-
1
-
-
49949094072
-
Traffic aggregation for malware detection
-
Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
-
Yen, T.-F., Reiter, M.K.: Traffic aggregation for malware detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 207-227. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 207-227
-
-
Yen, T.-F.1
Reiter, M.K.2
-
2
-
-
85084161026
-
-
Comer, D.E., Lin, J.C.: Probing TCP implementations. In: Proceedings of the USENIX Summer 1994 Technical Conference (June 1994)
-
Comer, D.E., Lin, J.C.: Probing TCP implementations. In: Proceedings of the USENIX Summer 1994 Technical Conference (June 1994)
-
-
-
-
4
-
-
0030609304
-
Automated packet trace analysis of TCP implementations
-
Paxson, V.: Automated packet trace analysis of TCP implementations. In: Proceedings of ACM SIGCOMM, pp. 167-179 (1997)
-
(1997)
Proceedings of ACM SIGCOMM
, pp. 167-179
-
-
Paxson, V.1
-
5
-
-
84984898291
-
Passive operating system identification from TCP/IP packet headers
-
Lippmann, R., Fried, D., Piwowarski, K., Streilein, W.: Passive operating system identification from TCP/IP packet headers. In: Proceedings of the ICDM Workshop on Data Mining for Computer Security (2003)
-
(2003)
Proceedings of the ICDM Workshop on Data Mining for Computer Security
-
-
Lippmann, R.1
Fried, D.2
Piwowarski, K.3
Streilein, W.4
-
6
-
-
35048886013
-
-
Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, 3015, pp. 158-167. Springer, Heidelberg (2004)
-
Beverly, R.: A robust classifier for passive TCP/IP fingerprinting. In: Barakat, C., Pratt, I. (eds.) PAM 2004. LNCS, vol. 3015, pp. 158-167. Springer, Heidelberg (2004)
-
-
-
-
7
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
August, 2005
-
Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: Proceedings of ACM SIGCOMM, August 2005, pp. 229-240 (2005)
-
(2005)
Proceedings of ACM SIGCOMM
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
8
-
-
33646890686
-
Traffic classification on the fly
-
Bernaille, L., Teixeira, R., Akodkenou, I., Soule, A., Salamatian, K.: Traffic classification on the fly. ACM SIGCOMM Computer Communication Review 36(2), 23-26 (2006)
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
9
-
-
33646932974
-
-
Hernandez-Campos, F., Nobel, A.B., Smith, F.D., Jeffay, K.: Understanding patterns of TCP connection usage with statistical clustering. In: Proceedings of 13th Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, September 2005, pp. 35-44 (2005)
-
Hernandez-Campos, F., Nobel, A.B., Smith, F.D., Jeffay, K.: Understanding patterns of TCP connection usage with statistical clustering. In: Proceedings of 13th Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, September 2005, pp. 35-44 (2005)
-
-
-
-
10
-
-
14944383480
-
-
Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, October 2004, pp. 135-148 (2004)
-
Roughan, M., Sen, S., Spatscheck, O., Duffield, N.: Class-of-service mapping for QoS: A statistical signature-based approach to IP traffic classification. In: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, October 2004, pp. 135-148 (2004)
-
-
-
-
11
-
-
48749130030
-
Traffic classification through simple statistical fingerprinting
-
Crotti, M., Dusi, M., Gringoli, F., Salgarelli, L.: Traffic classification through simple statistical fingerprinting. ACM SIGCOMM Computer Communication Review 37(1) (2007)
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.1
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
12
-
-
33750229702
-
Finding peer-to-peer file-sharing using coarse network behaviors
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Collins, M.P., Reiter, M.K.: Finding peer-to-peer file-sharing using coarse network behaviors. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 1-17. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 1-17
-
-
Collins, M.P.1
Reiter, M.K.2
-
14
-
-
24344442716
-
-
Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, 3431, pp. 41-54. Springer, Heidelberg (2005)
-
Moore, A.W., Papagiannaki, K.: Toward the accurate identification of network applications. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 41-54. Springer, Heidelberg (2005)
-
-
-
-
15
-
-
35348815604
-
-
Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International World Wide Web Conference (May 2007)
-
Erman, J., Mahanti, A., Arlitt, M., Williamson, C.: Identifying and discriminating between web and peer-to-peer traffic in the network core. In: Proceedings of the 16th International World Wide Web Conference (May 2007)
-
-
-
-
16
-
-
33845232198
-
-
Koukis, D., Antonatos, S., Anagnostakis, K.: On the privacy risks of publishing anonymized IP network traces. In: Proceedings of Communications and Multimedia Security, October 2006, pp. 22-32 (2006)
-
Koukis, D., Antonatos, S., Anagnostakis, K.: On the privacy risks of publishing anonymized IP network traces. In: Proceedings of Communications and Multimedia Security, October 2006, pp. 22-32 (2006)
-
-
-
-
17
-
-
70350688486
-
-
Coull, S.E., Wright, C.V., Monrose, F., Collins, M.P., Reiter, M.K.: Playing devil's advocate: Inferring sensitive information from anonymized network traces. In: Proceedings of the 2007 ISOC Network and Distributed System Security Symposium (February 2007)
-
Coull, S.E., Wright, C.V., Monrose, F., Collins, M.P., Reiter, M.K.: Playing devil's advocate: Inferring sensitive information from anonymized network traces. In: Proceedings of the 2007 ISOC Network and Distributed System Security Symposium (February 2007)
-
-
-
-
18
-
-
84937846451
-
-
Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On web browsing privacy in anonymized NetFlows. In: Proceedings of the 16th USENIX Security Symposium, August 2007, pp. 339-352 (2007)
-
Coull, S.E., Collins, M.P., Wright, C.V., Monrose, F., Reiter, M.K.: On web browsing privacy in anonymized NetFlows. In: Proceedings of the 16th USENIX Security Symposium, August 2007, pp. 339-352 (2007)
-
-
-
-
19
-
-
84899126047
-
-
Shankar, U., Paxson, V.: Active mapping: Resisting NIDS evasion without altering traffic. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
-
Shankar, U., Paxson, V.: Active mapping: Resisting NIDS evasion without altering traffic. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
-
-
-
-
22
-
-
0842288924
-
-
RFC 2724
-
Handelman, S., Stibler, S., Brownlee, N., Ruth, G.: New attributes for traffic flow measurement. RFC 2724 (1999)
-
(1999)
New attributes for traffic flow measurement
-
-
Handelman, S.1
Stibler, S.2
Brownlee, N.3
Ruth, G.4
-
23
-
-
3242743560
-
A framework for the evaluation of session reconstruction heuristics in web-usage analysis
-
Spiliopoulou, M., Mobasher, B., Berendt, B.: A framework for the evaluation of session reconstruction heuristics in web-usage analysis. INFORMS Journal on Computing 15(2) (2003)
-
(2003)
INFORMS Journal on Computing
, vol.15
, Issue.2
-
-
Spiliopoulou, M.1
Mobasher, B.2
Berendt, B.3
-
24
-
-
10444287344
-
PlanetLab: An overlay testbed for broad-coverage services
-
Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., Bowman, M.: PlanetLab: an overlay testbed for broad-coverage services. ACM SIGCOMM Computer Communication Review 33(3), 3-12 (2003)
-
(2003)
ACM SIGCOMM Computer Communication Review
, vol.33
, Issue.3
, pp. 3-12
-
-
Chun, B.1
Culler, D.2
Roscoe, T.3
Bavier, A.4
Peterson, L.5
Wawrzoniak, M.6
Bowman, M.7
-
27
-
-
70350644144
-
-
Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, 1398. Springer, Heidelberg (1998)
-
Joachims, T.: Text categorization with support vector machines: Learning with many relevant features. In: Nédellec, C., Rouveirol, C. (eds.) ECML 1998. LNCS, vol. 1398. Springer, Heidelberg (1998)
-
-
-
-
28
-
-
0030673582
-
-
Osuna, E., Freund, R., Girosit, F.: Training support vector machines: an application to face detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (June 1997)
-
Osuna, E., Freund, R., Girosit, F.: Training support vector machines: an application to face detection. In: Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition (June 1997)
-
-
-
-
29
-
-
85093872656
-
-
Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (April 2007)
-
Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets (April 2007)
-
-
-
-
30
-
-
33745442732
-
-
Gates, C., Becknel, B.: Host anomalies from network data. In: Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop (June 2005)
-
Gates, C., Becknel, B.: Host anomalies from network data. In: Proceedings of the 6th IEEE Systems, Man and Cybernetics Information Assurance Workshop (June 2005)
-
-
-
-
31
-
-
85075837457
-
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the USENIX Security Symposium (August 2008)
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the USENIX Security Symposium (August 2008)
-
-
-
-
32
-
-
38149070087
-
-
Collins, M.P., Reiter, M.K.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, 4637, pp. 276-295. Springer, Heidelberg (2007)
-
Collins, M.P., Reiter, M.K.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 276-295. Springer, Heidelberg (2007)
-
-
-
-
33
-
-
70350672890
-
-
Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling internet backbone traffic: Behavior models and applications. In: Proceedings of ACM SIGCOMM (August 2005)
-
Xu, K., Zhang, Z., Bhattacharyya, S.: Profiling internet backbone traffic: Behavior models and applications. In: Proceedings of ACM SIGCOMM (August 2005)
-
-
-
-
34
-
-
24344488334
-
-
Aiello, W., Kalmanek, C., McDaniel, P., Sen, S., Spatscheck, O., Van der Merwe, J.E.: Analysis of communities of interest in data networks. In: Dovrolis, C. (ed.) PAM 2005. LNCS, 3431, pp. 83-96. Springer, Heidelberg (2005)
-
Aiello, W., Kalmanek, C., McDaniel, P., Sen, S., Spatscheck, O., Van der Merwe, J.E.: Analysis of communities of interest in data networks. In: Dovrolis, C. (ed.) PAM 2005. LNCS, vol. 3431, pp. 83-96. Springer, Heidelberg (2005)
-
-
-
|