-
1
-
-
33750372869
-
Toward a model for sources of Internet background radiation
-
Mar
-
P. Barford, R. Nowak, R. Willett, and V. Yegneswaran, "Toward a model for sources of Internet background radiation," in Proc. of the Passive and Active Measurement Conference (PAM'06), Mar. 2006.
-
(2006)
Proc. of the Passive and Active Measurement Conference (PAM'06)
-
-
Barford, P.1
Nowak, R.2
Willett, R.3
Yegneswaran, V.4
-
2
-
-
36348997064
-
Understanding localized-scanning worms
-
New Orleans, LA, Apr
-
Z. Chen, C. Chen, and C. Ji, "Understanding localized-scanning worms," in Proc. of 26th IEEE International Performance Computing and Communications Conference (IPCCC'07), New Orleans, LA, Apr. 2007, pp. 186-193.
-
(2007)
Proc. of 26th IEEE International Performance Computing and Communications Conference (IPCCC'07)
, pp. 186-193
-
-
Chen, Z.1
Chen, C.2
Ji, C.3
-
3
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, CA, Apr
-
Z. Chen, L. Gao, and K. Kwiat, "Modeling the spread of active worms," in Proc. of INFOCOM'03, vol. 3, San Francisco, CA, Apr. 2003, pp. 1890-1900.
-
(2003)
Proc. of INFOCOM'03
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
5
-
-
34548324846
-
Measuring network-aware worm spreading ability
-
Anchorage, AK, May
-
Z. Chen and C. Ji, "Measuring network-aware worm spreading ability," in Proc. of INFOCOM'07, Anchorage, AK, May 2007.
-
(2007)
Proc. of INFOCOM'07
-
-
Chen, Z.1
Ji, C.2
-
6
-
-
51349126234
-
Spatial-temporal characteristics of malicious sources
-
Phoenix, AZ, Apr
-
Z. Chen, C. Ji, and P. Barford, "Spatial-temporal characteristics of malicious sources," in Proc. of INFOCOM'08 Mini-Conference, Phoenix, AZ, Apr. 2008.
-
(2008)
Proc. of INFOCOM'08 Mini-Conference
-
-
Chen, Z.1
Ji, C.2
Barford, P.3
-
8
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
Philadelphia, PA, Aug
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in Proc. of ACM SIGCOMM'05, Philadelphia, PA, Aug. 2005.
-
(2005)
Proc. of ACM SIGCOMM'05
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
9
-
-
0742276097
-
Inside the Slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," IEEE Security and Privacy, vol. 1, no. 4, July 2003, pp. 33-39.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
10
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
Marseille, France, Nov
-
D. Moore, C. Shannon, and J. Brown, "Code-Red: a case study on the spread and victims of an Internet worm," in ACM SIGCOMM/USENIX Internet Measurement Workshop, Marseille, France, Nov. 2002.
-
(2002)
ACM SIGCOMM/USENIX Internet Measurement Workshop
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
12
-
-
31844452004
-
On the effectiveness of distributed worm monitoring
-
Baltimore, MD, Aug
-
M. A. Rajab, F. Monrose, and A. Terzis, "On the effectiveness of distributed worm monitoring," in Proc. of the 14th USENIX Security Symposium (Security'05), Baltimore, MD, Aug. 2005, pp. 225-237.
-
(2005)
Proc. of the 14th USENIX Security Symposium (Security'05)
, pp. 225-237
-
-
Rajab, M.A.1
Monrose, F.2
Terzis, A.3
-
13
-
-
31844451696
-
The limits of global scanning worm detectors in the presence of background noise
-
Fairfax, VA, Nov
-
D. W Richardson, S. D. Gribble, and E. D. Lazowska, "The limits of global scanning worm detectors in the presence of background noise," in Proc. of ACM Workshop on Rapid Malcode (WORM'05), Fairfax, VA, Nov. 2005, pp. 60-70.
-
(2005)
Proc. of ACM Workshop on Rapid Malcode (WORM'05)
, pp. 60-70
-
-
Richardson, D.W.1
Gribble, S.D.2
Lazowska, E.D.3
-
14
-
-
4344627335
-
The spread of the Witty worm
-
Jul-Aug
-
C. Shannon and D. Moore, "The spread of the Witty worm," IEEE Security and Privacy, vol. 2, no 4, Jul-Aug 2004, pp. 46-50.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
15
-
-
84991765629
-
Automated worm fingerprinting
-
San Francisco, CA, Dec
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proc. of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI'04), San Francisco, CA, Dec. 2004, pp. 45-60.
-
(2004)
Proc. of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI'04)
, pp. 45-60
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
16
-
-
85084162258
-
How to Own the Internet in your spare time
-
San Francisco, CA, Aug
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in your spare time," in Proc. of the 11th USENIX Security Symposium (Security'02), San Francisco, CA, Aug. 2002.
-
(2002)
Proc. of the 11th USENIX Security Symposium (Security'02)
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
17
-
-
51349085987
-
Sampling strategies for epidemic-style information dissemination
-
Phoenix, AZ, Apr
-
M. Vojnovic, V. Gupta, T. Karagiannis, and C. Gkantsidis, "Sampling strategies for epidemic-style information dissemination," in Proc. of INFOCOM'08, Phoenix, AZ, Apr. 2008.
-
(2008)
Proc. of INFOCOM'08
-
-
Vojnovic, M.1
Gupta, V.2
Karagiannis, T.3
Gkantsidis, C.4
-
18
-
-
33750248481
-
Effective worm detection for various scan techniques
-
J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, "Effective worm detection for various scan techniques," Journal of Computer Security, vol. 14, no. 4, 2006, pp. 359-387.
-
(2006)
Journal of Computer Security
, vol.14
, Issue.4
, pp. 359-387
-
-
Xia, J.1
Vangala, S.2
Wu, J.3
Gao, L.4
Kwiat, K.5
-
19
-
-
62849087263
-
Effective detection of active smart worms with varying scan rate
-
Aug
-
W Yu, X. Wang, D. Xuan, and D. Lee, "Effective detection of active smart worms with varying scan rate," in Proc. of IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06), Aug. 2006.
-
(2006)
Proc. of IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm'06)
-
-
Yu, W.1
Wang, X.2
Xuan, D.3
Lee, D.4
-
20
-
-
39049123320
-
On detecting camouflaging worm
-
Dec
-
W Yu, X. Wang, D. Xuan, and W. Zhao, "On detecting camouflaging worm," in Proc. of Annual Computer Security Applications Conference (ACSAC06), Dec. 2006.
-
(2006)
Proc. of Annual Computer Security Applications Conference (ACSAC06)
-
-
Yu, W.1
Wang, X.2
Xuan, D.3
Zhao, W.4
-
21
-
-
33646150900
-
On the performance of Internet worm scanning strategies
-
July
-
C. C. Zou, D. Towsley, and W Gong, "On the performance of Internet worm scanning strategies," Elsevier Journal of Performance Evaluation, vol. 63. no. 7, July 2006, pp. 700-723.
-
(2006)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
22
-
-
33646400816
-
Advanced routing worm and its security challenges
-
C. C. Zou, D. Towsley, W. Gong, and S. Cai, "Advanced routing worm and its security challenges," Simulation: Transactions of the Society for Modeling and Simulation International, vol. 82, no. 1, 2006, pp. 75-85.
-
(2006)
Simulation: Transactions of the Society for Modeling and Simulation International
, vol.82
, Issue.1
, pp. 75-85
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
Cai, S.4
-
23
-
-
67249087459
-
-
CAIDA
-
CAIDA, "Network telescope," http://www.caida.org/research/ security/telescope/.
-
Network telescope
-
-
-
25
-
-
62849126509
-
-
The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/data/passive/witty-worm-dataset.xml. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members.
-
The CAIDA Dataset on the Witty Worm - March 19-24, 2004, Colleen Shannon and David Moore, http://www.caida.org/data/passive/witty-worm-dataset.xml. Support for the Witty Worm Dataset and the UCSD Network Telescope are provided by Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members.
-
-
-
-
26
-
-
84869250111
-
-
Wikipedia, "Logistic function," http://en.wikipedia.org/wiki/ Logistic-function
-
Logistic function
-
-
|