-
1
-
-
72849124827
-
Fighting coordinated attackers with cross-organizational information sharing
-
M. Allman, E. Blanton, V. Paxson, and S. Shenker. Fighting coordinated attackers with cross-organizational information sharing. In Proc. HotNets, 2006.
-
(2006)
Proc. HotNets
-
-
Allman, M.1
Blanton, E.2
Paxson, V.3
Shenker, S.4
-
2
-
-
84890863223
-
A cooperative immunization system for an untrusting internet
-
K. Anagnostakis, M. Greenwald, S. Ioannidis, A. Keromytis, and D. Li. A cooperative immunization system for an untrusting Internet. In Proc. ICON, 2003.
-
(2003)
Proc. ICON
-
-
Anagnostakis, K.1
Greenwald, M.2
Ioannidis, S.3
Keromytis, A.4
Li., D.5
-
4
-
-
77954328143
-
-
CAIDA. http://www.caida.org, 2007.
-
(2007)
-
-
-
5
-
-
34248359555
-
A distributed host-based worm detection system
-
S. Cheetancheri, J. Agosta, D. Dash, K. Levitt, J. Rowe, and E. Schooler. A distributed host-based worm detection system. In Proc. LSAD, 2006.
-
(2006)
Proc. LSAD
-
-
Cheetancheri, S.1
Agosta, J.2
Dash, D.3
Levitt, K.4
Rowe, J.5
Schooler, E.6
-
6
-
-
0242529344
-
Aggregation and correlation of intrusion-detection alerts
-
H. Debar and A. Wespi. Aggregation and correlation of intrusion-detection alerts. In Proc. RAID, 2001.
-
(2001)
Proc. RAID
-
-
Debar, H.1
Wespi., A.2
-
8
-
-
77954320765
-
-
DShield. http://www.dshield.org, 2006.
-
(2006)
-
-
-
10
-
-
32144442476
-
-
Technical Report TR-CS-2004-2031, Dept. of Computer Science, University of New Mexico
-
V. King, S. Lewis, and J. Saia. On algorithms for choosing a random peer. Technical Report TR-CS-2004-2031, Dept. of Computer Science, University of New Mexico, 2005.
-
(2005)
On Algorithms for Choosing A Random Peer
-
-
King, V.1
Lewis, S.2
Saia, J.3
-
11
-
-
2442509056
-
Decentralized event correlation for intrusion detection
-
C. Krügel, T. Toth, and C. Kerer. Decentralized event correlation for intrusion detection. In Proc. ICISC, 2001.
-
(2001)
Proc. ICISC
-
-
Krügel, C.1
Toth, T.2
Kerer, C.3
-
12
-
-
34248379722
-
Towards scalable and robust distributed intrusion alert fusion with good load balancing
-
Z. Li, Y. Chen, and A. Beach. Towards scalable and robust distributed intrusion alert fusion with good load balancing. In Proc. LSAD, 2006.
-
(2006)
Proc. LSAD
-
-
Li, Z.1
Chen, Y.2
Beach, A.3
-
15
-
-
31844455702
-
Host-based detection of worms through peer-to-peer cooperation
-
D. Malan and M. Smith. Host-based detection of worms through peer-to-peer cooperation. In Proc. WORM, 2005.
-
(2005)
Proc. WORM
-
-
Malan, D.1
Smith, M.2
-
17
-
-
77954325602
-
-
myNetWatchman. http://www.mynetwatchman.com, 2006.
-
(2006)
-
-
-
18
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
A. Nambiar and M. Wright. Salsa: a structured approach to large-scale anonymity. In Proc. CCS, 2006.
-
(2006)
Proc. CCS
-
-
Nambiar, A.1
Wright, M.2
-
19
-
-
77954344208
-
-
p2psim. http://pdos.csail.mit.edu/p2psim/, 2005.
-
(2005)
-
-
-
20
-
-
34248345975
-
Privacy-preserving payload-based correlation for accurate malicious traffic detection
-
J. Parekh, K. Wang, and S. Stolfo. Privacy-preserving payload-based correlation for accurate malicious traffic detection. In Proc. LSAD, 2006.
-
(2006)
Proc. LSAD
-
-
Parekh, J.1
Wang, K.2
Stolfo, S.3
-
23
-
-
85137546697
-
Global intrusion detection in the DOMINO overlay system
-
V. Yegneswaran, P. Barford, and S. Jha. Global intrusion detection in the DOMINO overlay system. In Proc. NDSS, 2004.
-
(2004)
Proc. NDSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
|