-
1
-
-
34248389195
-
Analysis of communities of interest in data networks
-
Aiello, W., Kalmanek, C., McDaniel, P., Sen, S., Spatscheck, O., Van der Merwe, J.: Analysis of communities of interest in data networks. In: Proceedings of Passive and Active Measurement Workshop (2005)
-
(2005)
Proceedings of Passive and Active Measurement Workshop
-
-
Aiello, W.1
Kalmanek, C.2
McDaniel, P.3
Sen, S.4
Spatscheck, O.5
Van der Merwe, J.6
-
2
-
-
26844548971
-
Know your enemy: Tracking botnets
-
Technical report, The Honeynet Project and Research Alliance
-
Bächer, P., Holz, T., Kötter, M., Wicherski, G.: Know your enemy: Tracking botnets. Technical report, The Honeynet Project and Research Alliance (2005)
-
(2005)
-
-
Bächer, P.1
Holz, T.2
Kötter, M.3
Wicherski, G.4
-
3
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
Barf ord, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of ACM SIGCOMM Internet Measurement Workshop (2002)
-
(2002)
Proceedings of ACM SIGCOMM Internet Measurement Workshop
-
-
Barf ord, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
6
-
-
33846213661
-
A divide-and-merge methodology for clustering
-
Cheng, D., Kannan, R., Vempala, S., Wang, G.: A divide-and-merge methodology for clustering. ACM Transactions on Database Systems 31(4) (2006)
-
(2006)
ACM Transactions on Database Systems
, vol.31
, Issue.4
-
-
Cheng, D.1
Kannan, R.2
Vempala, S.3
Wang, G.4
-
7
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: Understanding, detecting, and disrupting botnets. In: Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet (2005)
-
(2005)
Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
10
-
-
4544259509
-
Locality-sensitive hashing scheme based on p-stable distributions
-
Datar, M., Immorlica, N., Indyk, P., Mirrokni, V.S.: Locality-sensitive hashing scheme based on p-stable distributions. In: Proceedings of the Symposium on Computational Geometry (2004)
-
(2004)
Proceedings of the Symposium on Computational Geometry
-
-
Datar, M.1
Immorlica, N.2
Indyk, P.3
Mirrokni, V.S.4
-
12
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (2007)
-
(2007)
Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
13
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
August
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the USENIX Security Symposium. (August 2008)
-
(2008)
Proceedings of the USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
14
-
-
85061529860
-
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
-
Gu, G., Porras, P., Yegneswaran, V., Pong, M., Lee, W.: BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In: Proceedings of the USENIX Security Symposium (2007)
-
(2007)
Proceedings of the USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Pong, M.4
Lee, W.5
-
15
-
-
49949105863
-
-
Gu, G., Zhang, J., Lee, W.: Botsniffer: Detecting botnet command and control channels in network traffic. In: Proceedings of the 2008 ISOC Network and Distributed System Security Symposium (February 2008)
-
Gu, G., Zhang, J., Lee, W.: Botsniffer: Detecting botnet command and control channels in network traffic. In: Proceedings of the 2008 ISOC Network and Distributed System Security Symposium (February 2008)
-
-
-
-
16
-
-
0842288924
-
-
RFC 2724
-
Handelman, S., Stibler, S., Brownlee, N., Ruth, G.: New attributes for traffic flow measurement. RFC 2724 (1999)
-
(1999)
New attributes for traffic flow measurement
-
-
Handelman, S.1
Stibler, S.2
Brownlee, N.3
Ruth, G.4
-
18
-
-
79251558204
-
Detecting malicious network traffic using inverse distributions of packet, contents
-
Karamcheti, V., Geiger, D., Kedem, Z., Muthukrishnan, S.M.: Detecting malicious network traffic using inverse distributions of packet, contents. In: Proceedings of the ACM SIGCOMM Workshop on Mining Network Data (2005)
-
(2005)
Proceedings of the ACM SIGCOMM Workshop on Mining Network Data
-
-
Karamcheti, V.1
Geiger, D.2
Kedem, Z.3
Muthukrishnan, S.M.4
-
23
-
-
33947198115
-
Observed structure of addresses in IP traffic
-
Kohler, E., Li, J., Paxson, V., Shenker, S.: Observed structure of addresses in IP traffic. IEEE/ACM Transactions on Networking 14(6) (2006)
-
(2006)
IEEE/ACM Transactions on Networking
, vol.14
, Issue.6
-
-
Kohler, E.1
Li, J.2
Paxson, V.3
Shenker, S.4
-
26
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
Livadas, C., Walsh, B., Lapsley, D., Strayer, T: Using machine learning techniques to identify botnet traffic. In: Proceedings of the IEEE LCN Workshop on Network Security (2006)
-
(2006)
Proceedings of the IEEE LCN Workshop on Network Security
-
-
Livadas, C.1
Walsh, B.2
Lapsley, D.3
Strayer, T.4
-
31
-
-
49949109137
-
-
Provos, N., Honeyman, P.: Detecting steganographic content on the Internet. In: Proceedings of the 2002 ISOC Network and Distributed System Security Symposium (NDSS) (February 2002)
-
Provos, N., Honeyman, P.: Detecting steganographic content on the Internet. In: Proceedings of the 2002 ISOC Network and Distributed System Security Symposium (NDSS) (February 2002)
-
-
-
-
32
-
-
49949090688
-
Analysis of Internet
-
Master's thesis, Swiss Federal Institute of Technology Zurich
-
Racine, S.: Analysis of Internet. Relay Chat Usage by DDoS Zombies. Master's thesis, Swiss Federal Institute of Technology Zurich (2004)
-
(2004)
Relay Chat Usage by DDoS Zombies
-
-
Racine, S.1
-
33
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: ACM SIGCOMM/USENIX Internet Measurement. Conference (2006)
-
(2006)
ACM SIGCOMM/USENIX Internet Measurement. Conference
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
37
-
-
58449108281
-
Traffic aggregation for maiware detection
-
Technical Report CMUCyLab-07-017, Carnegie Mellon University
-
Reiter, M., Yen, T.: Traffic aggregation for maiware detection. Technical Report CMUCyLab-07-017, Carnegie Mellon University (2007)
-
(2007)
-
-
Reiter, M.1
Yen, T.2
-
38
-
-
84991765629
-
Automated worm fingerprinting
-
Singh, S., Estan, C., Varghese, G., Savage, S.: Automated worm fingerprinting. In: Proceedings of the Symposium on Operating Systems Design and Implementation (2004)
-
(2004)
Proceedings of the Symposium on Operating Systems Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
40
-
-
34748831602
-
Multivariate SVD analyses for network anomaly detection
-
Terrell, J., Zhang, L., Zhu, Z., Jeffay, K., Shen, H., Nobel, A., Donelson Smith, R: Multivariate SVD analyses for network anomaly detection. In: Poster Proceedings of ACM SIGCOMM (2005)
-
(2005)
Poster Proceedings of ACM SIGCOMM
-
-
Terrell, J.1
Zhang, L.2
Zhu, Z.3
Jeffay, K.4
Shen, H.5
Nobel, A.6
Donelson Smith, R.7
|