-
2
-
-
55149083421
-
-
Honeynet project
-
Honeynet project. http://www.honeynet.org.
-
-
-
-
3
-
-
55149095643
-
-
Qemu data handling multiple command execution and denial of service vulnerabilities. http://www.frsirt.com/english/advisories/2007/1597.
-
Qemu data handling multiple command execution and denial of service vulnerabilities. http://www.frsirt.com/english/advisories/2007/1597.
-
-
-
-
4
-
-
55149097378
-
-
Sebek homepage. http://www.honeynet.org/tools/sebek/.
-
-
-
Sebek homepage1
-
5
-
-
55149110686
-
-
Upnp forum. http://www.upnp.org.
-
-
-
-
6
-
-
1642398510
-
-
User-mode linux. http://user-modelinux.sourceforge.net/.
-
User-mode linux
-
-
-
8
-
-
85081770459
-
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
-
February
-
th ISOC Symposium, on Network and Distributed Systems Security (SNDSS), pages 167-179, February 2005.
-
(2005)
th ISOC Symposium, on Network and Distributed Systems Security (SNDSS)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
11
-
-
0242624600
-
MET: An Experimental System for Malicious Email Tracking
-
September
-
M. Bhattacharyya, M. G. Schultz, E. Eskin, S. Hershkop, and S. J. Stolfo. MET: An Experimental System for Malicious Email Tracking. In Proceedings of the New Security Paradigms Workshop (NSPW), pages 1-12, September 2002.
-
(2002)
Proceedings of the New Security Paradigms Workshop (NSPW)
, pp. 1-12
-
-
Bhattacharyya, M.1
Schultz, M.G.2
Eskin, E.3
Hershkop, S.4
Stolfo, S.J.5
-
12
-
-
84885679117
-
Vigilante: End-to-end containment of internet worms
-
October
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-end containment of internet worms. In Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP)
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
13
-
-
35048879637
-
Honey Stat: Local Worm Detection Using Honepots
-
October
-
th International Symposium on Recent Advances in Intrusion Detection (RAID), pages 39-58, October 2004.
-
(2004)
th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizard, J.5
Levine, J.6
Owen, H.7
-
19
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
November 1999, software available from
-
M. Roesch. Snort: Lightweight intrusion detection for networks. In Proceedings of USENIX LISA '99, November 1999. (software available from http://www.snort.org/).
-
Proceedings of USENIX LISA '99
-
-
Roesch, M.1
-
22
-
-
14944380936
-
The Top Speed of Flash Worms
-
October
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver. The Top Speed of Flash Worms. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), pages 33-42, October 2004.
-
(2004)
Proceedings of the ACM Workshop on Rapid Malcode (WORM)
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
26
-
-
85084164812
-
Collapsar: A vm-based architecture for network attack detention center
-
August
-
D. X. Xuxian Jiang. Collapsar: A vm-based architecture for network attack detention center. In Proceedings of the 13th USENIX Security Symposium, pages 15-28, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 15-28
-
-
Xuxian Jiang, D.X.1
|