-
3
-
-
28044442580
-
HoneyStat: Local worm detection using honeypots
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen, "HoneyStat: Local Worm Detection Using Honeypots," Recent Advances in Intrusion Detection (RAID'04). 2004.
-
(2004)
Recent Advances in Intrusion Detection (RAID'04)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
6
-
-
85084163246
-
Autograph: Toward automated, distributed worm signature detection
-
H.-A. Kim, and B. Karp, "Autograph: Toward Automated, Distributed Worm Signature Detection," 13th USENIX Security Symposium. 2004.
-
(2004)
13th USENIX Security Symposium
-
-
Kim, H.-A.1
Karp, B.2
-
7
-
-
70349123823
-
-
LBNL/ICSI Enterprise Tracing Project
-
LBNL/ICSI Enterprise Tracing Project. http://www.icir.org/enterprise- tracing/index.html
-
-
-
-
8
-
-
70349102558
-
-
MAWI Working Group Traffic Archive
-
MAWI Working Group Traffic Archive. http://tracer.csl.sony.co.jp/mawi/
-
-
-
-
9
-
-
35148816044
-
Benchmarks for ddos defense evaluation
-
October
-
J. Mirkovic, E. Arikan, S. Wei, S. Fahmy, R. Thomas, and P. Reiher, "Benchmarks for DDoS Defense Evaluation," Proc. of the Milcom 2006, October 2006.
-
(2006)
Proc. of the Milcom 2006
-
-
Mirkovic, J.1
Arikan, E.2
Wei, S.3
Fahmy, S.4
Thomas, R.5
Reiher, P.6
-
10
-
-
14344253939
-
Network telescopes: Observing small or distant security events
-
D. Moore, "Network Telescopes: Observing Small or Distant Security Events," 11th USENIX Security Symposium. 2002.
-
(2002)
11th USENIX Security Symposium
-
-
Moore, D.1
-
11
-
-
24644432749
-
Proactively detecting ddos attack using source IP address monitoring
-
T. Peng, C. Leckie, and R. Kotagiri, "Proactively Detecting DDoS Attack Using Source IP Address Monitoring," Lecture Notes in Computer Science, vol.3042, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3042
-
-
Peng, T.1
Leckie, C.2
Kotagiri, R.3
-
12
-
-
70349146730
-
-
Proactive
-
Proactive. Wikipedia. http://en.wikipedia.org/wiki/Proactive
-
-
-
-
14
-
-
35048831757
-
Fast detection of scanning worm infections
-
Springer
-
S.Schechter, J.Jung, and A.W.Berger, "Fast Detection of Scanning Worm Infections," Lecture Notes in Computer Science, Springer, vol.3224, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3224
-
-
Schechter, S.1
Jung, J.2
Berger, A.W.3
-
15
-
-
70349140129
-
A multi-resolution approach for worm detection and containment
-
V.Sekar, Y.Xie, M.K.Reiter, and H.Zhang, "A Multi-Resolution Approach for Worm Detection and Containment," Proc. of IEEE/IFIP DSN'06, 2006.
-
(2006)
Proc. of IEEE/IFIP DSN'06
-
-
Sekar, V.1
Xie, Y.2
Reiter, M.K.3
Zhang, H.4
-
16
-
-
84991765629
-
Automatic worm fingerprinting
-
S.Singh, C.Estan, G.Varghese, and S.Savage, "Automatic worm fingerprinting," Operating Systems Design and Implementation (OSDI'04), 2004.
-
(2004)
Operating Systems Design and Implementation (OSDI'04)
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
17
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney, "Practical Automated Detection of Stealthy Portscans," Journal of Computer Security, vol.10, no.1, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1
-
-
Staniford, S.1
Hoagland, J.2
McAlerney, J.3
-
19
-
-
85112686126
-
New streaming algorithms for fast detection of superspreaders
-
S. Venkataraman, D. Song, P.B. Gibbons, and A. Blum, "New Streaming Algorithms for Fast Detection of Superspreaders," Proc. of Network and Distributed System Security Symposium, 2005.
-
(2005)
Proc. of Network and Distributed System Security Symposium
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.B.3
Blum, A.4
-
20
-
-
84882630810
-
Very fast containment of scanning worms, Revisited
-
Malware Detection, Springer
-
N. Weaver, S. Staniford, and V. Paxson, "Very fast containment of scanning worms, Revisited," Advances in Information Security, vol.27. Malware Detection, Springer, 2007.
-
(2007)
Advances in Information Security
, vol.27
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
22
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Las Vegas, Nevada
-
M. Williamson, "Throttling Viruses: Restricting propagation to defeat malicious mobile code," Proc. of ACSAC Security Conference, Las Vegas, Nevada, 2002.
-
(2002)
Proc. of ACSAC Security Conference
-
-
Williamson, M.1
-
23
-
-
70349091088
-
Malware evolution: A snapshot of threats and countermeasures in 2005
-
Springer
-
B. Witten, and C. Nachenberg, "Malware Evolution: A Snapshot of Threats and Countermeasures in 2005," Malware Detection, Springer, 2007.
-
Malware Detection
, vol.2007
-
-
Witten, B.1
Nachenberg, C.2
-
24
-
-
33745667977
-
Empirical analysis of rate limiting mechanisms
-
Springer
-
C.Wong, S.Bielski, A.Studer, and C.Wang, "Empirical Analysis of Rate Limiting Mechanisms," Lecture Notes in Computer Science, Springer, vol.3858, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.3858
-
-
Wong, C.1
Bielski, S.2
Studer, A.3
Wang, C.4
|