-
1
-
-
44049086375
-
Practical darknet measurement
-
March
-
M. Bailey, E. Cooke, F. Jahanian, A. Myrick, and S. Sinha. Practical darknet measurement. 40th Annual Conference on-Information Sciences and Systems, pages 1496-1501, March 2006.
-
(2006)
40th Annual Conference on-Information Sciences and Systems
, pp. 1496-1501
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
2
-
-
85081770459
-
The Internet Motion Sensor: A distributed blackhole monitoring system
-
San Diego, CA, February
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D.Watson. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of Network and Distributed System Security Symposium NDSS, San Diego, CA, February 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium NDSS
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
4
-
-
28444447116
-
A new approach for early detection of internet worms based on connection degree
-
4, Aug
-
C. Bo, B.-X. Fang, and X.-C. Yun. A new approach for early detection of internet worms based on connection degree. Proceedings of International Conference on Machine Learning and Cybernetics, 4:2424-2430 Vol. 4, Aug. 2005.
-
(2005)
Proceedings of International Conference on Machine Learning and Cybernetics
, vol.4
, pp. 2424-2430
-
-
Bo, C.1
Fang, B.-X.2
Yun, X.-C.3
-
6
-
-
33750958535
-
-
W. Chen and D. Yeung. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)-00, 2006.
-
W. Chen and D. Yeung. Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)-Volume 00, 2006.
-
-
-
-
7
-
-
36348929372
-
Collaborative detection of ddos attacks over multiple network domains
-
Dec
-
Y. Chen, K. Hwang, and W.-S. Ku. Collaborative detection of ddos attacks over multiple network domains. IEEE Transactions on Parallel and Distributed Systems, 18(12):1649-1662, Dec. 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.12
, pp. 1649-1662
-
-
Chen, Y.1
Hwang, K.2
Ku, W.-S.3
-
8
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
New York, NY, USA, ACM
-
E. Cooke, M. Bailey, Z. M. Mao, D. Watson, F. Jahanian, and D.McPherson. Toward understanding distributed blackhole placement. In Proceedings of the ACM workshop on Rapid malcode, WORM, pages 54-64, New York, NY, USA, 2004. ACM.
-
(2004)
Proceedings of the ACM workshop on Rapid malcode, WORM
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Mao, Z.M.3
Watson, D.4
Jahanian, F.5
McPherson, D.6
-
9
-
-
33845582612
-
Hotspots: The root causes of non-uniformity in self-propagating malware
-
E. Cooke, Z. Mao, and F. Jahanian. Hotspots: The root causes of non-uniformity in self-propagating malware. International Conference on Dependable Systems and Networks, DSN, pages 179-188, 2006.
-
(2006)
International Conference on Dependable Systems and Networks, DSN
, pp. 179-188
-
-
Cooke, E.1
Mao, Z.2
Jahanian, F.3
-
10
-
-
85084164812
-
Collapsar: A vm-based architecture for network attack detention center
-
Berkeley, CA, USA, USENIX Association
-
X. Jiang and D. Xu. Collapsar: a vm-based architecture for network attack detention center. In Proceedings of the 13th conference on USENIX Security Symposium, SSYM, pages 2-2, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
Proceedings of the 13th conference on USENIX Security Symposium, SSYM
, pp. 2-2
-
-
Jiang, X.1
Xu, D.2
-
11
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. Proceedings of IEEE Symposium on Security and Privacy, pages 211-225, May 2004.
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.3
Balakrishnan, H.4
-
12
-
-
0742276097
-
Inside the Slammer Worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security & Privacy Magazine, 1(4):33-39, 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
13
-
-
33646423315
-
Application of anomaly detection algorithms for detecting SYN flooding attacks
-
V. Siris and F. Papagalou. Application of anomaly detection algorithms for detecting SYN flooding attacks. Computer Communications, 29(9):1433-1442, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.1
Papagalou, F.2
-
14
-
-
37848999037
-
The HoneyTank: A scalable approach to collect malicious internet traffic
-
N. Vanderavero, X. Brouckaert, O. Bonaventure, and B. Le Charlier. The HoneyTank: a scalable approach to collect malicious internet traffic. International Journal of Critical Infrastructures, 4(1):185-205, 2008.
-
(2008)
International Journal of Critical Infrastructures
, vol.4
, Issue.1
, pp. 185-205
-
-
Vanderavero, N.1
Brouckaert, X.2
Bonaventure, O.3
Le Charlier, B.4
-
16
-
-
14644397228
-
Change-Point Monitoring for the Detection of DoS Attacks
-
H.Wang, D. Zhang, and K. G. Shin. Change-Point Monitoring for the Detection of DoS Attacks. IEEE Transactions on Dependable and Secure Computing, 1(4):193-208, 2004.
-
(2004)
IEEE Transactions on Dependable and Secure Computing
, vol.1
, Issue.4
, pp. 193-208
-
-
Wang, H.1
Zhang, D.2
Shin, K.G.3
|