-
1
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
P. Bächer, M. Kötter, T. Holz, M. Dornseif, and F. C. Freiling. The nepenthes platform: An efficient approach to collect malware. In Recent Adances in Intrusion Detection (RAID), pages 165-184, 2006.
-
(2006)
Recent Adances in Intrusion Detection (RAID)
, pp. 165-184
-
-
Bächer, P.1
Kötter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.C.5
-
2
-
-
77952415099
-
An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry Into the Nature and Causes of the Wealth of Internet Miscreants. In Proc. of Conference on Computer and Communications Security (CCS), pages 375-388, 2007.
-
(2007)
Proc. of Conference on Computer and Communications Security (CCS)
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
4
-
-
85075837457
-
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In Proc. of USENIX Security Symposium, 2008.
-
Proc. of USENIX Security Symposium, 2008
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
5
-
-
85061529860
-
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In Proc. of USENIX Security Symposium, 2007.
-
Proc. of USENIX Security Symposium, 2007
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
9
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm worm. In Proc. of USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
Proc. of USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
12
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sandhi, Y. Chen, M.-Y. Kao, and B. Chavez. Hamsa: fast signature generation for zero-day polymorphic worms with provable attack resilience. In Proc. of IEEE Symposium on Security and Privacy, pages 32-47, 2006.
-
(2006)
Proc. of IEEE Symposium on Security and Privacy
, pp. 32-47
-
-
Li, Z.1
Sandhi, M.2
Chen, Y.3
Kao, M.-Y.4
Chavez, B.5
-
13
-
-
84879974400
-
Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions
-
Kassel, Germany, March Springer
-
T. Limmer and F. Dressler. Seamless Dynamic Reconfiguration of Flow Meters: Requirements and Solutions. In 16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009), pages 179-190, Kassel, Germany, March 2009. Springer.
-
(2009)
16. GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2009)
, pp. 179-190
-
-
Limmer, T.1
Dressler, F.2
-
14
-
-
0742276097
-
Inside the slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford-Chen, and N. Weaver. Inside the slammer worm. IEEE Security & Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford-Chen, S.5
Weaver, N.6
-
18
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
December
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Elsevier Computer Networks, 31(23-24):2435-2463, December 1999.
-
(1999)
Elsevier Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
19
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, W. Lee, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In Proc. of IEEE Symposium on Security and Privacy, pages 17-31, 2006.
-
(2006)
Proc. of IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
Perdisci, R.1
Dagon, D.2
Lee, W.3
Fogla, P.4
Sharif, M.5
-
24
-
-
49049107082
-
Analysis of the Storm and Nugache Trojans: P2P is here
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the Storm and Nugache Trojans: P2P is here. USENIX ;login:, 32(6):18-27, 2007.
-
(2007)
USENIX;login
, vol.32
, Issue.6
, pp. 18-27
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
25
-
-
69249090883
-
-
Symantec. April Trends for July - December 07
-
Symantec. Global Internet Security Threat Report, April 2008. Trends for July - December 07.
-
(2008)
Global Internet Security Threat Report
-
-
-
26
-
-
67650323193
-
Gnort: High performance network intrusion detection using graphics processors
-
G. Vasiliadis, S. Antonatos, M. Polychronakis, E. Markatos, and S. Ioannidis. Gnort: High performance network intrusion detection using graphics processors. In Recent Adances in Intrusion Detection (RAID), 2008.
-
(2008)
Recent Adances in Intrusion Detection (RAID)
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
Markatos, E.4
Ioannidis, S.5
-
27
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, C. Verbowski, S. Chen, S. King, X. Jiang, and R. Roussev. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In Proc. of Network and Distributed System Security Symposium (NDSS), 2006.
-
Proc. of Network and Distributed System Security Symposium (NDSS), 2006
-
-
Wang, Y.-M.1
Beck, D.2
Verbowski, C.3
Chen, S.4
King, S.5
Jiang, X.6
Roussev, R.7
-
28
-
-
84923445084
-
An architecture for generating semantics-aware signatures
-
V. Yegneswaran, J. T. Giffin, P. Barford, and S. Jha. An architecture for generating semantics-aware signatures. In Proc. of USENIX Security Symposium, pages 7-17, 2005.
-
(2005)
Proc. of USENIX Security Symposium
, pp. 7-17
-
-
Yegneswaran, V.1
Giffin, J.T.2
Barford, P.3
Jha, S.4
|