-
1
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
December
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Elsevier Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, December 1999.
-
(1999)
Elsevier Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
2
-
-
85090433665
-
Snort: Lightweight Intrusion Detection for Networks
-
M. Roesch, "Snort: Lightweight Intrusion Detection for Networks," in 13th USENIX Conference on System Administration (LISA 1999), Seattle, WA, November 1999, pp. 229-238.
-
13th USENIX Conference on System Administration (LISA 1999), Seattle, WA, November 1999
, pp. 229-238
-
-
Roesch, M.1
-
3
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
J. Jung, V. Paxson, A. W. Berger, and H. B. lakrishnan, "Fast Portscan Detection Using Sequential Hypothesis Testing," in IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, May 2004.
-
IEEE Symposium on Security and Privacy, Berkeley/Oakland, CA, May 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Lakrishnan, H.B.4
-
4
-
-
1242310086
-
Automatically Inferring Patterns of Resource Consumption in Network Traffic
-
Karlsruhe, Germany: ACM, August
-
C. Estan, S. Savage, and G. Varghese, "Automatically Inferring Patterns of Resource Consumption in Network Traffic," in ACM SIGCOMM 2003. Karlsruhe, Germany: ACM, August 2003, pp. 137-148.
-
(2003)
ACM SIGCOMM 2003
, pp. 137-148
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
5
-
-
61649116563
-
Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop
-
March
-
G. Carle, F. Dressler, R. A. Kemmerer, H. Koenig, C. Kruegel, and P. Laskov, "Network attack detection and defense - Manifesto of the Dagstuhl Perspective Workshop," Springer Computer Science - Research and Development (CSRD), vol. 23, no. 1, pp. 15-25, March 2009.
-
(2009)
Springer Computer Science - Research and Development (CSRD)
, vol.23
, Issue.1
, pp. 15-25
-
-
Carle, G.1
Dressler, F.2
Kemmerer, R.A.3
Koenig, H.4
Kruegel, C.5
Laskov, P.6
-
6
-
-
49949106273
-
Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection
-
Resilient Networks and Services, Second International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008), ser. Bremen, Germany: Springer, July
-
G. Schaffrath and B. Stiller, "Conceptual Integration of Flow-Based and Packet-Based Network Intrusion Detection," in Resilient Networks and Services, Second International Conference on Autonomous Infrastructure, Management and Security (AIMS 2008), ser. Lecture Notes in Computer Science, vol.5127. Bremen, Germany: Springer, July 2008, pp. 190-194.
-
(2008)
Lecture Notes in Computer Science
, vol.5127
, pp. 190-194
-
-
Schaffrath, G.1
Stiller, B.2
-
7
-
-
77951289108
-
Signature Detection in Sampled Packets
-
G. Muenz, N. Weber, and G. Carle, "Signature Detection in Sampled Packets," in Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2007), Toulouse, France, November 2007.
-
Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2007), Toulouse, France, November 2007
-
-
Muenz, G.1
Weber, N.2
Carle, G.3
-
8
-
-
85013592037
-
Self-similarity through high-variability: Statistical analysis of ethernet LAN traffic at the source level
-
Cambridge, MA: ACM
-
W. Willinger, M. S. Taqqu, R. Sherman, and d. V. Wilson, "Self-similarity through high-variability: statistical analysis of ethernet LAN traffic at the source level," in the conference on Applications, technologies, architectures, and protocols for computer communication. Cambridge, MA: ACM, 1995, pp. 100-113.
-
(1995)
The Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 100-113
-
-
Willinger, W.1
Taqqu, M.S.2
Sherman, R.3
Wilson, D.V.4
-
9
-
-
46149108945
-
Vermont - A Versatile Monitoring Toolkit Using IPFIX/PSAMP
-
Tübingen, Germany: IEEE, September
-
R. T. Lampert, C. Sommer, G. Münz, and F. Dressler, "Vermont - A Versatile Monitoring Toolkit Using IPFIX/PSAMP," in IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006). Tübingen, Germany: IEEE, September 2006, pp. 62-65.
-
(2006)
IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation (MonAM 2006)
, pp. 62-65
-
-
Lampert, R.T.1
Sommer, C.2
Münz, G.3
Dressler, F.4
-
10
-
-
77951278164
-
Flow processing and the rise of commodity network hardware
-
April
-
A. Greenhalgh, F. Huici, M. Hoerdt, P. Papadimitriou, M. Handley, and L. Mathy, "Flow processing and the rise of commodity network hardware," ACM SIGCOMM Computer Communication Review (CCR), vol. 39, no. 2, pp. 20-26, April 2009.
-
(2009)
ACM SIGCOMM Computer Communication Review (CCR)
, vol.39
, Issue.2
, pp. 20-26
-
-
Greenhalgh, A.1
Huici, F.2
Hoerdt, M.3
Papadimitriou, P.4
Handley, M.5
Mathy, L.6
-
11
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, "Operational experiences with high-volume network intrusion detection," in 11th ACM Conference on Computer and Communications Security (ACM CCS 2004). Washington, DC: ACM, October 2004, pp. 2-11. (Pubitemid 40338184)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
12
-
-
57349093420
-
Predicting the resource consumption of network intrusion detection systems
-
-, "Predicting the resource consumption of network intrusion detection systems," ACM SIGMETRICS Performance Evaluation Review, vol. 36, no. 1, pp. 437-438, 2008.
-
(2008)
ACM SIGMETRICS Performance Evaluation Review
, vol.36
, Issue.1
, pp. 437-438
-
-
-
13
-
-
33846281935
-
Exploiting independent state for network intrusion detection
-
DOI 10.1109/CSAC.2005.24, 1565235, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005
-
R. Sommer and V. Paxson, "Exploiting Independent State For Network Intrusion Detection," in 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005, pp. 59-71. (Pubitemid 46116464)
-
(2005)
Proceedings - Annual Computer Security Applications Conference, ACSAC
, vol.2005
, pp. 59-71
-
-
Sommer, R.1
Paxson, V.2
-
14
-
-
56549099368
-
Gnort: High Performance Network Intrusion Detection Using Graphics Processors
-
11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), ser. Cambridge, MA: Springer, September
-
G. Vasiliadis, S. Antonatos, M. Polychronakis, E. P. Markatos, and S. Ioannidis, "Gnort: High Performance Network Intrusion Detection Using Graphics Processors," in 11th International Symposium on Recent Advances in Intrusion Detection (RAID 2008), ser. Lecture Notes in Computer Science, vol.5230. Cambridge, MA: Springer, September 2008, pp. 116-134.
-
(2008)
Lecture Notes in Computer Science
, vol.5230
, pp. 116-134
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
Markatos, E.P.4
Ioannidis, S.5
-
15
-
-
65249091864
-
Enriching Network Security Analysis with Time Travel
-
New York, NY, USA: ACM Press, August
-
G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Payson, and F. Schneider, "Enriching Network Security Analysis with Time Travel," in ACM SIGCOMM 2008. New York, NY, USA: ACM Press, August 2008, pp. 183-194.
-
(2008)
ACM SIGCOMM 2008
, pp. 183-194
-
-
Maier, G.1
Sommer, R.2
Dreger, H.3
Feldmann, A.4
Payson, V.5
Schneider, F.6
-
16
-
-
0038825042
-
Active Mapping: Resisting NIDS Evasion without Altering Traffic
-
Oakland, CA: IEEE
-
U. Shankar and V. Paxson, "Active Mapping: Resisting NIDS Evasion without Altering Traffic," in IEEE Symposium on Security and Privacy. Oakland, CA: IEEE, 2003, pp. 44-61.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 44-61
-
-
Shankar, U.1
Paxson, V.2
-
17
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
M. Handley, V. Paxson, and C. Kreibich, "Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics," in 10th USENIX Security Symposium, Washington, DC, August 2001.
-
10th USENIX Security Symposium, Washington, DC, August 2001
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
18
-
-
70449121907
-
Robust TCP stream reassembly in the presence of adversaries
-
S. Dharmapurikar and V. Paxson, "Robust TCP stream reassembly in the presence of adversaries," in 14th USENIX Security Symposium, Baltimore, MD, July 2005.
-
14th USENIX Security Symposium, Baltimore, MD, July 2005
-
-
Dharmapurikar, S.1
Paxson, V.2
-
20
-
-
34748813022
-
-
IETF, RFC 5476, March
-
B. Claise, A. Johnson, and J. Quittek, "Packet Sampling (PSAMP) Protocol Specifications," IETF, RFC 5476, March 2009.
-
(2009)
Packet Sampling (PSAMP) Protocol Specifications
-
-
Claise, B.1
Johnson, A.2
Quittek, J.3
|