-
1
-
-
46149109403
-
Three charged with Seattle hospital botnet attack
-
February 14
-
"Three charged with Seattle hospital botnet attack," The Register, February 14, 2006.
-
(2006)
The Register
-
-
-
2
-
-
51949110531
-
Targeted Trojan Email Attacks
-
National Infrastructure Security Coordination Center, June 16
-
National Infrastructure Security Coordination Center, "Targeted Trojan Email Attacks," NISCC Briefing 08/2005, June 16, 2005.
-
(2005)
NISCC Briefing 08/2005
-
-
-
3
-
-
46149108966
-
Hacker Arrested for Breaching DoD Systems with 'Botnets',
-
November 4
-
Rob Thormeyer, "Hacker Arrested for Breaching DoD Systems with 'Botnets'," Government Computer News, November 4, 2005.
-
(2005)
Government Computer News
-
-
Thormeyer, R.1
-
7
-
-
84924375780
-
Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds
-
Boston, MA, May 2-4
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds," Proc. 2nd Symposium on Networked Systems Design and Implementation, Boston, MA, May 2-4, 2005.
-
(2005)
Proc. 2nd Symposium on Networked Systems Design and Implementation
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
8
-
-
46149108734
-
Botnet Hunters Search for 'Command and Control' Servers
-
June 17
-
R. Naraine, "Botnet Hunters Search for 'Command and Control' Servers," eWeek, June 17, 2005.
-
(2005)
eWeek
-
-
Naraine, R.1
-
9
-
-
0036947597
-
Single-IP Packet Traceback
-
December
-
A. C. Snoeren, C. Partridge, L. A. Sanchez, C. E. Jones, F. Tchakountio, S. T. Kent, and W. T. Strayer, "Single-IP Packet Traceback," IEEE/ACM Transactions on Networking (ToN), Volume 10, Number 6, December 2002.
-
(2002)
IEEE/ACM Transactions on Networking (ToN)
, vol.10
, Issue.6
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
11
-
-
46149114283
-
Managing the Threat of Denial-of-Service Attacks
-
October
-
A. Householder, Art Manion, Linda Pesante, George M. Weaver, and Rob Thomas, "Managing the Threat of Denial-of-Service Attacks," CERT Coordination Center, October 2001.
-
(2001)
CERT Coordination Center
-
-
Householder, A.1
Manion, A.2
Pesante, L.3
Weaver, G.M.4
Thomas, R.5
-
13
-
-
46149123241
-
Using Machine Learning Techniques to Identify Botnet Traffic
-
Tampa, FL, November 14
-
nd IEEE LCN Workshop on Network Security, Tampa, FL, November 14, 2006.
-
(2006)
nd IEEE LCN Workshop on Network Security
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, T.4
-
14
-
-
30344486245
-
CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth
-
October-December
-
D. Kotz and T. Henderson, "CRAWDAD: A Community Resource for Archiving Wireless Data at Dartmouth," IEEE Pervasive Computing, Volume 4, Issue 4, October-December 2005.
-
(2005)
IEEE Pervasive Computing
, vol.4
, Issue.4
-
-
Kotz, D.1
Henderson, T.2
-
15
-
-
19544387615
-
An Analysis of Internet Chat Systems
-
Miami Beach, FL
-
C. Dewes, A. Wichmann, and A. Feldmann, "An Analysis of Internet Chat Systems," Proc. 3rd ACM SIGCOMM Conf on Internet Measurement, Miami Beach, FL, 2003.
-
(2003)
Proc. 3rd ACM SIGCOMM Conf on Internet Measurement
-
-
Dewes, C.1
Wichmann, A.2
Feldmann, A.3
-
16
-
-
19944406146
-
Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures
-
New York, NY
-
S. Sen, O. Spatscheck, and D. Wang, "Accurate, Scalable In-Network Identification of P2P Traffic Using Application Signatures," Proc. 13th International Conf. on World Wide Web, New York, NY, 2004.
-
(2004)
Proc. 13th International Conf. on World Wide Web
-
-
Sen, S.1
Spatscheck, O.2
Wang, D.3
-
18
-
-
14344265818
-
Internet Traffic Classification using Bayesian Analysis Techniques
-
Banff, Alberta, Canada
-
A. W. Moore and D. Zuev, "Internet Traffic Classification using Bayesian Analysis Techniques," Proc. 2005 ACM SIGMETRICS International Conf. on Measurement and Modeling of Computer Systems, Banff, Alberta, Canada, 2005.
-
(2005)
Proc. 2005 ACM SIGMETRICS International Conf. on Measurement and Modeling of Computer Systems
-
-
Moore, A.W.1
Zuev, D.2
-
19
-
-
14944345677
-
Transport Layer Identification of P2P Traffic
-
Taormina, Sicily
-
T. Karagiannis, A. Broido, M. Faloutsos, and kc claffy, "Transport Layer Identification of P2P Traffic," Proc. 4th ACM SIGCOMM Conf. on Internet Measurement, Taormina, Sicily, 2004.
-
(2004)
Proc. 4th ACM SIGCOMM Conf. on Internet Measurement
-
-
Karagiannis, T.1
Broido, A.2
Faloutsos, M.3
kc claffy4
-
22
-
-
18744391788
-
Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay
-
Zurich, Switzerland, October
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay," Proc. International Symposium on Recent Advances in Intrusion Detection (RAID), Zurich, Switzerland, October 2002.
-
(2002)
Proc. International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
24
-
-
33751394438
-
Architecture for Multi-stage Network Attack Traceback
-
Sydney, Australia, 15-17 November
-
W. T. Strayer, C. E. Jones, B. Schwartz, J. Mikkelson, and C. Livadas, "Architecture for Multi-stage Network Attack Traceback," First IEEE LCN Workshop on Network Security, Sydney, Australia, 15-17 November 2005.
-
(2005)
First IEEE LCN Workshop on Network Security
-
-
Strayer, W.T.1
Jones, C.E.2
Schwartz, B.3
Mikkelson, J.4
Livadas, C.5
-
25
-
-
84888402098
-
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
-
July 7
-
E. Cooke, F. Jahanian, and D. McPherson, "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets," USENIX SRUTI Workshop, July 7, 2005.
-
(2005)
USENIX SRUTI Workshop
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
|