-
2
-
-
18144371695
-
-
Internet-Draft, draft-ietf-ipfix-protocol-24, Nov
-
B. Claise, S. Bryant, G. Sadasivan, S. Leinen, and T. Dietz, "IPFIX Protocol Specifications," Internet-Draft, draft-ietf-ipfix-protocol-24, Nov. 2006.
-
(2006)
IPFIX Protocol Specifications
-
-
Claise, B.1
Bryant, S.2
Sadasivan, G.3
Leinen, S.4
Dietz, T.5
-
3
-
-
34250676260
-
-
Internet-Draft, work in progress, draft-ietf-psamp- framework-10, Jan
-
N. Duffield, D. Chiou, B. Claise, A. Greenberg, M. Grossglauser, P. Marimuthu, J. Rexford, and G. Sadasivan, "A Framework for Packet Selection and Reporting," Internet-Draft, work in progress, draft-ietf-psamp- framework-10, Jan. 2005.
-
(2005)
A Framework for Packet Selection and Reporting
-
-
Duffield, N.1
Chiou, D.2
Claise, B.3
Greenberg, A.4
Grossglauser, M.5
Marimuthu, P.6
Rexford, J.7
Sadasivan, G.8
-
4
-
-
34250642066
-
-
RFC 3917 Informational, Oct, Online, Available
-
J. Quittek, T Zseby, B. Claise, and S. Zander, "Requirements for IP How Information Export (IPFIX)," RFC 3917 (Informational), Oct. 2004. [Online]. Available: http://www.ietf.org/rfc/rfc3917.txt
-
(2004)
Requirements for IP How Information Export (IPFIX)
-
-
Quittek, J.1
Zseby, T.2
Claise, B.3
Zander, S.4
-
5
-
-
34447306223
-
Flexible flow aggregation for adaptive network monitoring
-
Tampa, Florida, USA, Nov
-
F. Dressler and G. Münz, "Flexible flow aggregation for adaptive network monitoring," in Proc. of IEEE LCN Workshop on Network Measurements 2006, Tampa, Florida, USA, Nov. 2006.
-
(2006)
Proc. of IEEE LCN Workshop on Network Measurements 2006
-
-
Dressler, F.1
Münz, G.2
-
6
-
-
33847772544
-
-
Internet-Draft, work in progress, draft-ietf-ipfix-info-14.txt, Oct
-
J. Quittek, S. Bryant, B. Claise, and J. Meyer, "Information Model for IP Flow Information Export," Internet-Draft, work in progress, draft-ietf-ipfix-info-14.txt, Oct. 2006.
-
(2006)
Information Model for IP Flow Information Export
-
-
Quittek, J.1
Bryant, S.2
Claise, B.3
Meyer, J.4
-
7
-
-
34748893551
-
Router-based Detection of DoS and DDoS Attacks
-
Berlin, Germany, June
-
C. Kotsokalis, D. Kalogeras, and B. Maglaris, "Router-based Detection of DoS and DDoS Attacks," in Proc. of HP Openview University Association (HP-OVUA) 8th Annual Workshop, Berlin, Germany, June 2001.
-
(2001)
Proc. of HP Openview University Association (HP-OVUA) 8th Annual Workshop
-
-
Kotsokalis, C.1
Kalogeras, D.2
Maglaris, B.3
-
8
-
-
14944367267
-
Characterization of Network-Wide Anomalies in Traffic Flows
-
Taormina, Sicily, Italy: ACM Press, Oct
-
A. Lakhina, M. Crovella, and C. Diot, "Characterization of Network-Wide Anomalies in Traffic Flows," in Proc. of 4th ACM SIGCOMM Conference on Internet Measurement. Taormina, Sicily, Italy: ACM Press, Oct. 2004, pp. 201-206.
-
(2004)
Proc. of 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 201-206
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
33745592857
-
Detection of novel network attacks using data mining
-
Melbourne, FL, USA, Nov
-
L. Ertöz, E. Eilertson, A. Lazarevic, P.-N. Tan, P. Dokas, V. Kumar, and J. Srivastava, "Detection of novel network attacks using data mining," in Proc. of Workshop on Data Mining for Computer Security, to be held in conduction with IEEE International Conference on Data Mining, Melbourne, FL, USA, Nov. 2003.
-
(2003)
Proc. of Workshop on Data Mining for Computer Security, to be held in conduction with IEEE International Conference on Data Mining
-
-
Ertöz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.-N.4
Dokas, P.5
Kumar, V.6
Srivastava, J.7
-
10
-
-
33847290520
-
Mining Anomalies Using Traffic Feature Distributions
-
Philadelphia, PA, USA, Aug
-
A. Lakhina, M. Crovella, and C. Diot, "Mining Anomalies Using Traffic Feature Distributions," in Proc. of ACM SIGCOMM Conference, Philadelphia, PA, USA, Aug. 2005, pp. 217-228.
-
(2005)
Proc. of ACM SIGCOMM Conference
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
11
-
-
34748831602
-
Multivariate SVD Analyses For Network Anomaly Detection
-
Philadelphia, PA, USA, Aug
-
J. Terrell, K. Jeffay, F. D. Smith, L. Zhang, H. Shen, Z. Zhu, and A. Nobel, "Multivariate SVD Analyses For Network Anomaly Detection," in Proc. of ACM SIGCOMM Conference, Poster Session, Philadelphia, PA, USA, Aug. 2005.
-
(2005)
Proc. of ACM SIGCOMM Conference, Poster Session
-
-
Terrell, J.1
Jeffay, K.2
Smith, F.D.3
Zhang, L.4
Shen, H.5
Zhu, Z.6
Nobel, A.7
-
12
-
-
34748873147
-
Network Flow-Based Anomaly Detection of DDoS Attacks
-
Rhodes, Greece, June
-
G. Androulidakis, V Chatzigiannakis, M. Grammatikou, and F. Stamatelopoulos, "Network Flow-Based Anomaly Detection of DDoS Attacks," in Proc. of Trans-European Research and Education Networking Assocuition (TERENA) 2004, Rhodes, Greece, June 2004.
-
(2004)
Proc. of Trans-European Research and Education Networking Assocuition (TERENA) 2004
-
-
Androulidakis, G.1
Chatzigiannakis, V.2
Grammatikou, M.3
Stamatelopoulos, F.4
-
13
-
-
33644501924
-
A comparative study of anomaly detection schemes in network intrusion detection
-
May
-
A. Lazarevic, L. Ertöz, V. Kumar, A. Ozgur, and J. Srivastava, "A comparative study of anomaly detection schemes in network intrusion detection," in Proc. of 3rd SIAM International Conference on Data Mining, May 2003.
-
(2003)
Proc. of 3rd SIAM International Conference on Data Mining
-
-
Lazarevic, A.1
Ertöz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
14
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
West Point, NY, USA, June
-
D. Barbará, J. C. S. Jajodia, L. Popyack, and N. Wu, "ADAM: Detecting intrusions by data mining," in Proc. of IEEE Workshop on Information Assurance and Security, West Point, NY, USA, June 2001, pp. 11-16.
-
(2001)
Proc. of IEEE Workshop on Information Assurance and Security
, pp. 11-16
-
-
Barbará, D.1
Jajodia, J.C.S.2
Popyack, L.3
Wu, N.4
-
15
-
-
0004225165
-
-
Internet-Draft, work in progress, draft-ietf-idwg-idmef-xml-16, Mar
-
H. Debar, D. Curry, and B. Feinstein, "The Intrusion Detection Message Exchange Format," Internet-Draft, work in progress, draft-ietf-idwg-idmef-xml-16, Mar. 2006.
-
(2006)
The Intrusion Detection Message Exchange Format
-
-
Debar, H.1
Curry, D.2
Feinstein, B.3
-
16
-
-
34748865376
-
-
Mar. 2000, Online, Available
-
M. Ruff, "White Paper XmlBlaster," Mar. 2000. [Online]. Available: http://www.xmlblaster.org/xmlBlaster/doc/whitepaper/whitepaper.html
-
White Paper XmlBlaster
-
-
Ruff, M.1
-
17
-
-
34748832808
-
-
SWITCH Homepage, http://www.switch.ch/, 2006.
-
SWITCH Homepage, http://www.switch.ch/, 2006.
-
-
-
-
18
-
-
33846524304
-
A Framework for Real-Time Worm Attack Detection and Backbone Monitoring
-
Darmstadt, Germany, Nov
-
T. Dübendorfer, A. Wagner, and B. Plattner, "A Framework for Real-Time Worm Attack Detection and Backbone Monitoring," in Proc. of 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005), Darmstadt, Germany, Nov. 2005.
-
(2005)
Proc. of 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP 2005)
-
-
Dübendorfer, T.1
Wagner, A.2
Plattner, B.3
-
19
-
-
34748813022
-
-
Internet-Draft, work in progress, draft-ietf-psamp-pratocol-07, Oct
-
B. Claise, J. Quittek, and A. Johnson, "Packet Sampling (PSAMP) Protocol Specifications," Internet-Draft, work in progress, draft-ietf-psamp-pratocol-07, Oct. 2006.
-
(2006)
Packet Sampling (PSAMP) Protocol Specifications
-
-
Claise, B.1
Quittek, J.2
Johnson, A.3
-
20
-
-
34250635653
-
-
Home
-
Diadem Firewall Homepage, http://www.diadem-firewall.org/, 2006.
-
(2006)
Diadem Firewall
-
-
-
21
-
-
34447308129
-
-
Internet-Draft, work in progress, draft-dressler-ipfix-aggregation-03.txt, June
-
F. Dressler, C. Sommer, and G. Münz, "IPFIX Aggregation," Internet-Draft, work in progress, draft-dressler-ipfix-aggregation-03.txt, June 2006.
-
(2006)
IPFIX Aggregation
-
-
Dressler, F.1
Sommer, C.2
Münz, G.3
-
22
-
-
34748858491
-
Evaluation Report
-
Sept
-
A. Fessi, S. Yusuf, Y. Carlinet, O. Paul, P. Sagmeister, J. van Lunteren, V. Thing, M. Sloman, D. Thomas, D. Gabrijelcic, P. Tobis, G. Münz, D. Haage, R. Sasnauskas, and K. Dragicevic, "Evaluation Report, DIADEM Firewall Deliverable D14," Sept. 2006.
-
(2006)
DIADEM Firewall Deliverable
-
-
Fessi, A.1
Yusuf, S.2
Carlinet, Y.3
Paul, O.4
Sagmeister, P.5
van Lunteren, J.6
Thing, V.7
Sloman, M.8
Thomas, D.9
Gabrijelcic, D.10
Tobis, P.11
Münz, G.12
Haage, D.13
Sasnauskas, R.14
Dragicevic, K.15
-
23
-
-
0036375286
-
SYN-dog: Sniffing SYN Flooding Sources
-
Vienna, Austria, July
-
H. Wang, D. Zhang, and K. G. Shin, "SYN-dog: Sniffing SYN Flooding Sources," in Proc. of 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, July 2002.
-
(2002)
Proc. of 22nd International Conference on Distributed Computing Systems (ICDCS'02)
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
-
24
-
-
46149108945
-
Vermont - A Versatile Monitoring Toolkit for IPFIX and PSAMP
-
Tuebingen, Germany, Sept
-
R. T. Lampert, C. Sommer, G. Münz, and F. Dressler, "Vermont - A Versatile Monitoring Toolkit for IPFIX and PSAMP," in Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), Tuebingen, Germany, Sept. 2006.
-
(2006)
Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)
-
-
Lampert, R.T.1
Sommer, C.2
Münz, G.3
Dressler, F.4
-
25
-
-
33846583620
-
Requin, a tool for fast web traffic inference
-
Saint Louis, MO, USA, Nov./Dec
-
O. Paul and J. E. Kiba, "Requin, a tool for fast web traffic inference," in 48th annual IEEE Global Telecommunications Conference (GLOBECOM 2005), Saint Louis, MO, USA, Nov./Dec. 2005.
-
(2005)
48th annual IEEE Global Telecommunications Conference (GLOBECOM 2005)
-
-
Paul, O.1
Kiba, J.E.2
-
26
-
-
70449443149
-
-
Bordeaux, France, Dec
-
G. Münz, A. Fessi, G. Carle, O. Paul, D. Gabrijelcic, Y. Carlinet, S. Yusuf, M. Sloman, V. Thing, J. van Lunteren, P. Sagmeister, and G. Dittmann, "Diadem Firewall: Web Server Overload Attack Detection and Response," Bordeaux, France, Dec. 2005.
-
(2005)
Diadem Firewall: Web Server Overload Attack Detection and Response
-
-
Münz, G.1
Fessi, A.2
Carle, G.3
Paul, O.4
Gabrijelcic, D.5
Carlinet, Y.6
Yusuf, S.7
Sloman, M.8
Thing, V.9
van Lunteren, J.10
Sagmeister, P.11
Dittmann, G.12
-
27
-
-
34748887102
-
Improving web servers focused DoS attacks detection
-
Tuebingen, Germany, Sept
-
O. Paul, "Improving web servers focused DoS attacks detection," in Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006), Tuebingen, Germany, Sept. 2006.
-
(2006)
Proc. of IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)
-
-
Paul, O.1
-
28
-
-
33847303101
-
BLINC: Multilevel Traffic Classification in the Dark
-
Philadelphia, Pennsylvania, USA, Aug
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: Multilevel Traffic Classification in the Dark," in Proc. of Conference of the Special Interest Group on Data Communication (SIGCOMM'05), Philadelphia, Pennsylvania, USA, Aug. 2005, pp. 229-240.
-
(2005)
Proc. of Conference of the Special Interest Group on Data Communication (SIGCOMM'05)
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
29
-
-
85090433665
-
Snort: Lightweight Intrusion Detection for Networks
-
USENIX Association, Nov
-
M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," in Proc. of 13th USENDi Conference on System Administration. USENIX Association, Nov. 1999, pp. 229-238.
-
(1999)
Proc. of 13th USENDi Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
30
-
-
34250696219
-
-
Home
-
Netflow Monitor Homepage, http://netflow.cesnet.cz/, 2006.
-
(2006)
Netflow Monitor
-
-
-
31
-
-
34748917712
-
-
History Project Home
-
History Project Homepage, http://www.history-praject.net/, 2006.
-
(2006)
-
-
-
33
-
-
34748838375
-
-
Ntop Homepage, http://www.ntop.org/, 2006.
-
Ntop Homepage, http://www.ntop.org/, 2006.
-
-
-
-
34
-
-
34748902828
-
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data
-
Sophia Antipolis, France, Sept
-
J. McHugh, "Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data," in Proc. of European Symposium on Research in Computer Security 2004 (ESORICS 04), Sophia Antipolis, France, Sept. 2004.
-
(2004)
Proc. of European Symposium on Research in Computer Security 2004 (ESORICS 04)
-
-
McHugh, J.1
-
35
-
-
77953296690
-
More Netflow Tools: For Performance and Security
-
Atlanta, GA, Nov
-
C. Gates, M. Collins, M. Duggan, A. Kompanek, and M. Thomas, "More Netflow Tools: For Performance and Security," in Proc. of Large Installation System Administration Conference (LISA) 2004, Atlanta, GA, Nov. 2004.
-
(2004)
Proc. of Large Installation System Administration Conference (LISA) 2004
-
-
Gates, C.1
Collins, M.2
Duggan, M.3
Kompanek, A.4
Thomas, M.5
-
36
-
-
33745442732
-
Host Anomalies from Network Data
-
West Point, NY, June
-
C. Gates and D. Becknel, "Host Anomalies from Network Data," in Proc. of IEEE Systems, Man and Cybernetics Information Assurance Workshop, West Point, NY, June 2005.
-
(2005)
Proc. of IEEE Systems, Man and Cybernetics Information Assurance Workshop
-
-
Gates, C.1
Becknel, D.2
-
37
-
-
84941149577
-
The OSU Flow-tools Package and Cisco NetFlow Logs
-
New Orleans, Louisiana, USA, Dec
-
M. Fullmer and S. Romig, "The OSU Flow-tools Package and Cisco NetFlow Logs," in Proc. of 14th USENIX Conference on System Administration (LISA 2000), New Orleans, Louisiana, USA, Dec. 2000, pp. 291-304.
-
(2000)
Proc. of 14th USENIX Conference on System Administration (LISA 2000)
, pp. 291-304
-
-
Fullmer, M.1
Romig, S.2
-
38
-
-
34748876515
-
-
Home
-
HowScan Homepage, http://www.caida.org/tools/utilities/flowscan/, 2006.
-
(2006)
HowScan
-
-
|