-
1
-
-
0030677523
-
Execution monitoring of security-critical programs in distributed systems: A specification-based approach
-
C. Ko, M. Ruschitzka, and K. Levitt, "Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-based Approach," in Proc. IEEE Symposium on Security and Privacy, 1997.
-
(1997)
Proc. IEEE Symposium on Security and Privacy
-
-
Ko, C.1
Ruschitzka, M.2
Levitt, K.3
-
2
-
-
14944379887
-
A behavioral approach to worm detection
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia, "A Behavioral Approach to Worm Detection," in Proc. ACM CCS WORM Workshop, 2004.
-
(2004)
Proc. ACM CCS WORM Workshop
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
3
-
-
0037252945
-
Amazon.com recommendations: Item-to-Item collaborative filtering
-
G. Linden, B. Smith, and J. York, "Amazon.com Recommendations: Item-to-Item Collaborative Filtering," IEEE Internet Computing, vol. 7, no. 1, pp. 76-80, 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.1
, pp. 76-80
-
-
Linden, G.1
Smith, B.2
York, J.3
-
7
-
-
22944469345
-
The alignment template approach to statistical machine translation
-
F. J. Och and H. Ney, "The Alignment Template Approach to Statistical Machine Translation," Comput. Linguist, vol. 30, no. 4, pp. 411-449, 2004.
-
(2004)
Comput. Linguist
, vol.30
, Issue.4
, pp. 411-449
-
-
Och, F.J.1
Ney, H.2
-
9
-
-
0023294428
-
An intrusion-detection model
-
D. E. Denning, "An Intrusion-Detection Model," IEEE Transactions on Software Engineering, vol. 13, no. 2, pp. 222-232, 1987.
-
(1987)
IEEE Transactions on Software Engineering
, vol.13
, Issue.2
, pp. 222-232
-
-
Denning, D.E.1
-
10
-
-
0004118981
-
The NIDES statistical component: Description and justification
-
H. S. Javitz and A. Valdes, "The NIDES Statistical Component: Description and Justification," SRI International, Tech. Rep., 1993.
-
(1993)
SRI International, Tech. Rep.
-
-
Javitz, H.S.1
Valdes, A.2
-
12
-
-
0141464248
-
HIDE: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification
-
Z. Zhang, J. Li, C. Manikopoulos, J. Jorgenson, and J. Ucles, "HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification," in Proc. IEEE Workshop on Information Assurance and Security, 2001.
-
(2001)
Proc. IEEE Workshop on Information Assurance and Security
-
-
Zhang, Z.1
Li, J.2
Manikopoulos, C.3
Jorgenson, J.4
Ucles, J.5
-
16
-
-
67049149448
-
Anomaly detection: A survey
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly Detection: A Survey," University of Minnesota, Tech. Rep., 2007.
-
(2007)
University of Minnesota, Tech. Rep.
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
17
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J. Bolton and D. J. Hand, "Statistical Fraud Detection: A Review," Statistical Science, vol. 17, no. 3, 2002.
-
(2002)
Statistical Science
, vol.17
, Issue.3
-
-
Bolton, R.J.1
Hand, D.J.2
-
19
-
-
77955201954
-
-
"Peakflow SP," http://www.arbornetworks.com/en/ peakflow-sp.html.
-
-
-
-
20
-
-
77955218024
-
-
"StealthWatch," http://www.lancope.com/products/.
-
StealthWatch
-
-
-
24
-
-
77955182553
-
Make data useful
-
Stanford University
-
"Make Data Useful," Greg Linden, Data Mining Seminar, Stanford University, 2006. http://glinden.blogspot.com/2006/ 12/slides-from-my-talk-at- stanford.htm%1.
-
(2006)
Data Mining Seminar
-
-
-
25
-
-
38149133882
-
OpenFst: A general and efficient weighted finite-state transducer library
-
C. Allauzen, M. Riley, J. Schalkwyk, W. Skut, and M. Mohri, "OpenFst: A General and Efficient Weighted Finite-state Transducer Library," in Proc. International Conference on Implementation and Application of Automata, 2007.
-
(2007)
Proc. International Conference on Implementation and Application of Automata
-
-
Allauzen, C.1
Riley, M.2
Schalkwyk, J.3
Skut, W.4
Mohri, M.5
-
28
-
-
70350629594
-
Browser fingerprinting from coarse traffic summaries: Techniques and implications
-
T.-F. Yen, X. Huang, F. Monrose, and M. K. Reiter, "Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications," in Proc. Conference on Detection of Intrusions and Malware & Vulnerability Assessment, 2009.
-
(2009)
Proc. Conference on Detection of Intrusions and Malware & Vulnerability Assessment
-
-
Yen, T.-F.1
Huang, X.2
Monrose, F.3
Reiter, M.K.4
-
31
-
-
77955187399
-
-
Lawrence Berkeley National Laboratory, via personal communication
-
Jim Mellander, Lawrence Berkeley National Laboratory, via personal communication, 2009.
-
(2009)
-
-
Mellander, J.1
-
32
-
-
0031078972
-
Self-similarity through high-variability: Statistical analysis of ethernet LAN traffic at the source level
-
W. Willinger, M. S. Taqqu, R. Sherman, and D. V. Wilson, "Self-Similarity Through High-Variability: Statistical Analysis of Ethernet LAN Traffic at the Source Level," IEEE/ACM Transactions on Networking, vol. 5, no. 1, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.1
-
-
Willinger, W.1
Taqqu, M.S.2
Sherman, R.3
Wilson, D.V.4
-
33
-
-
0001817861
-
Data networks as cascades: Investigating the multifractal nature of internet WAN traffic
-
A. Feldmann, A. C. Gilbert, and W. Willinger, "Data Networks As Cascades: Investigating the Multifractal Nature of Internet WAN Traffic," in Proc. ACM SIGCOMM, 1998.
-
(1998)
Proc. ACM SIGCOMM
-
-
Feldmann, A.1
Gilbert, A.C.2
Willinger, W.3
-
34
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A System for Detecting Network Intruders in Real-Time," Computer Networks, vol. 31, no. 23-24, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
35
-
-
77955214172
-
YouTube traffic characterization: A view from the edge
-
P. Gill, M. Arlitt, Z. Li, and A. Mahanti, "YouTube Traffic Characterization: A View From the Edge," in Proc. ACM SIGCOMM Internet Measurement Conference, 2008.
-
(2008)
Proc. ACM SIGCOMM Internet Measurement Conference
-
-
Gill, P.1
Arlitt, M.2
Li, Z.3
Mahanti, A.4
-
38
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker, "Spamscatter: Characterizing Internet Scam Hosting Infrastructure," in Proc. USENIX Security Symposium, 2007.
-
(2007)
Proc. USENIX Security Symposium
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
41
-
-
24744463914
-
Results of the 1998 DARPA offline intrusion detection evaluation
-
R. Lippmann, R. K. Cunningham, D. J. Fried, I. Graf, K. R. Kendall, S. E. Webster, and M. A. Zissman, "Results of the 1998 DARPA Offline Intrusion Detection Evaluation," in Proc. Recent Advances in Intrusion Detection, 1999.
-
(1999)
Proc. Recent Advances in Intrusion Detection
-
-
Lippmann, R.1
Cunningham, R.K.2
Fried, D.J.3
Graf, I.4
Kendall, K.R.5
Webster, S.E.6
Zissman, M.A.7
-
42
-
-
0034301517
-
The 1999 DARPA off-line intrusion detection evaluation
-
October
-
R. Lippmann, J. W. Haines, D. J. Fried, J. Korba, and K. Das, "The 1999 DARPA Off-line Intrusion Detection Evaluation," Computer Networks, vol. 34, no. 4, pp. 579-595, October 2000.
-
(2000)
Computer Networks
, vol.34
, Issue.4
, pp. 579-595
-
-
Lippmann, R.1
Haines, J.W.2
Fried, D.J.3
Korba, J.4
Das, K.5
-
43
-
-
77955190035
-
-
"KDD Cup Data," http://kdd.ics.uci.edu/databases/kddcup99/ kddcup99.html.
-
-
-
-
44
-
-
85019691440
-
Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratories
-
November
-
J. McHugh, "Testing Intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratories," ACM Transactions on Information and System Security, vol. 3, no. 4, pp. 262-294, November 2000.
-
(2000)
ACM Transactions on Information and System Security
, vol.3
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
45
-
-
10844237614
-
An analysis of the 1999 DARPA/lincoln laboratory evaluation data for network anomaly detection
-
M. V. Mahoney and P. K. Chan, "An Analysis of the 1999 DARPA/Lincoln Laboratory Evaluation Data for Network Anomaly Detection," in Proc. Recent Advances in Intrusion Detection, 2003.
-
(2003)
Proc. Recent Advances in Intrusion Detection
-
-
Mahoney, M.V.1
Chan, P.K.2
-
46
-
-
77955182552
-
-
"ClarkNet-HTTP," http://ita.ee.lbl.gov/html/contrib/ ClarkNet-HTTP.html.
-
-
-
-
47
-
-
77955203132
-
-
via personal communication
-
Martin Arlitt, via personal communication, 2008.
-
(2008)
-
-
Arlitt, M.1
-
49
-
-
77955205390
-
-
"tcpdpriv," http://ita.ee.lbl.gov/html/contrib/tcpdpriv.html.
-
-
-
-
50
-
-
1242308060
-
On the design and performance of prefix-preserving IP traffic trace anonymization
-
Nov.
-
J. Xu, J. Fan, M. Ammar, and S. Moon, "On the Design and Performance of Prefix-Preserving IP Traffic Trace Anonymization," in Proc. ACM SIGCOMM Internet Measurement Workshop, Nov. 2001.
-
(2001)
Proc. ACM SIGCOMM Internet Measurement Workshop
-
-
Xu, J.1
Fan, J.2
Ammar, M.3
Moon, S.4
-
51
-
-
33847256529
-
The devil and packet trace anonymization
-
R. Pang, M. Allman, V. Paxson, and J. Lee, "The Devil and Packet Trace Anonymization," in Computer Communication Review, 2006.
-
(2006)
Computer Communication Review
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
52
-
-
77955201686
-
-
"The Internet Traffic Archive (ITA)," http://ita.ee.lbl.gov.
-
-
-
-
53
-
-
77955187398
-
-
"PREDICT," http://www.predict.org.
-
-
-
-
54
-
-
77955220391
-
Playing devil's advocate: Inferring sensitive information from anonymized network traces
-
S. E. Coull, C. V. Wright, F. Monrose, M. P. Collins, and M. K. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces," in Proc. Network and Distributed Security Symposium, 2007.
-
(2007)
Proc. Network and Distributed Security Symposium
-
-
Coull, S.E.1
Wright, C.V.2
Monrose, F.3
Collins, M.P.4
Reiter, M.K.5
-
56
-
-
84880858814
-
Why 6? Defining the operational limits of stide, an anomaly-based intrusion detector
-
K. M. Tan and R. A. Maxion, ""Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector," in Proc. IEEE Symposium on Security and Privacy, 2002.
-
(2002)
Proc. IEEE Symposium on Security and Privacy
-
-
Tan, K.M.1
Maxion, R.A.2
-
57
-
-
0004145058
-
-
Secure Networks, Inc., Tech. Rep., January
-
T. H. Ptacek and T. N. Newsham, "Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection," Secure Networks, Inc., Tech. Rep., January 1998.
-
(1998)
Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
-
-
Ptacek, T.H.1
Newsham, T.N.2
-
59
-
-
33845989821
-
Can machine learning be secure?
-
M. Barreno, B. Nelson, R. Sears, A. D. Joseph, and J. D. Tygar, "Can Machine Learning Be Secure?" in Proc. ACM Symposium on Information, Computer and Communications Security, 2006.
-
(2006)
Proc. ACM Symposium on Information, Computer and Communications Security
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Tygar, J.D.5
-
61
-
-
85061529860
-
BotHunter: Detecting malware infection through IDSDriven dialog correlation
-
August
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting Malware Infection Through IDSDriven Dialog Correlation," in Proc. USENIX Security Symposium, August 2007.
-
(2007)
Proc. USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
62
-
-
59249106693
-
Detecting targeted attacks using shadow honeypots
-
K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, and A. D. Keromytis, "Detecting Targeted Attacks Using Shadow Honeypots," in Proc. USENIX Security Symposium, 2005.
-
(2005)
Proc. USENIX Security Symposium
-
-
Anagnostakis, K.G.1
Sidiroglou, S.2
Akritidis, P.3
Xinidis, K.4
Markatos, E.5
Keromytis, A.D.6
-
64
-
-
78149315577
-
Securing mediated trace access using black-box permutation analysis
-
P. Mittal, V. Paxson, R. Sommer, and M. Winterrowd, "Securing Mediated Trace Access Using Black-box Permutation Analysis," in Proc. ACM Workshop on Hot Topics in Networks, 2009.
-
(2009)
Proc. ACM Workshop on Hot Topics in Networks
-
-
Mittal, P.1
Paxson, V.2
Sommer, R.3
Winterrowd, M.4
|