-
3
-
-
12244311689
-
A taxonomy of computer worms
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham, "A taxonomy of computer worms," in First ACM Workshop on Rapid Malcode (WORM'03), 2003.
-
(2003)
First ACM Workshop on Rapid Malcode (WORM'03)
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
6
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The internet motion sensor: A distributed blackhole monitoring system," in Network and Distributed System Security Symposium (NDSS'05), 2005.
-
(2005)
Network and Distributed System Security Symposium (NDSS'05)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
7
-
-
16344396406
-
Monitoring and early warning of internet worms
-
C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and early warning of internet worms," in ACM Conference on Computer and Communications Security (CCS'03), 2003.
-
(2003)
ACM Conference on Computer and Communications Security (CCS'03)
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
8
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
J. Wu, S. Vanagala, L. Gao, and K. Kwiat, "An effective architecture and algorithm for detecting worms with various scan techniques," in ISOC Network and Distributed System Security Symposium (NDSS'04), 2004.
-
(2004)
ISOC Network and Distributed System Security Symposium (NDSS'04)
-
-
Wu, J.1
Vanagala, S.2
Gao, L.3
Kwiat, K.4
-
9
-
-
34548370411
-
An empirical evaluation of ip address space occupancy
-
USC/ISI, Tech. Rep. ISI-TR-598
-
Y. Pryadkin, R. Lindell, J. Bannister, and R. Govindan, "An empirical evaluation of ip address space occupancy," USC/ISI, Tech. Rep. ISI-TR-598, 2004.
-
(2004)
-
-
Pryadkin, Y.1
Lindell, R.2
Bannister, J.3
Govindan, R.4
-
12
-
-
26844507894
-
Routing worm: A fast, selective attack worm based on ip address information
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Routing worm: A fast, selective attack worm based on ip address information," in 19th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'05), 2005.
-
(2005)
19th ACM/IEEE/SCS Workshop on Principles of Advanced and Distributed Simulation (PADS'05)
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
14
-
-
14944380936
-
The top speed of flash worms
-
S. Staniford, D. Moore, V. Paxson, and N. W. Proc, "The top speed of flash worms," in ACM CCS Workshop on Rapid Malcode (WORM'04), 2004.
-
(2004)
ACM CCS Workshop on Rapid Malcode (WORM'04)
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Proc, N.W.4
-
18
-
-
34548324846
-
Measuring network-aware worm spreading ability
-
Z. Chen and C. Ji, "Measuring network-aware worm spreading ability," in IEEE INFOCOM'07, 2007.
-
(2007)
IEEE INFOCOM'07
-
-
Chen, Z.1
Ji, C.2
-
19
-
-
51349127540
-
-
Labrea tarpit project
-
"Labrea tarpit project," http://labrea.sourceforge.net/.
-
-
-
-
21
-
-
71649092323
-
The dark oracle: Perspective-aware unused and unreachable address discovery
-
E. Cooke, M. Bailey, F. Jahanian, and R. Mortier, "The dark oracle: Perspective-aware unused and unreachable address discovery," in 3rd Symposium on Networked Systems Design and Implementation (NSDI'06), 2006.
-
(2006)
3rd Symposium on Networked Systems Design and Implementation (NSDI'06)
-
-
Cooke, E.1
Bailey, M.2
Jahanian, F.3
Mortier, R.4
-
23
-
-
84885575254
-
Scalability, fidelity and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E. Vandekieft, A. Snoeren, G. Voelker, and S. Savage, "Scalability, fidelity and containment in the potemkin virtual honeyfarm," in ACM SOSP'05, 2005.
-
(2005)
ACM SOSP'05
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.6
Voelker, G.7
Savage, S.8
-
24
-
-
78249251033
-
Protocol-independent adaptive replay of application dialog
-
W Cui, V. Paxson, N. Weaver, and R. H. Katz, "Protocol-independent adaptive replay of application dialog," in 13th Annual Network and Distributed System Security Symposium (NDSS'06), 2006.
-
(2006)
13th Annual Network and Distributed System Security Symposium (NDSS'06)
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
Katz, R.H.4
-
25
-
-
48349110924
-
-
ICSI, Tech. Rep. TR-06-004
-
W. Cui, V. Paxson, and N. Weaver, "Gq: Realizing a system to catch worms in a quarter million places," ICSI, Tech. Rep. TR-06-004, 2006.
-
(2006)
Gq: Realizing a system to catch worms in a quarter million places
-
-
Cui, W.1
Paxson, V.2
Weaver, N.3
-
26
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in IEEE Symposium on Security and Privacy (Oakland'04), 2004.
-
(2004)
IEEE Symposium on Security and Privacy (Oakland'04)
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
28
-
-
33745469273
-
Towards collaborative security and p2p intrusion detection
-
M. Locasto, J. Parekh, A. Keromytis, and S. Stolfo, "Towards collaborative security and p2p intrusion detection," in 2005 IEEE Workshop on Information Assurance and Security, 2005.
-
(2005)
2005 IEEE Workshop on Information Assurance and Security
-
-
Locasto, M.1
Parekh, J.2
Keromytis, A.3
Stolfo, S.4
-
30
-
-
51349144318
-
Optimal worm-scanning method using vulnerablehost distributions
-
special issue on Computer and Network Security
-
Z. Chen and C. Ji, "Optimal worm-scanning method using vulnerablehost distributions," International Journal of Security and Networks (IJSN), special issue on "Computer and Network Security.", 2006.
-
(2006)
International Journal of Security and Networks (IJSN)
-
-
Chen, Z.1
Ji, C.2
-
31
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley, "Worm detection, early warning and response based on local victim information," in 20th Annual Computer Security Applications Conference (ACSAC'04), 2004.
-
(2004)
20th Annual Computer Security Applications Conference (ACSAC'04)
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
32
-
-
51349105609
-
-
H. project, Know your enemy: Learning about Security Threats. Pearson Education, 2004.
-
H. project, Know your enemy: Learning about Security Threats. Pearson Education, 2004.
-
-
-
-
33
-
-
51349122406
-
-
University of Michigan, Tech. Rep. CSE-TR-517-06
-
K. Borders, L. Falk, and A. Prakash, "Opening: Opening networks to reduce network attacks on legitimate services," University of Michigan, Tech. Rep. CSE-TR-517-06, 2006.
-
(2006)
Opening: Opening networks to reduce network attacks on legitimate services
-
-
Borders, K.1
Falk, L.2
Prakash, A.3
-
38
-
-
33751035317
-
Design space and analysis of worm defense strategies
-
D. Brumley, L.-H. Liu, P. Poosankam, and D. Song, "Design space and analysis of worm defense strategies," in 2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS '06), 2006.
-
(2006)
2006 ACM Symposium on Information, Computer, and Communication Security (ASIACCS '06)
-
-
Brumley, D.1
Liu, L.-H.2
Poosankam, P.3
Song, D.4
|