-
1
-
-
42149134786
-
-
A brief history of scanning, and, editors, ACM
-
Mark Allman, Vern Paxson, and Jeff Terrell. A brief history of scanning. In Constantine Dovrolis and Matthew Roughan, editors, Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement 2007, San Diego, California, USA, October 2426, 2007, pages 77-82. ACM, 2007.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement 2007, San Diego, California, USA, October 2426, 2007
, pp. 77-82
-
-
Allman, M.1
Paxson, V.2
Terrell, J.3
-
2
-
-
55149113904
-
-
S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. Ioannidis, and E.P. Markatos. Honey@home: A new approach to largescale threat monitoring. Information Security Threats Data Collection and Sharing, WOMBAT Workshop on, 0:3-16, 2008.
-
S. Antonatos, M. Athanatos, G. Kondaxis, J. Velegrakis, N. Hatzibodozis, S. Ioannidis, and E.P. Markatos. Honey@home: A new approach to largescale threat monitoring. Information Security Threats Data Collection and Sharing, WOMBAT Workshop on, 0:3-16, 2008.
-
-
-
-
4
-
-
67649453705
-
-
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, and Philip Nobles. Searching for Optimal IDS Sensor Placement. Under Review
-
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, and Philip Nobles. Searching for Optimal IDS Sensor Placement. Under Review.
-
-
-
-
6
-
-
67649428281
-
-
Howard Chivers, Siraj. A. Shaikh, Philip Nobles, John A. Clark, and Hao Chen. Accumulating evidence of insider attacks. The First International Workshop on Managing Insider Security Threats, held in conjunction with Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), West Lafayette, USA, June 15-19, 2009. To Appear.
-
Howard Chivers, Siraj. A. Shaikh, Philip Nobles, John A. Clark, and Hao Chen. Accumulating evidence of insider attacks. The First International Workshop on Managing Insider Security Threats, held in conjunction with Third IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2009), West Lafayette, USA, June 15-19, 2009. To Appear.
-
-
-
-
7
-
-
14844312929
-
-
Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. Operational experiences with high-network intrusion detection. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 2529, 2004, pages 2-11, ACM, 2004.
-
Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. Operational experiences with high-volume network intrusion detection. In Vijayalakshmi Atluri, Birgit Pfitzmann, and Patrick Drew McDaniel, editors, Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 2529, 2004, pages 2-11, ACM, 2004.
-
-
-
-
8
-
-
56549129238
-
Predicting the resource consumption of network intrusion detection systems
-
Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 1517, 2008. Proceedings, of, Springer
-
Holger Dreger, Anja Feldmann, Vern Paxson, and Robin Sommer. Predicting the resource consumption of network intrusion detection systems. In Richard Lippmann, Engin Kirda, and Ari Trachtenberg, editors, Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 1517, 2008. Proceedings, volume 5230 of Lecture Notes in Computer Science, pages 135-154. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5230
, pp. 135-154
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
9
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling. Computers and Communications
-
Carrie Gates, Joshua J. McNutt, Joseph B. Kadane, and Marc I. Kellner. Scan detection on very large networks using logistic regression modeling. Computers and Communications, IEEE Symposium on, 0:402-408, 2006.
-
(2006)
IEEE Symposium on
, vol.0
, pp. 402-408
-
-
Gates, C.1
McNutt, J.J.2
Kadane, J.B.3
Kellner, M.I.4
-
10
-
-
34248574593
-
The mechanics of lawful interception
-
Gleave S. The mechanics of lawful interception. Network Security 5 2007 (May 2007) 8-11
-
(2007)
Network Security
, vol.5
, Issue.2007
, pp. 8-11
-
-
Gleave, S.1
-
11
-
-
67650317025
-
-
Jose M. González, Vern Paxson, and Nicholas Weaver. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors, Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 2831, 2007, pages 139-149. ACM, 2007.
-
Jose M. González, Vern Paxson, and Nicholas Weaver. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. In Peng Ning, Sabrina De Capitani di Vimercati, and Paul F. Syverson, editors, Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 2831, 2007, pages 139-149. ACM, 2007.
-
-
-
-
12
-
-
39049104457
-
Practical attack graph generation for network defense
-
Kyle Ingols, Richard Lippmann, and Keith Piwowarski. Practical attack graph generation for network defense. In 22nd Annual Computer Security Applications Conference, 2006. ACSAC '06, pages 121-130, 2006.
-
(2006)
22nd Annual Computer Security Applications Conference, 2006. ACSAC '06
, pp. 121-130
-
-
Ingols, K.1
Lippmann, R.2
Piwowarski, K.3
-
14
-
-
0036090464
-
Using internal sensors and embedded detectors for intrusion detection
-
Kerschbaum F., Spafford E.H., and Zamboni D. Using internal sensors and embedded detectors for intrusion detection. Journal of Computer Security 10 1/2 (2002) 23-70
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 23-70
-
-
Kerschbaum, F.1
Spafford, E.H.2
Zamboni, D.3
-
15
-
-
0036088115
-
Stateful Intrusion Detection for High-Speed Networks
-
Oakland, CA, May, IEEE Press
-
Christopher Kruegel, Fredrik Valeur, Giovanni Vigna, and Richard Kemmerer. Stateful Intrusion Detection for High-Speed Networks. In Proceedings of the IEEE Symposium on Security and Privacy, pages 285-293, Oakland, CA, May 2002. IEEE Press.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 285-293
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
16
-
-
34047168454
-
An annotated review of past papers on attack graphs
-
Technical Report ESCTR2005054, MIT Lincoln Laboratory, Lexington, MA
-
R. P. Lippmann and K. W. Ingols. An annotated review of past papers on attack graphs. Technical Report ESCTR2005054, MIT Lincoln Laboratory, Lexington, MA, 2005.
-
(2005)
-
-
Lippmann, R.P.1
Ingols, K.W.2
-
17
-
-
14944369649
-
-
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry L. Peterson. Characteristics of internet background radiation. In Alfio Lombardo and James F. Kurose, editors, Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004, Taormina, Sicily, Italy, October 2527, 2004, pages 27-40. ACM, 2004.
-
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry L. Peterson. Characteristics of internet background radiation. In Alfio Lombardo and James F. Kurose, editors, Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement 2004, Taormina, Sicily, Italy, October 2527, 2004, pages 27-40. ACM, 2004.
-
-
-
-
18
-
-
85091893445
-
Rethinking hardware support for network analysis and intrusion prevention
-
July 31st
-
V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer, and N. Weaver. Rethinking hardware support for network analysis and intrusion prevention. In Proceedings of the 1st USENIX Workshop on Hot Topics in Security, July 31st 2006, pages 63-68, 2006.
-
(2006)
Proceedings of the 1st USENIX Workshop on Hot Topics in Security
, pp. 63-68
-
-
Paxson, V.1
Asanovic, K.2
Dharmapurikar, S.3
Lockwood, J.4
Pang, R.5
Sommer, R.6
Weaver, N.7
-
19
-
-
0033280865
-
A high-performance network intrusion detection system
-
ACM Press
-
R. Sekar, Y. Guang, S. Verma, and T. Shanbhag. A high-performance network intrusion detection system. In ACM Conference on Computer and Communications Security, pages 8-17. ACM Press, 1999.
-
(1999)
ACM Conference on Computer and Communications Security
, pp. 8-17
-
-
Sekar, R.1
Guang, Y.2
Verma, S.3
Shanbhag, T.4
-
20
-
-
67649436551
-
-
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Hao Chen, and John A. Clark. A deployment value model for intrusion detection sensors. The 3rd International Conference on Information Security and Assurance, June 25-27, 2009, Seoul, Korea. 5576 of the LNCS. Pages 250259. Springer.
-
Siraj A. Shaikh, Howard Chivers, Philip Nobles, Hao Chen, and John A. Clark. A deployment value model for intrusion detection sensors. The 3rd International Conference on Information Security and Assurance, June 25-27, 2009, Seoul, Korea. Volume 5576 of the LNCS. Pages 250259. Springer.
-
-
-
-
21
-
-
51549087756
-
Characterising intrusion detection sensors
-
Shaikh S.A., Chivers H., Nobles P., Clark J.A., and Chen H. Characterising intrusion detection sensors. Network Security 2008 9 (September 2008) 10-12
-
(2008)
Network Security
, vol.2008
, Issue.9
, pp. 10-12
-
-
Shaikh, S.A.1
Chivers, H.2
Nobles, P.3
Clark, J.A.4
Chen, H.5
-
26
-
-
55349101217
-
Optimal ids sensor placement and alert prioritization using attack graphs
-
Noel S., and Jajodia S. Optimal ids sensor placement and alert prioritization using attack graphs. Journal of Network and Systems Management 16 3 (September 2008) 259-275
-
(2008)
Journal of Network and Systems Management
, vol.16
, Issue.3
, pp. 259-275
-
-
Noel, S.1
Jajodia, S.2
-
27
-
-
84953403259
-
A formal approach to sensor placement and configuration in a network intrusion detection system
-
ACM Press, May
-
M. Rolando, M. Rossi, N. Sanarico, and D. Mandrioli. A formal approach to sensor placement and configuration in a network intrusion detection system. In Proceedings of the 2006 International Workshop on Software Engineering for Systems, pages 65-71. ACM Press, May 2006.
-
(2006)
Proceedings of the 2006 International Workshop on Software Engineering for Systems
, pp. 65-71
-
-
Rolando, M.1
Rossi, M.2
Sanarico, N.3
Mandrioli, D.4
-
28
-
-
0036083194
-
Automated generation and analysis of attack graphs
-
May
-
O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing. Automated generation and analysis of attack graphs. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 273-284, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 273-284
-
-
Sheyner, O.1
Haines, J.2
Jha, S.3
Lippmann, R.4
Wing, J.M.5
-
29
-
-
0033718255
-
Using model checking to analyze network vulnerabilities
-
IEEE Computer Society
-
R. W. Ritchey and P. Ammann. Using model checking to analyze network vulnerabilities. In IEEE Symposium on Security and Privacy, pages 156-165. IEEE Computer Society, 2000.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 156-165
-
-
Ritchey, R.W.1
Ammann, P.2
-
30
-
-
33750288536
-
Ranking attack graphs
-
V. Mehta, C. Bartzis, H. Zhu, E. Clarke, and J. Wing. Ranking attack graphs. In Proceedings of Recent Advances in Intrusion Detection, volume LNCS 4219, pages 127-144, 2006.
-
(2006)
Proceedings of Recent Advances in Intrusion Detection
, vol.LNCS 4219
, pp. 127-144
-
-
Mehta, V.1
Bartzis, C.2
Zhu, H.3
Clarke, E.4
Wing, J.5
|