-
1
-
-
85012236181
-
A framework for clustering evolving data streams
-
C. Aggarwal, J. Han, J. Wang, and P. S. Yu. A framework for clustering evolving data streams. In Proc. of the 29th VLDB, volume 29, pages 81-92, 2003.
-
(2003)
Proc. of the 29th VLDB
, vol.29
, pp. 81-92
-
-
Aggarwal, C.1
Han, J.2
Wang, J.3
Yu, P.S.4
-
2
-
-
46749118452
-
Dynamic load balancing for network intrusion detection systems based on distributed architectures
-
July
-
M. Andreolini, S. Casolari, M. Colajanni, and M. Marchetti. Dynamic load balancing for network intrusion detection systems based on distributed architectures. In NCA '07: Proceedings of the Sixth IEEE Symposium on Network Computing and Applications, pages 153-160, July 2007.
-
(2007)
NCA '07: Proceedings of the Sixth IEEE Symposium on Network Computing and Applications
, pp. 153-160
-
-
Andreolini, M.1
Casolari, S.2
Colajanni, M.3
Marchetti, M.4
-
5
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
June
-
E. Cooke, F. Jahanian, and D. Mcpherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), pages 39-44, June 2005.
-
(2005)
Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
Mcpherson, D.3
-
6
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
New York, NY, USA, ACM
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational experiences with high-volume network intrusion detection. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 2-11, New York, NY, USA, 2004. ACM.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
7
-
-
67650317025
-
Shunting: A hardware/software architecture for flexible, high-performance network intrusion prevention
-
New York, NY, USA, ACM
-
J. M. Gonzalez, V. Paxson, and N. Weaver. Shunting: a hardware/software architecture for flexible, high-performance network intrusion prevention. In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 139-149, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 139-149
-
-
Gonzalez, J.M.1
Paxson, V.2
Weaver, N.3
-
8
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In SP '04: Proceedings of the 2004 IEEE Symposium on Security and Privacy, pages 211-225, May 2004.
-
(2004)
SP '04: Proceedings of the 2004 IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
10
-
-
0036088115
-
Stateful intrusion detection for high-speed networks
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful intrusion detection for high-speed networks. In Proc. of the IEEE SSP'02, pages 285-293, 2002.
-
(2002)
Proc. of the IEEE SSP'02
, pp. 285-293
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
11
-
-
70249135196
-
-
Libpcap, http://www.tcpdump.org/.
-
Libpcap
-
-
-
12
-
-
84962260018
-
Evaluating intrusion detection systems: The 1998 darpa off-line intrusion detection evaluation
-
R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham, and M. Zissman. Evaluating intrusion detection systems: the 1998 darpa off-line intrusion detection evaluation. In DISCEX '00: Proceedings of DARPA Information Survivability Conference and Exposition, 2000, pages 12-26, 2000.
-
(2000)
DISCEX '00: Proceedings of DARPA Information Survivability Conference and Exposition
, pp. 12-26
-
-
Lippmann, R.1
Fried, D.2
Graf, I.3
Haines, J.4
Kendall, K.5
McClung, D.6
Weber, D.7
Webster, S.8
Wyschogrod, D.9
Cunningham, R.10
Zissman, M.11
-
13
-
-
84944222170
-
Analysis and results of the 1999 darpa off-line intrusion detection evaluation
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das. Analysis and results of the 1999 darpa off-line intrusion detection evaluation. In Recent Advances in Intrusion Detection, pages 162-182, 2000.
-
(2000)
Recent Advances in Intrusion Detection
, pp. 162-182
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
14
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
J. McHugh. Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Transactions on Information and System Security, 3(4):262-294, 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
17
-
-
70249124870
-
-
Network traces, http://pma.nlanr.net/Special/auck8.html.
-
Network traces
-
-
-
19
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
Amsterdam, Netherlands
-
V. Paxson. Bro: a system for detecting network intruders in real-time. Computer Networks (Amsterdam, Netherlands: 1999), 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
21
-
-
85090433665
-
Snort - lightweight intrusion detection for networks
-
Berkeley, CA, USA, USENIX Association
-
M. Roesch. Snort - lightweight intrusion detection for networks. In LISA '99: Proceedings of the 13th USENIX conference on System administration, pages 229-238, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
LISA '99: Proceedings of the 13th USENIX conference on System administration
, pp. 229-238
-
-
Roesch, M.1
-
24
-
-
84894426674
-
-
Tcpreplay, http://tcpreplay.synfin.net/trac/.
-
Tcpreplay
-
-
-
25
-
-
65249090163
-
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
-
Queensland, Australia, Sept
-
M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware. In Proc. of the Symp. on RAID'07, Queensland, Australia, Sept. 2007.
-
(2007)
Proc. of the Symp. on RAID'07
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
-
26
-
-
12244311689
-
A taxonomy of computer worms
-
New York, NY, USA, ACM
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A taxonomy of computer worms. In WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode, pages 11-18, New York, NY, USA, 2003. ACM.
-
(2003)
WORM '03: Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
28
-
-
32844469998
-
An active splitter architecture for intrusion detection and prevention
-
Mar
-
K. Xinidis, I. Charitakis, S. Antonatos, K. G. Anagnostakis, and E. P. Markatos. An active splitter architecture for intrusion detection and prevention. IEEE Transactions on Dependable and Secure Computing, 3(1):31-44, Mar. 2006.
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 31-44
-
-
Xinidis, K.1
Charitakis, I.2
Antonatos, S.3
Anagnostakis, K.G.4
Markatos, E.P.5
|