-
1
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
Berkeley, CA, USA: USENIX Association
-
H.-A. Kim and B. Karp, "Autograph: toward automated, distributed worm signature detection," in SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2004, pp. 19-19.
-
(2004)
SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 19-19
-
-
Kim, H.-A.1
Karp, B.2
-
2
-
-
26844466732
-
Fast detection of scanning worm infections
-
France, September
-
S. Schechter, J. Jung, and A. W. Berger, "Fast detection of scanning worm infections," in 7th International Symposium on Recent Advances in Intrusion Detection (RAID), French Riviera, France, September 2004.
-
(2004)
7th International Symposium on Recent Advances in Intrusion Detection (RAID), French Riviera
-
-
Schechter, S.1
Jung, J.2
Berger, A.W.3
-
3
-
-
1242287724
-
A framework for classifying denial of service attacks
-
New York, NY, USA: ACM
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM, 2003, pp. 99-110.
-
(2003)
SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
4
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
5
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
New York, NY, USA: ACM
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash crowds and denial of service attacks: characterization and implications for cdns and web sites," in WWW '02: Proceedings of the 11th international conference on World Wide Web. New York, NY, USA: ACM, 2002, pp. 293-304.
-
(2002)
WWW '02: Proceedings of the 11th international conference on World Wide Web
, pp. 293-304
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
6
-
-
44049086375
-
Practical darknet measurement
-
March
-
M. Bailey, E. Cooke, F. Jahanian, A. Myrick, and S. Sinha, "Practical darknet measurement," Information Sciences and Systems, 2006 40th Annual Conference on, pp. 1496-1501, March 2006.
-
(2006)
Information Sciences and Systems, 2006 40th Annual Conference on
, pp. 1496-1501
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
7
-
-
28044457069
-
-
University of California, San Diego, Tech. Rep, July
-
D. Moore, C. Shannon, G. M. Voelker, and S. Savage., "Network telescopes," University of California, San Diego, Tech. Rep., July 2004.
-
(2004)
Network telescopes
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
8
-
-
62949203848
-
-
M. Bailey, E. Cooke, F. Jahanian, and J. Nazario, The internet motion sensor - a distributed blackhole monitoring system, in NDSS, 2005.
-
M. Bailey, E. Cooke, F. Jahanian, and J. Nazario, "The internet motion sensor - a distributed blackhole monitoring system," in NDSS, 2005.
-
-
-
-
9
-
-
14944369649
-
Characteristics of internet background radiation
-
New York, NY, USA: ACM
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of internet background radiation," in IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. New York, NY, USA: ACM, 2004, pp. 27-40.
-
(2004)
IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
10
-
-
34250315640
-
An overview of anomaly detection techniques: Existing solutions and latest technological trends
-
A. Patcha and J.-M. Park, "An overview of anomaly detection techniques: Existing solutions and latest technological trends," Comput. Netw., vol. 51, no. 12, pp. 3448-3470, 2007.
-
(2007)
Comput. Netw
, vol.51
, Issue.12
, pp. 3448-3470
-
-
Patcha, A.1
Park, J.-M.2
-
11
-
-
0036038437
-
Service specific anomaly detection for network intrusion detection
-
New York, NY, USA: ACM
-
C. Krugel, T. Toth, and E. Kirda, "Service specific anomaly detection for network intrusion detection," in SAC '02: Proceedings of the 2002 ACM symposium on Applied computi ng. New York, NY, USA: ACM, 2002, pp. 201-208.
-
(2002)
SAC '02: Proceedings of the 2002 ACM symposium on Applied computi ng
, pp. 201-208
-
-
Krugel, C.1
Toth, T.2
Kirda, E.3
-
12
-
-
4344659702
-
Anomaly detection methods in wired networks: A survey and taxonomy
-
Oct
-
J. M. Estevez-Tapiador, P. Garcia-Teodoro, and J. E. Diaz-Verdejo, "Anomaly detection methods in wired networks: a survey and taxonomy," Computer Communications, vol. 27, no. 16, pp. 1569-1584, Oct. 2004.
-
(2004)
Computer Communications
, vol.27
, Issue.16
, pp. 1569-1584
-
-
Estevez-Tapiador, J.M.1
Garcia-Teodoro, P.2
Diaz-Verdejo, J.E.3
-
13
-
-
0041534324
-
Characteristics of network traffic flow anomalies
-
New York, NY, USA: ACM
-
P. Barford and D. Plonka, "Characteristics of network traffic flow anomalies," in IMW '01: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement. New York, NY, USA: ACM, 2001, pp. 69-73.
-
(2001)
IMW '01: Proceedings of the 1st ACM SIGCOMM Workshop on Internet Measurement
, pp. 69-73
-
-
Barford, P.1
Plonka, D.2
-
14
-
-
0037333205
-
Computer intrusion detection through ewma for autocorrelated and uncorrelated data, Reliability
-
March
-
N. Ye, S. Vilbert, and Q. Chen, "Computer intrusion detection through ewma for autocorrelated and uncorrelated data," Reliability, IEEE Transactions on, vol. 52, no. 1, pp. 75-82, March 2003.
-
(2003)
IEEE Transactions on
, vol.52
, Issue.1
, pp. 75-82
-
-
Ye, N.1
Vilbert, S.2
Chen, Q.3
-
15
-
-
45749141660
-
Statistical techniques for detecting traffic anomalies through packet header data
-
June
-
S. S. Kim and A. L. N. Reddy, "Statistical techniques for detecting traffic anomalies through packet header data," Networking, IEEE/ACM Transactions on, vol. 16, no. 3, pp. 562-575, June 2008.
-
(2008)
Networking, IEEE/ACM Transactions on
, vol.16
, Issue.3
, pp. 562-575
-
-
Kim, S.S.1
Reddy, A.L.N.2
-
16
-
-
33947507304
-
On scalable attack detection in the network
-
R. R. Kompella, S. Singh, and G. Varghese, "On scalable attack detection in the network," IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 14-25, 2007.
-
(2007)
IEEE/ACM Trans. Netw
, vol.15
, Issue.1
, pp. 14-25
-
-
Kompella, R.R.1
Singh, S.2
Varghese, G.3
-
17
-
-
33947171900
-
A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods
-
Sept
-
A. Tartakovsky, B. Rozovskii, R. Blazek, and H. Kim, "A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods," Signal Processing, IEEE Transactions on, vol. 54, no. 9, pp. 3372-3382, Sept. 2006.
-
(2006)
Signal Processing, IEEE Transactions on
, vol.54
, Issue.9
, pp. 3372-3382
-
-
Tartakovsky, A.1
Rozovskii, B.2
Blazek, R.3
Kim, H.4
-
18
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
New York, NY, USA: ACM
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho, "Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures," in LSAD '07: Proceedings of the 2007 workshop on Large scale attack defense. New York, NY, USA: ACM, 2007, pp. 145-152.
-
(2007)
LSAD '07: Proceedings of the 2007 workshop on Large scale attack defense
, pp. 145-152
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
19
-
-
0043166339
-
Anomaly detection in ip networks
-
Aug
-
M. Thottan and C. Ji, "Anomaly detection in ip networks," Signal Processing, IEEE Transactions on, vol. 51, no. 8, pp. 2191-2204, Aug. 2003.
-
(2003)
Signal Processing, IEEE Transactions on
, vol.51
, Issue.8
, pp. 2191-2204
-
-
Thottan, M.1
Ji, C.2
-
20
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
A. Lakhina, M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," SIGCOMM Comput. Commun, Rev., vol. 34, no. 4, pp. 219-230, 2004.
-
(2004)
SIGCOMM Comput. Commun, Rev
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
21
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
New York, NY, USA: ACM
-
P. Barford, J. Kline, D. Plonka, and A. Ron, "A signal analysis of network traffic anomalies," in IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. New York, NY, USA: ACM, 2002, pp. 71-82.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
, pp. 71-82
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
22
-
-
33751110003
-
Wavelet based denial-of-service detection
-
Nov
-
G. Carl, R. R. Brooks, and S. Rai, "Wavelet based denial-of-service detection," Computers & Security, vol. 25, no. 8, pp. 600-615, Nov. 2006.
-
(2006)
Computers & Security
, vol.25
, Issue.8
, pp. 600-615
-
-
Carl, G.1
Brooks, R.R.2
Rai, S.3
-
23
-
-
35148840623
-
Detecting denial-of-service attacks using the wavelet transform
-
M. Hamdi and N. Boudriga, "Detecting denial-of-service attacks using the wavelet transform," Comput. Commun., vol. 30, no. 16, pp. 3203-3213, 2007.
-
(2007)
Comput. Commun
, vol.30
, Issue.16
, pp. 3203-3213
-
-
Hamdi, M.1
Boudriga, N.2
-
24
-
-
33847616076
-
Wavelet analysis method for detection of DDoS attack on the basis of self-similarity
-
March
-
R. Xunyi, W. Ruchuan, and W. Haiyan, "Wavelet analysis method for detection of DDoS attack on the basis of self-similarity," Frontiers of Electrical and Electronic Engineering in China, vol. 2, no. 1, pp. 73-77, March 2007.
-
(2007)
Frontiers of Electrical and Electronic Engineering in China
, vol.2
, Issue.1
, pp. 73-77
-
-
Xunyi, R.1
Ruchuan, W.2
Haiyan, W.3
-
25
-
-
49649105240
-
-
W. Lu, M. Tavallaee, and A. A. Ghorbani, Detecting network anomalies using different wavelet basis functions, cnsr, 0, pp. 149-156, 2008.
-
W. Lu, M. Tavallaee, and A. A. Ghorbani, "Detecting network anomalies using different wavelet basis functions," cnsr, vol. 0, pp. 149-156, 2008.
-
-
-
-
26
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
New York, NY, USA: ACM
-
D. Moore, C. Shannon, and K. Claffy, "Code-red: a case study on the spread and victims of an internet worm," in IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. New York, NY, USA: ACM, 2002, pp. 273-284.
-
(2002)
IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment
, pp. 273-284
-
-
Moore, D.1
Shannon, C.2
Claffy, K.3
|