-
(2004)
Proceedings of RAID '04
-
-
Wang, K.1
Stolfo, S.2
-
11
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors," In CACM, vol. 13, pp.422-426, July 1970.
-
(1970)
CACM
, vol.13
, pp. 422-426
-
-
Bloom, B.H.1
-
12
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
June
-
M. E. Locasto, J. J. Parekh, A. D. Keromytis, S. J. Stolfo, "Towards Collaborative Security and P2P Intrusion Detection," In IEEE Workshop on IAS '05, June 2005.
-
(2005)
IEEE Workshop on IAS '05
-
-
Locasto, M.E.1
Parekh, J.J.2
Keromytis, A.D.3
Stolfo, S.J.4
-
13
-
-
84885679117
-
Vigilante: End-to-End containment of Internet worms
-
Brighton, UK, October
-
M. Costa, et. al., "Vigilante: End-to-End containment of Internet worms," In Proc. of the 20th ACM Symp. on Operating Systems Principles, Brighton, UK, October 2005.
-
(2005)
Proc. of the 20th ACM Symp. on Operating Systems Principles
-
-
Costa, M.1
et., al.2
-
14
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," In Proceedings of S&P (Oakland), May, 2004.
-
(2004)
Proceedings of S&P (Oakland)
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
15
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. A. Hoagland, and J. M. McAlerney, "Practical automated detection of stealthy portscans," In Journal of Computer Security, 10(1/2):105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
16
-
-
34748887685
-
A probabilistic approach to detecting network scans
-
Italy, Apr
-
C. Leckie and R. Kotagiri, "A probabilistic approach to detecting network scans," In Proceedings of NOMS '02, Italy, Apr. 2002.
-
(2002)
Proceedings of NOMS '02
-
-
Leckie, C.1
Kotagiri, R.2
-
17
-
-
85137546697
-
Global Intrusion Detection in the DOMINO Overlay System
-
V. Yegneswaran, P. Barford and S. Jha, "Global Intrusion Detection in the DOMINO Overlay System," In 11th ANDSSS, 2004.
-
(2004)
11th ANDSSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
18
-
-
0006002061
-
Lambda: A language to model a database for detection of attacks
-
F. Cuppens and R. Ortalo, "Lambda: A language to model a database for detection of attacks," In Proceedings of RAID 2000.
-
Proceedings of RAID 2000
-
-
Cuppens, F.1
Ortalo, R.2
-
19
-
-
35048819574
-
Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation
-
Jan
-
J. Garcia, F. Autrel, J. Borrell, S. Castillo, F. Cuppens, G. Navarro, "Decentralized Publish-Subscribe System to Prevent Coordinated Attacks via Alert Correlation," In LNCS, Volume 3269, Jan 2004, pp. 223-235.
-
(2004)
LNCS
, vol.3269
, pp. 223-235
-
-
Garcia, J.1
Autrel, F.2
Borrell, J.3
Castillo, S.4
Cuppens, F.5
Navarro, G.6
-
21
-
-
34748925797
-
-
SQL-Slammer Worm, http://www.cert.org/advisories/CA-2003-04.html.
-
-
-
SQL-Slammer Worm1
-
22
-
-
0742276097
-
Inside the Slammer Worm
-
D. Moore, V Paxson, S. Savage, C. Shannon, S. Staniford, N. Weaver, "Inside the Slammer Worm," In IEEE Security & Privacy 2003.
-
(2003)
IEEE Security & Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
23
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
F. Cuppens, A. Miege, "Alert correlation in a cooperative intrusion detection framework," In Proc. Security and Privacy, 2002.
-
(2002)
Proc. Security and Privacy
-
-
Cuppens, F.1
Miege, A.2
-
24
-
-
31844437036
-
Fusion and Filtering in Distributed Intrusion Detection Systems
-
September
-
P. Barford, S. Jha, V Yegneswaran, "Fusion and Filtering in Distributed Intrusion Detection Systems," In Proc. Annual Allerton Conference on Communication, Control and Computing, September, 2004.
-
(2004)
Proc. Annual Allerton Conference on Communication, Control and Computing
-
-
Barford, P.1
Jha, S.2
Yegneswaran, V.3
-
27
-
-
0003407830
-
-
John Wiley and Sons, New York
-
D. Green, and J. Swets, "Signal Detection Theory and Psychophysics," John Wiley and Sons, New York, 1966, 45-49.
-
(1966)
Signal Detection Theory and Psychophysics
, pp. 45-49
-
-
Green, D.1
Swets, J.2
-
28
-
-
0020083498
-
The Meaning and Use of the Area Under a Receiver Operating Characteristic (ROC) Curve
-
J. A. Hanley, and B. J. McNeil, "The Meaning and Use of the Area Under a Receiver Operating Characteristic (ROC) Curve," In Radiology 143, 29-36.
-
Radiology
, vol.143
, pp. 29-36
-
-
Hanley, J.A.1
McNeil, B.J.2
-
29
-
-
0018079655
-
Basic Principles of ROC Analysis
-
C. E. Metz, "Basic Principles of ROC Analysis," Seminars in Nuclear Medicine, VIII(4), 283-298.
-
Seminars in Nuclear Medicine
, vol.8
, Issue.4
, pp. 283-298
-
-
Metz, C.E.1
-
31
-
-
34748816777
-
-
CERT Coordination Center: CERT Advisory CA-2001-26 Nimda Worm. http://www.cert.org/advisories/CA-2001-26.html.
-
CERT Coordination Center: CERT Advisory CA-2001-26 Nimda Worm. http://www.cert.org/advisories/CA-2001-26.html.
-
-
-
-
32
-
-
34748854245
-
-
An analysis of SQL.Spider-B, Digispid.B.Worm, Spida, MSSQL Worm and SQL Snake
-
An analysis of SQL.Spider-B. (Digispid.B.Worm, Spida, MSSQL Worm and SQL Snake) http://www.sans.org/resources/idfaq/spider.php.
-
-
-
-
33
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adelman, "A method for obtaining digital signatures and public-key cryptosystems," In CACM, 21:120-126, 1978.
-
(1978)
CACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
35
-
-
34748832809
-
-
Bamboo, http://bamboo-dht.org/.
-
Bamboo
-
-
-
36
-
-
34748857325
-
-
Pastry, http://freepastry.rice.edu/.
-
-
-
Pastry1
-
38
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson, "An analysis of using reflectors for distributed denial-of-service attacks," Computer Communication Review 31(3).
-
Computer Communication Review
, vol.31
, Issue.3
-
-
Paxson, V.1
|