-
1
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Marseilles, France, November
-
Paul Barford, Jeffery Kline, David Plonka, and Ron Amos. A signal analysis of network traffic anomalies. In Proceedings of the ACM SIGCOMM Internet Measurement Workshop, Marseilles, France, November 2002.
-
(2002)
Proceedings of the ACM SIGCOMM Internet Measurement Workshop
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Amos, R.4
-
4
-
-
39049111285
-
-
kc Claffy, G Miller, and K Thompson. The nature of the beast: Recent traffic measurements from an internet backbone. http://www.caida.org/outreach/ resources/learn/packetsize, April 1998.
-
kc Claffy, G Miller, and K Thompson. The nature of the beast: Recent traffic measurements from an internet backbone. http://www.caida.org/outreach/ resources/learn/packetsize, April 1998.
-
-
-
-
5
-
-
39049119539
-
-
United States Code. Fraud and related activity in connection with computers. USC, Title 18, Part I, Chapter 47, Section 1030
-
United States Code. Fraud and related activity in connection with computers. USC, Title 18, Part I, Chapter 47, Section 1030.
-
-
-
-
6
-
-
0003922190
-
-
Wiley Interscience, New York, NY
-
Richard Duda, Peter Hart, and David Stork. Pattern Classification. Wiley Interscience, New York, NY, 2000.
-
(2000)
Pattern Classification
-
-
Duda, R.1
Hart, P.2
Stork, D.3
-
8
-
-
33747578143
-
Dynamics of IP traffic: A study of the role of variability and the impact of control
-
Anja Feldmann, Anna C. Gilbert, Polly Huang, and Walter Willinger. Dynamics of IP traffic: a study of the role of variability and the impact of control. SIGCOMM Comput. Commun. Rev., 29(4):301-313, 1999.
-
(1999)
SIGCOMM Comput. Commun. Rev
, vol.29
, Issue.4
, pp. 301-313
-
-
Feldmann, A.1
Gilbert, A.C.2
Huang, P.3
Willinger, W.4
-
9
-
-
39049084998
-
Empirical and theoretical evaluation of active probing attacks and their countermeasures
-
Toronto, Canada, May
-
Xinwen Fu, B Graham, D Xuan, R Bettati, and Wei Zhao. Empirical and theoretical evaluation of active probing attacks and their countermeasures. In 6th Information Hiding Workshop, Toronto, Canada, May 2004.
-
(2004)
6th Information Hiding Workshop
-
-
Fu, X.1
Graham, B.2
Xuan, D.3
Bettati, R.4
Zhao, W.5
-
10
-
-
84888856651
-
-
Internet packet size samples
-
Nanog: North American Network Operators Group. Internet packet size samples. http://www.merit.edu/mail.archives/nanog/2000-07/msg00691.html.
-
North American Network Operators Group
-
-
Nanog1
-
12
-
-
3543113439
-
A Framework for Classifying Denial of Service Attacks
-
Karlsrhue, Germany, August
-
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. A Framework for Classifying Denial of Service Attacks. In Proceedings of ACM SIGCOMM 2003, Karlsrhue, Germany, August 2003.
-
(2003)
Proceedings of ACM SIGCOMM 2003
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
13
-
-
39049154066
-
-
Identification of Repeated Denial of Service Attacks. Technical Report ISI-TR-2003-577, USC/Information Sciences Institute, February
-
Alefiya Hussain, John Heidemann, and Christos Papadopoulos. Identification of Repeated Denial of Service Attacks. Technical Report ISI-TR-2003-577, USC/Information Sciences Institute, February 2005.
-
(2005)
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
14
-
-
0033640646
-
Statistical Pattern Recognition: A Review
-
Anil Jain, Robert Duin, and Jainchang Mao. Statistical Pattern Recognition: A Review. IEEE Transactions of Pattern Analysis and Machine Intelligence, 22(1):4-37, 2000.
-
(2000)
IEEE Transactions of Pattern Analysis and Machine Intelligence
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.1
Duin, R.2
Mao, J.3
-
15
-
-
84878210701
-
-
Purushotham Kamath, Kun Chan Lan, John Heidemann, Joe Bannister, and Joe Touch. Generation of high bandwidth network traffic traces. In In Proceedings of MASCOTS, pages 401-410, Fort Worth, Texas, USA, October 2002. IEEE.
-
Purushotham Kamath, Kun Chan Lan, John Heidemann, Joe Bannister, and Joe Touch. Generation of high bandwidth network traffic traces. In In Proceedings of MASCOTS, pages 401-410, Fort Worth, Texas, USA, October 2002. IEEE.
-
-
-
-
16
-
-
4143128192
-
Inferring congestion sharing and path characteristics for packet interarrival times
-
Technical report, MIT-LCS, 2001
-
Dina Katabi and Charles Blake. Inferring congestion sharing and path characteristics for packet interarrival times. Technical report, MIT-LCS, 2001.
-
-
-
Katabi, D.1
Blake, C.2
-
19
-
-
1242263196
-
Controlling high bandwidth aggregates in the network
-
July
-
Ratul Mahajan, Steven M. Bellovin, Sally Floyd, John Ioannidis, Vern Paxson, and Scott Shenker. Controlling high bandwidth aggregates in the network. In ACM Computer Communication Review, July 2001.
-
(2001)
ACM Computer Communication Review
-
-
Mahajan, R.1
Bellovin, S.M.2
Floyd, S.3
Ioannidis, J.4
Paxson, V.5
Shenker, S.6
-
20
-
-
85084161486
-
Inferring Internet Denial of Service activity
-
Washington, DC, USA, August, USENIX
-
David Moore, Geoffrey Voelker, and Stefan Savage. Inferring Internet Denial of Service activity. In Proceedings of the USENIX Security Symposium, Washington, DC, USA, August 2001. USENIX.
-
(2001)
Proceedings of the USENIX Security Symposium
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
21
-
-
84942417880
-
-
Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, and Ramesh Govindan. COSSACK: Coordinated Suppression of Simultaneous Attacks. In In Proceeding of Discex III, Washington, DC, USC, April 2003.
-
Christos Papadopoulos, Robert Lindell, John Mehringer, Alefiya Hussain, and Ramesh Govindan. COSSACK: Coordinated Suppression of Simultaneous Attacks. In In Proceeding of Discex III, Washington, DC, USC, April 2003.
-
-
-
-
22
-
-
0036980251
-
Using signal proceesing to analyze wireless data traffic
-
Atlanta, GA, September
-
Craig Partridge, David Cousins, Alden Jackson, Rajesh Krishnan, Tushar Saxena, and W. Timothy Strayer. Using signal proceesing to analyze wireless data traffic. In Proceedings of ACM workshop on Wireless Security, pages 67-76, Atlanta, GA, September 2002.
-
(2002)
Proceedings of ACM workshop on Wireless Security
, pp. 67-76
-
-
Partridge, C.1
Cousins, D.2
Jackson, A.3
Krishnan, R.4
Saxena, T.5
Timothy Strayer, W.6
-
23
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Decemeber
-
Vera Paxson. Bro: A system for detecting network intruders in real-time. Computer Networks, 31(23-24):2435-2463, Decemeber 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
25
-
-
14944383202
-
Packet trace manipulation framework for test labs
-
Sicily, Italy, October
-
Andy Rupp, Holger Dreger, Anja Feldmann, and Robin Sommer. Packet trace manipulation framework for test labs. In Proceedings of ACMSIGCOMM Internet Measurement Conference 2004, Sicily, Italy, October 2004.
-
(2004)
Proceedings of ACMSIGCOMM Internet Measurement Conference 2004
-
-
Rupp, A.1
Dreger, H.2
Feldmann, A.3
Sommer, R.4
-
26
-
-
0033650584
-
Practical network support for IP traceback
-
Stockholm, Sweeden, August, ACM
-
Stefan Savage, David Wetherall, Anna Karlin, and Tom Anderson. Practical network support for IP traceback. In Proceedings of the ACM SIGCOMM Conference, pages 295-306, Stockholm, Sweeden, August 2000. ACM.
-
(2000)
Proceedings of the ACM SIGCOMM Conference
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
28
-
-
0034775309
-
Hash-based ip traceback
-
San Deigo CA, August, ACM
-
Alex C. Snoeren, Craig Partridge, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio Stephen T. Kent, and W. Timothy Strayer. Hash-based ip traceback. In Proceedings of the ACM SIGCOMM, pages 3-14, San Deigo CA, August 2001. ACM.
-
(2001)
Proceedings of the ACM SIGCOMM
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio Stephen, F.5
Kent, T.6
Timothy Strayer, W.7
-
29
-
-
39049118106
-
-
BBC Online Technology. DDoS extortion in the uk gambling industry. http://news.bbc.co.uk/1/hit/technology/3549883.htm, March 2004.
-
BBC Online Technology. DDoS extortion in the uk gambling industry. "http://news.bbc.co.uk/1/hit/technology/3549883.htm", March 2004.
-
-
-
-
30
-
-
39049119091
-
-
Los Angeles Times. Deleting Online Extortion. http://www.latimes. com/business/la-fi-extort25oct25,1,5030182.story?coll=la-home-headlines, October 2004.
-
Los Angeles Times. Deleting Online Extortion. "http://www.latimes. com/business/la-fi-extort25oct25,1,5030182.story?coll=la-home-headlines", October 2004.
-
-
-
-
31
-
-
39049129955
-
-
Tripwire. http://www.tripwire.com.
-
Tripwire
-
-
|