-
1
-
-
59849085532
-
-
Agobot Backdoor. http://www.viruslist.com/en/viruses/ encyclopedia?virusid=42101
-
Agobot Backdoor
-
-
-
3
-
-
85081770459
-
The Internet motion sensor: A distributed blackhole monitoring system
-
In: San Diego, CA, February 2005
-
Bailey M, Cooke E, Jahanian F, Nazario J, Watson D (2005) The Internet motion sensor: A distributed blackhole monitoring system. In: Proceedings of the 12th network and distributed system security symposium (NDSS), San Diego, CA, February 2005
-
(2005)
Proceedings of the 12th Network and Distributed System Security Symposium (NDSS)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
4
-
-
33845564966
-
-
CSE Technical Report CSE-TR-499-04. University of Michigan, Ann Arbor
-
Bailey M, Cooke E, Watson D, Jahanian F, Provos N (2004) A hybrid honeypot architecture for scalable network monitoring. CSE Technical Report CSE-TR-499-04. University of Michigan, Ann Arbor
-
(2004)
A Hybrid Honeypot Architecture for Scalable Network Monitoring
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Provos, N.5
-
8
-
-
28044442580
-
HoneyStat: Local worm detection using honeypots
-
In: Sophia Antipolis, French Riviera, France, September 2004
-
Dagon D, Qin X, Gu G, Lee W, Grizzard J, Levine J, Owen H (2004) HoneyStat: Local worm detection using honeypots. In: Proceedings of the 7th international symposium on recent advances in intrusion detection (RAID 2004), Sophia Antipolis, French Riviera, France, September 2004
-
(2004)
Proceedings of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
12
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
In: Karlsruhe, Germany, August 2003
-
Estan C, Savage S, Varghese G (2003) Automatically inferring patterns of resource consumption in network traffic. In: Proceedings of the ACM SIGCOMM conference, Karlsruhe, Germany, August 2003
-
(2003)
Proceedings of the ACM SIGCOMM Conference
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
13
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
In: December 2004
-
Gu G, Sharif M, Qin X, Dagon D, Lee W, Riley G (2004) Worm detection, early warning and response based on local victim information. In: Proceedings of the 20th annual computer security applications conference (ACSAC'04), December 2004
-
(2004)
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04)
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
14
-
-
85084164812
-
Collapsar: A VM-based architecture for network attack detention center
-
In: August 2004
-
Jiang X, Xu D (2004) Collapsar: A VM-based architecture for network attack detention center. In: Proceedings of the 13th USENIX security symposium, August 2004
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Jiang, X.1
Xu, D.2
-
15
-
-
34547307344
-
Virtual playgrounds for worm behavior investigation
-
In: Seattle, USA, September 2005
-
Jiang X, Xu D, Wang HJ, Spafford EH (2005) Virtual playgrounds for worm behavior investigation. In: Proceedings of the 8th RAID, Seattle, USA, September 2005
-
(2005)
Proceedings of the 8th RAID
-
-
Jiang, X.1
Xu, D.2
Wang, H.J.3
Spafford, E.H.4
-
16
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
In: Oakland, CA, May 2004
-
Jung J, Paxson V, Berger AW, Balakrishnan H (2004) Fast portscan detection using sequential hypothesis testing. In: Proceedings of IEEE symposium on security and privacy, Oakland, CA, May 2004
-
(2004)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
18
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
In: San Diego, CA, August 2004
-
Kim HA, Karp B (2004) Autograph: Toward automated, distributed worm signature detection. In: Proceedings of the 13th usenix security symposium (Security 2004), San Diego, CA, August 2004
-
(2004)
Proceedings of the 13th Usenix Security Symposium (Security 2004)
-
-
Kim, H.A.1
Karp, B.2
-
22
-
-
84858912639
-
-
Accessed 2001
-
Linux Lion Worms. http://www.whitehats.com/library/worms/lion. Accessed 2001
-
Linux Lion Worms
-
-
-
23
-
-
59849107034
-
-
MSBlaster Worms. Accessed August 2003
-
MSBlaster Worms. CERT advisory CA-2003-20 W32/Blaster worms. http://www.cert.org/advisories/CA-2003-20.htm. Accessed August 2003
-
CERT Advisory CA-2003-20 W32/Blaster Worms
-
-
-
24
-
-
0742276097
-
The spread of the Sapphire/Slammer worm
-
Moore D, Paxson V, Savage S, Shannon C, Staniford S, Weaver N (2003) The spread of the Sapphire/Slammer worm. IEEE Secur Priv 1(4):33
-
(2003)
IEEE Secur Priv
, vol.1
, Issue.4
, pp. 33
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
27
-
-
28444495656
-
Network telescopes: Observing small or distant security events
-
August 2002
-
Moore D (2002) Network telescopes: Observing small or distant security events. In: Proceedings of the 11th USENIX security symposium, August 2002
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Moore, D.1
-
30
-
-
33846893358
-
Paragraph: Thwarting signature learning by training maliciously
-
In: Hamburg, Germany, September 2006
-
Newsome J, Karp B, Song D (2006) Paragraph: Thwarting signature learning by training maliciously. In: Proceedings of the 9th international symposium on recent advances in intrusion detection (RAID 2006), Hamburg, Germany, September 2006
-
(2006)
Proceedings of the 9th International Symposium on Recent Advances in Intrusion Detection (RAID 2006)
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
31
-
-
0015278845
-
Behavioral phenotypes in organic genetic disease
-
Nyhan WL (1972) Behavioral phenotypes in organic genetic disease. Pediatr Res 6:1
-
(1972)
Pediatr Res
, vol.6
, pp. 1
-
-
Nyhan, W.L.1
-
32
-
-
77952369044
-
Towards NIC-based intrusion detection
-
Otey M, Parthasarathy S, Ghoting A, Li G, Narravula S, Panda D (2003) Towards NIC-based intrusion detection. In: Proceedings of the 2004 ACM KDD conference, 2003
-
(2003)
Proceedings of the 2004 ACM KDD Conference, 2003
-
-
Otey, M.1
Parthasarathy, S.2
Ghoting, A.3
Li, G.4
Narravula, S.5
Panda, D.6
-
33
-
-
58449097819
-
Tutorial: Data mining for intrusion detection, techniques, applications, and systems
-
In: March 2004
-
Pei J, Upadhyaya S (2004) Tutorial: Data mining for intrusion detection, techniques, applications, and systems. In: Proceedings of the IEEE international conference on data engineering, March 2004
-
(2004)
Proceedings of the IEEE International Conference on Data Engineering
-
-
Pei, J.1
Upadhyaya, S.2
-
34
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
In: May 2006
-
Perdisci R, Dagon D, Lee W, Fogla P, Sharif M (2006) Misleading worm signature generators using deliberate noise injection. In: Proceedings of the 2006 IEEE symposium on security and privacy, May 2006
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security and Privacy
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
38
-
-
0038011179
-
Specification-based anomaly detection: A new approach for detecting network intrusions
-
In: October 2002
-
Sekar R, Gupta A, Frullo J, Shanbhag T, Tiwari A, Yang H, Zhou S (2002) Specification-based anomaly detection: A new approach for detecting network intrusions. In: Proceedings of 9th ACM conference on computer and communications security, October 2002
-
(2002)
Proceedings of 9th ACM Conference on Computer and Communications Security
-
-
Sekar, R.1
Gupta, A.2
Frullo, J.3
Shanbhag, T.4
Tiwari, A.5
Yang, H.6
Zhou, S.7
-
39
-
-
84991765629
-
Automated worm fingerprinting
-
In: San Francisco, CA, December 2004
-
Singh S, Estan C, Varghese G, Savage S (2004) Automated worm fingerprinting. In: Proceedings of the ACM/USENIX symposium on operating system design and implementation, San Francisco, CA, December 2004
-
(2004)
Proceedings of the ACM/USENIX Symposiumon Operating System Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
43
-
-
59849124576
-
-
Accessed May 2004
-
Sasser Worms. http://www.microsoft.com/security/incident/sasser.as. Accessed May 2004
-
Sasser Worms
-
-
-
44
-
-
84883699276
-
-
Snort-inline. http://sourceforge.net/projects/snort-inline/
-
Snort-inline
-
-
-
47
-
-
0034513472
-
Dynamic Internet overlay deployment and management Using the X-Bone
-
In: November 2000
-
Touch J (2000) Dynamic Internet overlay deployment and management Using the X-Bone. In: Procedings of IEEE ICNP 2000, November 2000
-
(2000)
Procedings of IEEE ICNP 2000
-
-
Touch, J.1
-
49
-
-
14844322335
-
Testing intrusion detection signatures using mutant exploits
-
In: Washington, DC, October 2004
-
Vigna G, Robertson W, Balzarotti D (2004) Testing intrusion detection signatures using mutant exploits. In: Proceedings of the ACM conference on computer and communication security (ACM CCS) 21-30 Washington, DC, October 2004
-
(2004)
Proceedings of the ACM Conference on Computer and Communication Security (ACM CCS)
, pp. 21-30
-
-
Vigna, G.1
Robertson, W.2
Balzarotti, D.3
-
50
-
-
84885575254
-
Scalability, fidelity and containment in the potemkin virtual honeyfarm
-
In: October 2005
-
Vrable M, Ma J, Chen J, Moore D, Vandekieft E, Snoeren AC, Voelker GM, Savage S (2005) Scalability, fidelity and containment in the potemkin virtual honeyfarm. In: Proceedings of the 20th ACM symposium on operating systems principles, October 2005
-
(2005)
Proceedings of the 20th ACM Symposium on Operating Systems Principles
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
51
-
-
59849102294
-
-
VMware. http://www.vmware.com/
-
VMware
-
-
-
52
-
-
59849118229
-
-
Accessed August 2003
-
Welchia Worm. http://securityresponse.symantec.com/avcenter/venc/data/ w32.welchia.worm.htm. Accessed August 2003
-
Welchia Worm
-
-
-
54
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
In: Sophia Antipolis, French Riviera, France, September 2004
-
Wang K, Stolfo SJ (2004) Anomalous payload-based network intrusion detection. In: Proceedings of the 7th international symposium on recent advances in intrusion detection (RAID 2004), Sophia Antipolis, French Riviera, France, September 2004
-
(2004)
Proceedings of the 7th International Symposium On Recent Advances in Intrusion Detection (RAID 2004)
-
-
Wang, K.1
Stolfo, S.J.2
-
55
-
-
8644273520
-
An environment for controlled worm replication and analysis (Internet-inna-Box)
-
In: September 2000
-
Whalley I, Arnold B, Chess D, Morar J, Segal A (2000) An environment for controlled worm replication and analysis (Internet-inna-Box). In: Proceedings of virus bulletin conference, September 2000
-
(2000)
Proceedings of Virus Bulletin Conference
-
-
Whalley, I.1
Arnold, B.2
Chess, D.3
Morar, J.4
Segal, A.5
|