-
1
-
-
84942250104
-
Designing a framework for active worm detection on global networks
-
Darmstadt, Germany, March 24th, p
-
Berk, V., Bakos, G. and Morris, R. (2003) 'Designing a framework for active worm detection on global networks', Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), IEEE Computer Society, Fraunhofer-IGD, Darmstadt, Germany, March 24th, p. 13.
-
(2003)
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), IEEE Computer Society, Fraunhofer-IGD
, pp. 13
-
-
Berk, V.1
Bakos, G.2
Morris, R.3
-
2
-
-
0005018009
-
-
White Paper, Available from
-
Cisco (1999) NetFlow Services and Applications, White Paper, Available from http://www.cisco.com/warp/public/732/netflow.
-
(1999)
NetFlow Services and Applications
-
-
Cisco1
-
3
-
-
2642562805
-
Honeypots: Practical means to validate malicious fault assumptions
-
March 3-5 Tahiti, French Polynesia, pp
-
Datier, M., Pouget, F. and Debar, H. (2004a) 'Honeypots: practical means to validate malicious fault assumptions', Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'04), IEEE Computer Society, March 3-5 Tahiti, French Polynesia, pp.383-388.
-
(2004)
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC'04), IEEE Computer Society
, pp. 383-388
-
-
Datier, M.1
Pouget, F.2
Debar, H.3
-
4
-
-
26444592421
-
Attack processes found on the internet
-
Toulouse, April
-
Dacier, M., Pouget, F. and Debar, H. (2004b) 'Attack processes found on the internet', NATO Symposium IST-041/RSY-013, Toulouse, April, http://www.eurecom.fr/people/dacier.fr.htm.
-
(2004)
NATO Symposium IST-041/RSY-013
-
-
Dacier, M.1
Pouget, F.2
Debar, H.3
-
5
-
-
0003415244
-
-
RFC 2616:, August, http://www.ietf.org/rfc/rfc2616.txt
-
Fielding, R., Irvine, U.C., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P. and Berners-Lee, T. (1982) RFC 2616: Hypertext Transfer Protocol - HTTP/1.1, http://www.ietf.org/rfc/rfc2616.txt, August.
-
(1982)
Hypertext Transfer Protocol
-
-
Fielding, R.1
Irvine, U.C.2
Gettys, J.3
Mogul, J.4
Frystyk, H.5
Masinter, L.6
Leach, P.7
Berners-Lee, T.8
-
6
-
-
37849044744
-
-
Freier, A, Karlton, P. and Kocher, P, 1996 TheSSL Protocol- Version 3.0, Internet Draft, Draft-Freier-ssl-Version3-02.txt, Work in Progress, November
-
Freier, A., Karlton, P. and Kocher, P. (1996) TheSSL Protocol- Version 3.0, Internet Draft, Draft-Freier-ssl-Version3-02.txt, Work in Progress, November.
-
-
-
-
7
-
-
37849049447
-
Life on a university network: An architecture for automatically detecting, isolating and cleaning infected hosts
-
February
-
Gauthier, E. (2004) 'Life on a university network: an architecture for automatically detecting, isolating and cleaning infected hosts', NANOG30, http://www.nanog.org/mtg-0402/gauthier.html, February.
-
(2004)
NANOG30
-
-
Gauthier, E.1
-
8
-
-
84969573885
-
ASAX: Software architecture and rule-based language for Universal audit trail analysis
-
Proceedings of the third European Symposium on Research in Security ESORICS'92, Springer-Verlag, November, Toulouse, pp
-
Habra, N., Le Charlier, B., Mounji, A. and Mathieu, I. (1992) 'ASAX: software architecture and rule-based language for Universal audit trail analysis', Proceedings of the third European Symposium on Research in Security (ESORICS'92), Lecture Notes in Computer Science, Springer-Verlag, November, Toulouse, pp.435-450.
-
(1992)
Lecture Notes in Computer Science
, pp. 435-450
-
-
Habra, N.1
Le Charlier, B.2
Mounji, A.3
Mathieu, I.4
-
10
-
-
37849033332
-
-
IPMON
-
IPMON (2004) Packet Trace Analysis, http://ipmon.sprint.com/ packstat/packetoverview.php.
-
(2004)
Packet Trace Analysis
-
-
-
11
-
-
0003421246
-
TCP extensions for high performance
-
May
-
Jacobson, V., Braden, R. and Borman, D. (1992) 'TCP extensions for high performance', Request for Comments 1323, Internet Engineering Task Force, May.
-
(1992)
Request for Comments 1323, Internet Engineering Task Force
-
-
Jacobson, V.1
Braden, R.2
Borman, D.3
-
12
-
-
17644421307
-
Recent worms: A survey and trends
-
Washington DC, USA
-
Kienzle, D.M. and Elder, M.C. (2003) 'Recent worms: a survey and trends', Proceedings of the 2003 ACM Workshop on Rapid Malcode, Washington DC, USA, Vol. 40, pp. 1-10.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, vol.40
, pp. 1-10
-
-
Kienzle, D.M.1
Elder, M.C.2
-
13
-
-
0040291388
-
The click modular router
-
August, pp
-
Kohler, E., Morris, R., Chen, B., Jannotti, J. and Kaashoek, F. (2000) 'The click modular router', ACM Transactions on Computer Systems,Vol. 18, No. 3, August, pp.263-297.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, F.5
-
14
-
-
33645791274
-
Honeycomb - creating intrusion detection signatures using honeypots
-
November 20-21, Cambridge, MA USA, pp
-
Kreibich, C. and Crowcroft, J. (2003) 'Honeycomb - creating intrusion detection signatures using honeypots', 2nd Workshop on Hot Topics in Networks (HotNets-II), November 20-21, Cambridge, MA USA, pp.51-56.
-
(2003)
2nd Workshop on Hot Topics in Networks (HotNets-II)
, pp. 51-56
-
-
Kreibich, C.1
Crowcroft, J.2
-
15
-
-
37848999526
-
-
Moore, D. (CAIDA) (2002) Network Telescopes: Observing Small Or Distant Security Events, http://www.caida.org/outreach/presentations/2002/ usenix_sec/, August.
-
Moore, D. (CAIDA) (2002) Network Telescopes: Observing Small Or Distant Security Events, http://www.caida.org/outreach/presentations/2002/ usenix_sec/, August.
-
-
-
-
16
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Washington DC, pp
-
Moore, D., Voelker, G.M. and Savage, S. (2001) 'Inferring internet denial-of-service activity', Proceedings of the 2001 USENIX Security Symposium, Washington DC, pp.9-22.
-
(2001)
Proceedings of the 2001 USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
17
-
-
0004000392
-
-
PhD Thesis, Institute of Computer Science, September, University of Namur, Belgium
-
Mounji, A. (1997) Languages and Tools for Rule-based Distributed Intrusion Detection, PhD Thesis, Institute of Computer Science, September, University of Namur, Belgium.
-
(1997)
Languages and Tools for Rule-based Distributed Intrusion Detection
-
-
Mounji, A.1
-
18
-
-
0002535673
-
Distributed audit trail analysis
-
February, San Diego, California, pp
-
Mounji, A., Le Charlier, B., Habra, N. and Zampuniéris, D. (1995) 'Distributed audit trail analysis', Proceedings of the Internet Society Symposium on Network and Distributed System Security (ISOC95), IEEE, February, San Diego, California, pp.102-112.
-
(1995)
Proceedings of the Internet Society Symposium on Network and Distributed System Security (ISOC95), IEEE
, pp. 102-112
-
-
Mounji, A.1
Le Charlier, B.2
Habra, N.3
Zampuniéris, D.4
-
19
-
-
0003651919
-
-
RFC 3344:, August
-
Perkins, C. (2002) RFC 3344: IP Mobility Support for IPv4, http://www.ietf.org/rfc/rfc3344.txt, August.
-
(2002)
IP Mobility Support for
-
-
Perkins, C.1
-
22
-
-
85084163190
-
A virtual honeypot framework
-
San Diego, CA, August
-
Provos, N. (2004) 'A virtual honeypot framework', 13th USENIX Security Symposium, San Diego, CA, August, http://www.citi.umich.edu/u/provos/ honeyd/.
-
(2004)
13th USENIX Security Symposium
-
-
Provos, N.1
-
26
-
-
37849020571
-
-
The Team Cymru , June
-
The Team Cymru (2004) The Team Cymru Darbtet Project, June, http://www.cymru.com/Darknet/index.html.
-
(2004)
The Team Cymru Darbtet Project
-
-
-
27
-
-
37849053836
-
Towards a more stateful and accurate HoneyTank
-
June, Seignosse, France, pp
-
Vanderavero, N. and Le Charlier, B. (2006) 'Towards a more stateful and accurate HoneyTank', Proceedings of the 5th Conference on Security and Network Architectures (SAR 2006), June, Seignosse, France, pp. 13-27.
-
(2006)
Proceedings of the 5th Conference on Security and Network Architectures (SAR 2006)
, pp. 13-27
-
-
Vanderavero, N.1
Le Charlier, B.2
-
28
-
-
12244311689
-
A taxonomy of computer worms
-
Washington DC, USA
-
Weaver, N., Paxson, V., Staniford, S. and Cunningham, R. (2003) 'A taxonomy of computer worms', Proceedings of the 2003 ACM Workshop on Rapid Malcode, Washington DC, USA, Vol. 40, pp.11-18.
-
(2003)
Proceedings of the 2003 ACM Workshop on Rapid Malcode
, vol.40
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
29
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
San Diego, California, ACM Press, pp
-
Yegneswaran, V., Barford, P. and Ullrich, J. (2003) 'Internet intrusions: global characteristics and prevalence', Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, San Diego, California, ACM Press, pp.138-147.
-
(2003)
Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
-
30
-
-
14944341848
-
On the design and use of internet sinks for network abuse monitoring
-
Sophia Antipolis, France, September
-
Yegneswaran, V., Barford, P. and Plonka, D. (2004) 'On the design and use of internet sinks for network abuse monitoring', RAID 2004 Symposium, Sophia Antipolis, France, September.
-
(2004)
RAID 2004 Symposium
-
-
Yegneswaran, V.1
Barford, P.2
Plonka, D.3
-
39
-
-
37849038157
-
-
Tcpdump-team
-
Tcpdump-team, TCPdump, http://www.tcpdump.org/.
-
TCPdump
-
-
-
40
-
-
37849053166
-
-
www.secdev.org/projects/scapy/.
-
-
-
-
41
-
-
37849005824
-
-
www.snort.org/.
-
-
-
-
42
-
-
37849011757
-
-
www.splintered.net/sw/flow-tools/docs/fiow-dscan.html.
-
-
-
-
43
-
-
37849041449
-
-
www.packetfactory.net/libnet/.
-
-
-
|