-
1
-
-
70450255903
-
-
aMule. http://www.amule.org, August 2008.
-
aMule. http://www.amule.org, August 2008.
-
-
-
-
2
-
-
47349121919
-
Netfilter's connection tracking system
-
P. Ayuso. Netfilter's connection tracking system. LOGIN;, The USENIX magazine, 32(3):34-39, 2006.
-
(2006)
LOGIN;, The USENIX magazine
, vol.32
, Issue.3
, pp. 34-39
-
-
Ayuso, P.1
-
3
-
-
84947916381
-
An Active Traffic Splitter Architecture for Intrusion Detection
-
I. Charitakis, K. Anagnostakis, and E. Markatos. An Active Traffic Splitter Architecture for Intrusion Detection. In MASCOTS 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems, pages 238-241, 2003.
-
(2003)
MASCOTS 2003, 11th IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer Telecommunications Systems
, pp. 238-241
-
-
Charitakis, I.1
Anagnostakis, K.2
Markatos, E.3
-
4
-
-
85127990219
-
Intrusion Detection in Wireless Mesh Networks
-
T. Chen, G. Kuo, Z. Li, and G. Zhu. Intrusion Detection in Wireless Mesh Networks. Security in Wireless Mesh Networks, page 145, 2008.
-
(2008)
Security in Wireless Mesh Networks
, pp. 145
-
-
Chen, T.1
Kuo, G.2
Li, Z.3
Zhu, G.4
-
5
-
-
70450247807
-
-
Conficker Worm. http://www.symantec.com/security-response/writeup.jsp? docid=2008-123015-3826-99, December 2008.
-
Conficker Worm. http://www.symantec.com/security-response/writeup.jsp? docid=2008-123015-3826-99, December 2008.
-
-
-
-
6
-
-
70450246062
-
-
A. Decker, D. Sancho, L. Kharouni, M. Goncharov, and R. McArdle. Pushdo/Cutwail Botnet. http://us.trendmicro.com/imperia/md/content/us/pdf/ threats/securitylibrary/study-of-pushdo.pdf, July 2009.
-
A. Decker, D. Sancho, L. Kharouni, M. Goncharov, and R. McArdle. Pushdo/Cutwail Botnet. http://us.trendmicro.com/imperia/md/content/us/pdf/ threats/securitylibrary/study-of-pushdo.pdf, July 2009.
-
-
-
-
7
-
-
33847131280
-
Improving Passive Packet Capture: Beyond Device Polling
-
L. Deri. Improving Passive Packet Capture: Beyond Device Polling. Proceedings of SANE, 2004, 2004.
-
(2004)
Proceedings of SANE
, vol.2004
-
-
Deri, L.1
-
8
-
-
14844312929
-
Operational Experiences with High-Volume Network Intrusion Detection
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer. Operational Experiences with High-Volume Network Intrusion Detection. Proceedings of the 11th ACM conference on Computer and communications security, pages 2-11, 2004.
-
(2004)
Proceedings of the 11th ACM conference on Computer and communications security
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
9
-
-
47649097039
-
Deploying Rural Community Wireless Mesh Networks
-
J. Ishmael, S. Bury, D. Pezaros, and N. Race. Deploying Rural Community Wireless Mesh Networks. IEEE Internet Computing, 12(4):22-29, 2008.
-
(2008)
IEEE Internet Computing
, vol.12
, Issue.4
, pp. 22-29
-
-
Ishmael, J.1
Bury, S.2
Pezaros, D.3
Race, N.4
-
11
-
-
0036088115
-
Stateful Intrusion Detection for High-Speed Networks
-
C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful Intrusion Detection for High-Speed Networks. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, pages 285-293, 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 285-293
-
-
Kruegel, C.1
Valeur, F.2
Vigna, G.3
Kemmerer, R.4
-
12
-
-
84958957354
-
Performance Adaptation in Real-Time Intrusion Detection Systems
-
W. Lee, J. Cabrera, A. Thomas, N. Balwalli, S. Saluja, and Y. Zhang. Performance Adaptation in Real-Time Intrusion Detection Systems. Lecture Notes in Computer Science, pages 252-273, 2002.
-
(2002)
Lecture Notes in Computer Science
, pp. 252-273
-
-
Lee, W.1
Cabrera, J.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
13
-
-
70450271526
-
-
libpcap: Packet Capture Library. http://www.tcpdump.org, April 2008.
-
libpcap: Packet Capture Library. http://www.tcpdump.org, April 2008.
-
-
-
-
14
-
-
70450256520
-
-
May 2008
-
Madwifi. http://www.madwifi.org, May 2008.
-
Madwifi
-
-
-
15
-
-
85077206746
-
The BSD packet filter: A new architecture for user-level packet capture
-
S. McCanne and V. Jacobson. The BSD packet filter: A new architecture for user-level packet capture. Proc. Winter'93 USENIX Conference, 1993.
-
(1993)
Proc. Winter'93 USENIX Conference
-
-
McCanne, S.1
Jacobson, V.2
-
16
-
-
29244442793
-
Indirect Detection of Mass Mailing Worm-Infected PC terminals for Learners
-
Y. Musashi, R. Matsuba, and K. Sugitani. Indirect Detection of Mass Mailing Worm-Infected PC terminals for Learners. Proc. ICETA2004, 2004.
-
(2004)
Proc. ICETA2004
-
-
Musashi, Y.1
Matsuba, R.2
Sugitani, K.3
-
17
-
-
70450286856
-
-
Netfilter Project, May 2008
-
Netfilter Project. http://www.netfilter.org, May 2008.
-
-
-
-
18
-
-
70450258485
-
-
April 2008
-
Open Wireless. http://www.openwireless.ch, April 2008.
-
Open Wireless
-
-
-
19
-
-
70450273978
-
-
OpenWRT, April 2008
-
OpenWRT. http://www.openwrt.org, April 2008.
-
-
-
-
20
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
21
-
-
70450249228
-
Bro Intrusion Detection System Hands-On Workshop: Bro Overwiew
-
Technical report, Lawrence Berkeley National Laboratory
-
V. Paxson. Bro Intrusion Detection System Hands-On Workshop: Bro Overwiew. Technical report, Lawrence Berkeley National Laboratory, 2007.
-
(2007)
-
-
Paxson, V.1
-
23
-
-
33750365498
-
Understanding the Network-Level Behavior of Spammers
-
ACM New York, NY, USA
-
A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, volume 36, pages 291-302. ACM New York, NY, USA, 2006.
-
(2006)
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
, vol.36
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
26
-
-
84870421463
-
-
April 2008
-
Seattle Wireless. http://www.seattlewireless.net, April 2008.
-
Seattle Wireless
-
-
-
28
-
-
70449637315
-
Wind: Workload-aware intrusion detection
-
Hamburg, Germany, September
-
S. Sinha, F. Jahanian, and J. Patel. Wind: Workload-aware intrusion detection. In Symposium on Recent Advances in Intrusion Detection (RAID'06), Hamburg, Germany, September 2006.
-
(2006)
Symposium on Recent Advances in Intrusion Detection (RAID'06)
-
-
Sinha, S.1
Jahanian, F.2
Patel, J.3
-
29
-
-
84858571129
-
-
February 2007
-
Smurf Attack. http://www.cert.org/advisories/CA-1998-01.html, February 2007.
-
Smurf Attack
-
-
-
30
-
-
70450243574
-
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C. Tseng, T. Bowen, M. Res, et al. A General Cooperative Intrusion Detection Architecture for MANETs. In Third IEEE International Workshop on Information Assurance, pages 57-70, 2005.
-
D. Sterne, P. Balasubramanyam, D. Carman, B. Wilson, R. Talpade, C. Ko, R. Balupari, C. Tseng, T. Bowen, M. Res, et al. A General Cooperative Intrusion Detection Architecture for MANETs. In Third IEEE International Workshop on Information Assurance, pages 57-70, 2005.
-
-
-
-
32
-
-
70450259392
-
Malware in IEEE 802.11 Wireless Networks
-
B. Stone-Gross, C. Wilson, K. Almeroth, E. Belding, H. Zheng, and K. Papagiannaki. Malware in IEEE 802.11 Wireless Networks. In Proceedings of the Passive and Active Measurement Conference (PAM), 2008.
-
(2008)
Proceedings of the Passive and Active Measurement Conference (PAM)
-
-
Stone-Gross, B.1
Wilson, C.2
Almeroth, K.3
Belding, E.4
Zheng, H.5
Papagiannaki, K.6
-
33
-
-
70450228126
-
-
*NIX. http://tcpreplay.synfin.net, April 2008.
-
*NIX. http://tcpreplay.synfin.net, April 2008.
-
-
-
-
34
-
-
33750323239
-
-
August 2008
-
Transmission. http://www.transmissionbt.com, August 2008.
-
Transmission
-
-
-
35
-
-
33746400587
-
-
A. Wagner, T. Dübendorfer, R. Hiestand, C. Göldi, and B. Plattner. A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. Lecture Notes in Computer Science, 4064:181, 2006.
-
A. Wagner, T. Dübendorfer, R. Hiestand, C. Göldi, and B. Plattner. A Fast Worm Scan Detection Tool for VPN Congestion Avoidance. Lecture Notes in Computer Science, 4064:181, 2006.
-
-
-
-
36
-
-
14944376454
-
A Study of Mass-mailing Worms
-
C. Wong, S. Bielski, J. McCune, and C. Wang. A Study of Mass-mailing Worms. Proceedings of the 2004 ACM workshop on Rapid malcode, pages 1-10, 2004.
-
(2004)
Proceedings of the 2004 ACM workshop on Rapid malcode
, pp. 1-10
-
-
Wong, C.1
Bielski, S.2
McCune, J.3
Wang, C.4
-
37
-
-
70450231257
-
-
P. Wood. libpcap-mmap: Memory Mapped Packet Capture Library. http://public.lanl.gov/cpw/, April 2008.
-
P. Wood. libpcap-mmap: Memory Mapped Packet Capture Library. http://public.lanl.gov/cpw/, April 2008.
-
-
-
-
38
-
-
58449122201
-
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. 2008.
-
(2008)
Spamming Botnets: Signatures and Characteristics
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
|