-
1
-
-
58449089535
-
Festor, O.. Tracking global wide configuration errors
-
State, R., Francois, J., Festor, O.. Tracking global wide configuration errors. IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation, 2006.
-
(2006)
IEEE / IST Workshop on Monitoring, Attack Detection and Mitigation
-
-
State, R.1
Francois, J.2
-
2
-
-
15944415382
-
Honeypot Forensic
-
June
-
Raynal, F. and Berthier, Y. and Biondi, P. and Kaminsky, D., "Honeypot Forensic", IEEE Information Assurance Conference, June 2004.
-
(2004)
IEEE Information Assurance Conference
-
-
Raynal, F.1
Berthier, Y.2
Biondi, P.3
Kaminsky, D.4
-
3
-
-
33750376717
-
Scalability, fidelity, and containment in the potemkin virtual honeyfarm
-
Vrable, M. and Ma, J. and Chen, J. and Moore, D. and Vandekieft, E. and Snoeren, A.C. and Voelker, G.M. and Savage, S., "Scalability, fidelity, and containment in the potemkin virtual honeyfarm", ACM SIGOPS Operating Systems Review, 39(5): 148-162, 2005.
-
(2005)
ACM SIGOPS Operating Systems Review
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
6
-
-
34547141391
-
The Nepenthes Platform: An Efficient Approach to Collect Malware
-
September
-
Baecher, P. and Koetter, M. and Holz, T. and Dornseif, M. and Freiling, F., "The Nepenthes Platform: An Efficient Approach to Collect Malware", Proceedings of Recent Advances in Intrusion Detection (RAID), September 2006,
-
(2006)
Proceedings of Recent Advances in Intrusion Detection (RAID)
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
7
-
-
33745205813
-
Inferring Internet denial-of-service activity
-
Moore, D. and Shannon, C. and Brown, D.J. and Voelker, G.M. and Savage, S., "Inferring Internet denial-of-service activity", ACM Transactions on Computer Systems (TOCS), 24(2): 115-139, 2006.
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
9
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
Cooke, E. and Bailey, M. and Mao, Z.M. and Watson, D. and Jahanian, F. and McPherson, D., "Toward understanding distributed blackhole placement", Proceedings of the 2004 ACM workshop on Rapid malcode, pages 54-64, 2004.
-
(2004)
Proceedings of the 2004 ACM workshop on Rapid malcode
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Mao, Z.M.3
Watson, D.4
Jahanian, F.5
McPherson, D.6
-
10
-
-
58449101279
-
-
Cisco Systems Inc. Netflow
-
Cisco Systems Inc. Netflow. 2008. http://www.cisco.com/go/netflow
-
(2008)
-
-
-
11
-
-
58449106851
-
-
Team CYMRU. The darknet project, June 2004
-
Team CYMRU. The darknet project. http://www.cymru.com/Darknet/index.html, June 2004.
-
-
-
-
12
-
-
58449085788
-
-
Dug Song, Rob Malan, and Robert Stone. A snapshot of global Internet worm activity. FIRST Conference on Computer Security Incident Handling and Response, June 2002.
-
Dug Song, Rob Malan, and Robert Stone. A snapshot of global Internet worm activity. FIRST Conference on Computer Security Incident Handling and Response, June 2002.
-
-
-
-
13
-
-
28044457069
-
Network telescopes
-
Technical Report CS2004-0795, UC San Diego, July
-
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Network telescopes. Technical Report CS2004-0795, UC San Diego, July 2004.
-
(2004)
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
15
-
-
3543096392
-
-
Jung, J. and Paxson, V. and Berger, AW and Balakrishnan, H. Fast portscan detection using sequential hypothesis testing. Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on. pages 211-225, 2004.
-
Jung, J. and Paxson, V. and Berger, AW and Balakrishnan, H. Fast portscan detection using sequential hypothesis testing. Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on. pages 211-225, 2004.
-
-
-
-
16
-
-
44049086375
-
Practical Darknet Measurement
-
Bailey, M. and Cooke, E. and Jahanian, F, and Myrick, A. and Sinha, S.: Practical Darknet Measurement. In 40th Annual Conference on Information Sciences and Systems, 2006.
-
(2006)
40th Annual Conference on Information Sciences and Systems
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
17
-
-
58449135781
-
-
Bailey, M. Evan Cooke and Jahanian, F. and Provos, N. and Rosaen, K. and Watson, D.: Data reduction for the scalable automated analysis of distributed darknet traffic. In Proceedings of the Internet Measurement Conference, 2005.
-
Bailey, M. Evan Cooke and Jahanian, F. and Provos, N. and Rosaen, K. and Watson, D.: Data reduction for the scalable automated analysis of distributed darknet traffic. In Proceedings of the Internet Measurement Conference, 2005.
-
-
-
-
18
-
-
0024984013
-
A network security monitor
-
L. T. Heberlein, G. V. Dias, K. N. Levitt, B. Mukherjee, J. Wood, and D. Wolber. A network security monitor. In Proc. IEEE Symposium on Research in Security and Privacy, pages 296-304, 1990.
-
(1990)
Proc. IEEE Symposium on Research in Security and Privacy
, pp. 296-304
-
-
Heberlein, L.T.1
Dias, G.V.2
Levitt, K.N.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
19
-
-
85090433665
-
-
th Conference on Systems Administration (LISA-99), pages 229-238, Berkeley, CA, Nov.7-12 1999.
-
th Conference on Systems Administration (LISA-99), pages 229-238, Berkeley, CA, Nov.7-12 1999.
-
-
-
-
20
-
-
84942250809
-
Surveillance detection in high bandwidth environments
-
Washington, DC, IEEE Press. 22-24 April
-
S. Robertson, E. V. Siegel, M. Miller, and S. J. Stolfo. Surveillance detection in high bandwidth environments. In Proceedings of the 2003 DARPA DISCEX III Conference, pages 130 -139, Washington, DC, 2003. IEEE Press. 22-24 April 2003.
-
(2003)
Proceedings of the 2003 DARPA DISCEX III Conference
, pp. 130-139
-
-
Robertson, S.1
Siegel, E.V.2
Miller, M.3
Stolfo, S.J.4
-
22
-
-
84870906559
-
-
http://nfsen.sourceforge.net
-
Peter Haag, Nfdump: http://nfdump.sourceforge.net Nfsen:http://nfsen. sourceforge.net
-
Nfdump
-
-
Haag, P.1
-
23
-
-
21944439990
-
Breaking Down Dimensionality: An Effective Feature Selection Method for High-Dimensional Clustering
-
San Francisco, CA, May
-
Guo, D., Gahegan, M., Peuquet, D., & MacEachren, A., "Breaking Down Dimensionality: An Effective Feature Selection Method for High-Dimensional Clustering", Workshop on Clustering High Dimensional Data and its Applications, the Third SIAM International Conference on Data Mining, San Francisco, CA, May 2003.
-
(2003)
Workshop on Clustering High Dimensional Data and its Applications, the Third SIAM International Conference on Data Mining
-
-
Guo, D.1
Gahegan, M.2
Peuquet, D.3
MacEachren, A.4
-
27
-
-
33845564966
-
A hybrid honeypot architecture for scalable network monitoring
-
CSE-TR-499-04, University of Michigan, Ann Arbor, October
-
Bailey, M. and Cooke, E. and Watson, D. and Jahanian, F. and Provos, N., "A hybrid honeypot architecture for scalable network monitoring", CSE Technical Report CSE-TR-499-04, University of Michigan, Ann Arbor, October 2004.
-
(2004)
CSE Technical Report
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Provos, N.5
|