-
1
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
Baltimore, MD, August
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis. Detecting targeted attacks using shadow honeypots. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Anagnostakis, K. G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A. D.6
-
2
-
-
85081770459
-
The Internet Motion Sensor: A distributed blackhole monitoring system
-
San Diego, CA, February
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of Network and Distributed System Security Symposium (NDSS'05), San Diego, CA, February 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium (NDSS'05)
-
-
Bailey, Michael1
Cooke, Evan2
Jahanian, Farnam3
Nazario, Jose4
Watson, David5
-
3
-
-
84878677794
-
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic
-
October
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Niels Provos, Karl Rosaen, and David Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. Proceedings of the USENIX/ACM Internet Measurement Conference, October 2005.
-
(2005)
Proceedings of the USENIX/ACM Internet Measurement Conference
-
-
Bailey, Michael1
Cooke, Evan2
Jahanian, Farnam3
Provos, Niels4
Rosaen, Karl5
Watson, David6
-
4
-
-
24344436426
-
The Blaster Worm: Then and Now
-
Michael Bailey, Evan Cooke, David Watson, Farnam Jahanian, and Jose Nazario. The Blaster Worm: Then and Now. IEEE Security & Privacy, 3(4):26-31, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, Michael1
Cooke, Evan2
Watson, David3
Jahanian, Farnam4
Nazario, Jose5
-
5
-
-
85058835823
-
Mapping Internet sensors with probe response attacks
-
Baltimore, MD, August
-
John Bethencourt, Jason Franklin, and Mary Vernon. Mapping Internet sensors with probe response attacks. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, August 2005.
-
(2005)
Proceedings of the 14th USENIX Security Symposium
-
-
Bethencourt, John1
Franklin, Jason2
Vernon, Mary3
-
6
-
-
0009016272
-
An evening with Berferd in which a cracker is lured, endured, and studied
-
January 20 January 24, San Francisco, California, pages Berkeley, CA, USA, Winter 1992
-
Bill Cheswick. An evening with Berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter 1992 USENIX Conference: January 20 - January 24, 1992, San Francisco, California, pages 163-174, Berkeley, CA, USA, Winter 1992.
-
(1992)
Proceedings of the Winter 1992 USENIX Conference
, pp. 163-174
-
-
Cheswick, Bill1
-
7
-
-
84860038935
-
-
Computer Associates. July
-
Computer Associates. Win32.Agobot. http://www3.ca.com/securityadvisor/virusinfo/virus.aspx?id=37776, July 2004.
-
(2004)
Win32.Agobot
-
-
-
8
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
New York, Oct ACM Press
-
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, and Farnam Jahanian. Toward understanding distributed blackhole placement. In Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM-04), New York, Oct 2004. ACM Press.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM-04)
-
-
Cooke, Evan1
Bailey, Michael2
Morley Mao, Z.3
Watson, David4
Jahanian, Farnam5
-
9
-
-
84888402098
-
The Zombie roundup: Understanding, detecting, and disrupting botnets
-
Cambridge, MA, July
-
Evan Cooke, Farnam Jahanian, and Danny McPherson. The Zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop), Cambridge, MA, July 2005.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop)
-
-
Cooke, Evan1
Jahanian, Farnam2
McPherson, Danny3
-
11
-
-
84861803524
-
-
Team Cymru. June
-
Team Cymru. The darknet project. http://www.cymru.com/Darknet/index.html, June 2004.
-
(2004)
The darknet project
-
-
-
12
-
-
85093936803
-
-
Team Cymru. June
-
Team Cymru. The Bogon List. http://www.cymru.com/Documents/bogon-list.html, June 2005.
-
(2005)
The Bogon List
-
-
-
14
-
-
30944458314
-
-
Internet Assigned Numbers Authority (IANA). June
-
Internet Assigned Numbers Authority (IANA). Internet Protocol V4 Address Space. http://www.iana.org/assignments/ ipv4-address-space, June 2005.
-
(2005)
Internet Protocol V4 Address Space
-
-
-
15
-
-
85084164812
-
Collapsar: A VM-based architecture for network attack detention center
-
San Diego, CA, USA, August
-
Xuxian Jiang and Dongyan Xu. Collapsar: A VM-based architecture for network attack detention center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Jiang, Xuxian1
Xu, Dongyan2
-
19
-
-
85093962061
-
-
McAfee. W32/Sdbot.worm. April
-
McAfee. W32/Sdbot.worm. http://vil.nai.com/vil/content/v_100454.htm, April 2003.
-
(2003)
-
-
-
20
-
-
0742276097
-
Inside the Slammer worm
-
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. Inside the Slammer worm. IEEE Security & Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, David1
Paxson, Vern2
Savage, Stefan3
Shannon, Colleen4
Staniford, Stuart5
Weaver, Nicholas6
-
21
-
-
14944381614
-
-
Technical Report CS2004-0795, UC San Diego, July
-
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Network telescopes. Technical Report CS2004-0795, UC San Diego, July 2004.
-
(2004)
Network telescopes
-
-
Moore, David1
Shannon, Colleen2
Voelker, Geoffrey M.3
Savage, Stefan4
-
22
-
-
85084161486
-
Inferring Internet denial-of-service activity
-
Washington, D.C., August
-
David Moore, Geoffrey M. Voelker, and Stefan Savage. Inferring Internet denial-of-service activity. In Proceedings of the Tenth USENIX Security Symposium, pages 9-22, Washington, D.C., August 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 9-22
-
-
Moore, David1
Voelker, Geoffrey M.2
Savage, Stefan3
-
23
-
-
85093936898
-
Python routeing toolkit
-
September
-
Richard Mortier. Python routeing toolkit. IEEE Network, 16(5):3-3, September 2002.
-
(2002)
IEEE Network
, vol.16
, Issue.5
, pp. 3-3
-
-
Mortier, Richard1
-
24
-
-
14944369649
-
Characteristics of Internet background radiation
-
ACM Press
-
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry Peterson. Characteristics of Internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 27-40. ACM Press, 2004.
-
(2004)
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
, pp. 27-40
-
-
Pang, Ruoming1
Yegneswaran, Vinod2
Barford, Paul3
Paxson, Vern4
Peterson, Larry5
-
25
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
Vern Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, Vern1
-
26
-
-
85084163190
-
A Virtual Honeypot Framework
-
San Diego, CA, USA, August
-
Niels Provos. A Virtual Honeypot Framework. In Proceedings of the 13th USENIX Security Symposium, pages 1-14, San Diego, CA, USA, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 1-14
-
-
Provos, Niels1
-
27
-
-
34547351348
-
-
Technical Report NAS-TR-0018-2005, Pennsylvania State University, July
-
S. Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin. Characterizing address use structure and stability of origin advertizement in interdomain routing. Technical Report NAS-TR-0018-2005, Pennsylvania State University, July 2005.
-
(2005)
Characterizing address use structure and stability of origin advertizement in interdomain routing
-
-
Qiu, S.1
McDaniel, Patrick2
Monrose, Fabian3
Rubin, Avi4
-
32
-
-
84878684747
-
-
Symantec Corporation
-
Symantec Corporation. DeepSight Analyzer. http://analyzer.securityfocus.com/, 2005.
-
(2005)
DeepSight Analyzer
-
-
-
34
-
-
84872695749
-
-
University of Oregon
-
University of Oregon. RouteViews project. http://www.routeviews.org/.
-
RouteViews project
-
-
-
35
-
-
33750376717
-
Scalability, fidelity and containment in the Potemkin virtual honeyfarm
-
Brighton, UK, October
-
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage. Scalability, fidelity and containment in the Potemkin virtual honeyfarm. In Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP)
-
-
Vrable, Michael1
Ma, Justin2
Chen, Jay3
Moore, David4
Vandekieft, Erik5
Snoeren, Alex C.6
Voelker, Geoffrey M.7
Savage, Stefan8
-
37
-
-
14944341848
-
On the design and use of Internet sinks for network abuse monitoring
-
Sophia Antipolis, French Riviera, France, October
-
Vinod Yegneswaran, Paul Barford, and Dave Plonka. On the design and use of Internet sinks for network abuse monitoring. In Recent Advances in Intrusion Detection-Proceedings of the 7th International Symposium (RAID 2004), Sophia Antipolis, French Riviera, France, October 2004.
-
(2004)
Recent Advances in Intrusion Detection-Proceedings of the 7th International Symposium (RAID 2004)
-
-
Yegneswaran, Vinod1
Barford, Paul2
Plonka, Dave3
-
38
-
-
8644236108
-
Routing worm: A fast, selective attack worm based on IP address information
-
Umass ECE Technical Report TR-03-CSE-06, November
-
Cliff C. Zou, Don Towsley, Weibo Gong, and Songlin Cai. Routing worm: A fast, selective attack worm based on IP address information. Umass ECE Technical Report TR-03-CSE-06, November 2003.
-
(2003)
-
-
Zou, Cliff C.1
Towsley, Don2
Gong, Weibo3
Cai, Songlin4
|