-
1
-
-
85177019660
-
-
2007 mal ware report: The economic impact of viruses, Spyware, adware, botnets, and other malicious code Jul. 2008 Computer Economics http://www.computereconomics.com
-
(2008)
-
-
-
2
-
-
85176992509
-
-
M. Roesch Snort, intrusion detection system Jul. 2008 http://www.snort.org
-
(2008)
-
-
Roesch, M.1
-
3
-
-
0033295259
-
Bro: a system for detecting network intruders in real-time
-
V. Paxson Bro: a system for detecting network intruders in real-time Computer Networks 31 23-24 2435 2463 1999
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
4
-
-
33845474264
-
A parallel intrusion detection system for high-speed networks
-
H. Lai S. Cai H. Huang J. Xie H. Li A parallel intrusion detection system for high-speed networks Proc. of the Second International Conference Applied Cryptography and Network Security (ACNS'04) 439 451 Proc. of the Second International Conference Applied Cryptography and Network Security (ACNS'04) 2004-May
-
(2004)
, pp. 439-451
-
-
Lai, H.1
Cai, S.2
Huang, H.3
Xie, J.4
Li, H.5
-
5
-
-
33751089862
-
Efficient packet matching for gigabit network intrusion detection using TCAMs
-
M. Gao Κ. Zhang J. Lu Efficient packet matching for gigabit network intrusion detection using TCAMs Proc. of 20th International Conferece on Advanced Information Networking and Applications (AINA'06) 249 254 Proc. of 20th International Conferece on Advanced Information Networking and Applications (AINA'06) 2006
-
(2006)
, pp. 249-254
-
-
Gao, M.1
Zhang, Κ.2
Lu, J.3
-
6
-
-
0024984013
-
A network security monitor
-
L. Heberlein G. Dias Κ. Levitt Β. Mukherjee J. Wood D. Wolber A network security monitor Proc. of IEEE Computer Society Symposium on Research in Security and Privacy 296 304 Proc. of IEEE Computer Society Symposium on Research in Security and Privacy 1990-May
-
(1990)
, pp. 296-304
-
-
Heberlein, L.1
Dias, G.2
Levitt, Κ.3
Mukherjee, Β.4
Wood, J.5
Wolber, D.6
-
7
-
-
0000949239
-
GrIDS - a graph based intrusion detection system for large networks
-
S. Stanford-Chen S. Cheung R. Crawford M. Dilger J. Frank J. Hoagl K. Levitt C. Wee R. Yip D. Zerkle GrIDS-a graph based intrusion detection system for large networks Proc. of the 19th National Information Systems Security Conference (NISS '96) 361 370 Proc. of the 19th National Information Systems Security Conference (NISS '96) 1996
-
(1996)
, pp. 361-370
-
-
Stanford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagl, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
8
-
-
85176991816
-
-
Cisco IOS NetFlow Configuration Guide, Release 12.4 Jul. 2008 Cisco.com http://www.cisco.com
-
(2008)
-
-
-
9
-
-
33847789378
-
Cisco Systems NetFlow Services Export Version 9
-
B. Claise Cisco Systems NetFlow Services Export Version 9 Jul. 2008 RFC 3954 http: //www.ietf. org/rfc/rfc3954. txt
-
(2008)
-
-
Claise, B.1
-
10
-
-
34250642066
-
Requirements for IP Flow Information Export (IPFIX)
-
J. Quittek T. Zseby B. Claise S. Zander Requirements for IP Flow Information Export (IPFIX) Jul. 2008 RFC 3917 http://www.ietf.org/rfc/rfc3917.txt
-
(2008)
-
-
Quittek, J.1
Zseby, T.2
Claise, B.3
Zander, S.4
-
11
-
-
0033293396
-
Towards a taxonomy of intrusion-detection systems
-
H. Debar M. Dacier A. Wespi Towards a taxonomy of intrusion-detection systems Computer Networks 31 9 805 822 Apr. 1999
-
(1999)
Computer Networks
, vol.31
, Issue.9
, pp. 805-822
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
13
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
S. Axelsson Intrusion detection systems: A survey and taxonomy Mar. 2000 99-15 Chalmers Univ.
-
(2000)
-
-
Axelsson, S.1
-
14
-
-
35548944839
-
Intrusion detection: Introduction to intrusion detection and security information management
-
H. Debar J. Viinikka Intrusion detection: Introduction to intrusion detection and security information management Foundations of Security Analysis and Design III 207 236 Sep. 2005
-
(2005)
Foundations of Security Analysis and Design III
, pp. 207-236
-
-
Debar, H.1
Viinikka, J.2
-
16
-
-
85176993902
-
-
CERT Coordination Center Jul. 2008 http://www.cert.org/certcc.html
-
(2008)
-
-
-
17
-
-
85177015383
-
-
Internet2 NetFlow Weekly Reports Jul. 2008 http://netflow.internet2.edu/weekly
-
(2008)
-
-
-
18
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
H. Dreger A. Feldmann V. Paxson R. Sommer Operational experiences with high-volume network intrusion detection Proc. SIGSAC: 11th ACM Conference on Computer and Communications Security (CSS'04) 2 11 Proc. SIGSAC: 11th ACM Conference on Computer and Communications Security (CSS'04) 2004
-
(2004)
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
19
-
-
38549179979
-
Combating against attacks on encrypted protocols
-
Z. Fadlullah T. Taleb N. Ansari K. Hashimoto Y. Y. Miyake Y. Nemoto N. Kato Combating against attacks on encrypted protocols IEEE International Conference on Communications (ICC '07) 1211 1216 IEEE International Conference on Communications (ICC '07) 2007-June
-
(2007)
, pp. 1211-1216
-
-
Fadlullah, Z.1
Taleb, T.2
Ansari, N.3
Hashimoto, K.4
Miyake, Y.Y.5
Nemoto, Y.6
Kato, N.7
-
20
-
-
36849007415
-
Tracing back attacks against encrypted protocols
-
T. Taleb Z. M. Fadlullah K. Hashimoto Y. Nemoto N. Kato Tracing back attacks against encrypted protocols Proc. of the 2007 international conference on Wireless communications and mobile computing (IWCMC '07) 121 126 Proc. of the 2007 international conference on Wireless communications and mobile computing (IWCMC '07) 2007
-
(2007)
, pp. 121-126
-
-
Taleb, T.1
Fadlullah, Z.M.2
Hashimoto, K.3
Nemoto, Y.4
Kato, N.5
-
21
-
-
34748855477
-
Adaptive network flow clustering
-
S. Song Z. Chen Adaptive network flow clustering IEEE International Conference on Networking, Sensing and Control (ICNSC07) 596 601 IEEE International Conference on Networking, Sensing and Control (ICNSC07) 2007-April
-
(2007)
, pp. 596-601
-
-
Song, S.1
Chen, Z.2
-
22
-
-
43949095595
-
Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information
-
B. Claise Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information Jul. 2008 RFC 5101 http://www.ietf.org/rfc/rfc5101.txt
-
(2008)
-
-
Claise, B.1
-
23
-
-
49949106273
-
Conceptual integration of flow-based and packet-based network intrusion detection
-
G. Schaffrath B. Stiller Conceptual integration of flow-based and packet-based network intrusion detection Proc. of 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS '08) 190 194 Proc. of 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS '08) 2008
-
(2008)
, pp. 190-194
-
-
Schaffrath, G.1
Stiller, B.2
-
24
-
-
34748885697
-
Finding elephant flows for optical networks
-
T. Fioreze M. O. Wolbers R. van de Meent A. Pras Finding elephant flows for optical networks Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM '07) 627 640 Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM '07) 2007-May
-
(2007)
, pp. 627-640
-
-
Fioreze, T.1
Wolbers, M.O.2
van de Meent, R.3
Pras, A.4
-
25
-
-
85177004040
-
Evaluation of Candidate Protocols for IP Flow Information Export (IPFIX)
-
S. Leinen Evaluation of Candidate Protocols for IP Flow Information Export (IPFIX) Jul 2008 RFC 3955
-
(2008)
-
-
Leinen, S.1
-
26
-
-
85177017940
-
-
Packet Sampling (PSAMP) working group Jul. 2008 http://www.ietf.org/html.charters/psamp-charter.html
-
(2008)
-
-
-
27
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
D. Brauckhoff Β. Tellenbach A. Wagner M. May A. Lakhina Impact of packet sampling on anomaly detection metrics Proc. of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06) 159 164 Proc. of the 6th ACM SIGCOMM conference on Internet measurement (IMC '06) 2006
-
(2006)
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, Β.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
28
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
J. Mai C.-N. Chuah A. Sridharan T. Ye H. Zang Is sampled data sufficient for anomaly detection? Proc. of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06) 165 176 Proc. of the 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06) 2006
-
(2006)
, pp. 165-176
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
29
-
-
43949115202
-
Packet sampling for flow accounting: Challenges and limitations
-
T. Zseby T. Hirsch B. Claise Packet sampling for flow accounting: Challenges and limitations Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 61 71 Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 2008
-
(2008)
, pp. 61-71
-
-
Zseby, T.1
Hirsch, T.2
Claise, B.3
-
30
-
-
34547275093
-
Sampling time-dependent parameters in high-speed network monitoring
-
E. Izkue E. Magaña Sampling time-dependent parameters in high-speed network monitoring Proc. of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks (PM2HW2N '06) 13 17 Proc. of the ACM international workshop on Performance monitoring, measurement, and evaluation of heterogeneous wireless and wired networks (PM2HW2N '06) 2006
-
(2006)
, pp. 13-17
-
-
Izkue, E.1
Magaña, E.2
-
31
-
-
33746644590
-
Easily-implemented adaptive packet sampling for high speed networks flow measurement
-
H. Wang Y. Lin Y. Jin S. Cheng Easily-implemented adaptive packet sampling for high speed networks flow measurement Proc. of 6th International Conference on Computational Science (ICCS'06) 128 135 Proc. of 6th International Conference on Computational Science (ICCS'06) 2006
-
(2006)
, pp. 128-135
-
-
Wang, H.1
Lin, Y.2
Jin, Y.3
Cheng, S.4
-
32
-
-
27944511551
-
An in-depth, analytical study of sampling techniques for self-similar internet traffic
-
G. He J. C. Hou An in-depth, analytical study of sampling techniques for self-similar internet traffic Proc.of 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) 404 413 Proc.of 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05) 2005
-
(2005)
, pp. 404-413
-
-
He, G.1
Hou, J.C.2
-
33
-
-
2442583610
-
New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice
-
C. Estan G. Varghese New directions in traffic measurement and accounting: Focusing on the elephants, ignoring the mice ACM Transactions on Computer Systems (TOCS) 21 3 270 313 2003
-
(2003)
ACM Transactions on Computer Systems (TOCS)
, vol.21
, Issue.3
, pp. 270-313
-
-
Estan, C.1
Varghese, G.2
-
35
-
-
18544383616
-
Learn more, sample less: control of volume and variance in network measurement
-
N. Duffield C. Lund M. Thorup Learn more, sample less: control of volume and variance in network measurement IEEE Transactions on Information Theory 51 5 1756 1775 May 2005
-
(2005)
IEEE Transactions on Information Theory
, vol.51
, Issue.5
, pp. 1756-1775
-
-
Duffield, N.1
Lund, C.2
Thorup, M.3
-
36
-
-
33244459147
-
Estimating arbitrary subset sums with few probes
-
N. Alon N. Duffield C. Lund M. Thorup Estimating arbitrary subset sums with few probes Proc. of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '05) 317 325 Proc. of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems (PODS '05) 2005
-
(2005)
, pp. 317-325
-
-
Alon, N.1
Duffield, N.2
Lund, C.3
Thorup, M.4
-
37
-
-
68949173234
-
Taxonomies of attacks and vulnerabilities in computer systems
-
V. Igure R. Williams Taxonomies of attacks and vulnerabilities in computer systems Communications Surveys & Tutorials, IEEE 10 1 6 19 2008
-
(2008)
Communications Surveys & Tutorials, IEEE
, vol.10
, Issue.1
, pp. 6-19
-
-
Igure, V.1
Williams, R.2
-
38
-
-
12244311689
-
A taxonomy of computer worms
-
N. Weaver V. Paxson S. Stamford R. Cunningham A taxonomy of computer worms Proc. of2003 ACM workshop on Rapid malcode (WORM'03) 11 18 Proc. of2003 ACM workshop on Rapid malcode (WORM'03) 2003
-
(2003)
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Stamford, S.3
Cunningham, R.4
-
39
-
-
15744370034
-
A taxonomy of network and computer attacks
-
S. Hansman R. Hunt A taxonomy of network and computer attacks Computers & Security 24 1 31 43 Feb. 2005
-
(2005)
Computers & Security
, vol.24
, Issue.1
, pp. 31-43
-
-
Hansman, S.1
Hunt, R.2
-
41
-
-
85177016574
-
-
Carnegie Mellon University
-
J. D. Howard An analysis of security incidents on the internet 1989-1995 1998 Carnegie Mellon University
-
(1998)
-
-
Howard, J.D.1
-
42
-
-
85177021195
-
Countering the Largest Security Threat
-
Botnet Detection Spinger
-
Countering the Largest Security Threat 36 2008 Spinger Botnet Detection
-
(2008)
, vol.36
-
-
-
43
-
-
67650349218
-
A taxonomy of botnet structures
-
D. Dagon G. Gu C. Lee A taxonomy of botnet structures Botnet Detection 36 143 164 Oct. 2007
-
(2007)
Botnet Detection
, vol.36
, pp. 143-164
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
-
45
-
-
0343036502
-
AINT misbehaving - A taxonomy of anti-intrusion techniques
-
L. R. Halme R. K. Bauer AINT misbehaving-A taxonomy of anti-intrusion techniques Proc. of 18th NIST-NCSC National Information Systems Security Conference 163 172 Proc. of 18th NIST-NCSC National Information Systems Security Conference 1995
-
(1995)
, pp. 163-172
-
-
Halme, L.R.1
Bauer, R.K.2
-
46
-
-
33947608017
-
Intrusion detection and virology: an analysis of differences, similarities and complementariness
-
B. Morin L. Mé Intrusion detection and virology: an analysis of differences, similarities and complementariness Journal in Computer Virology 3 39 49 Apr. 2007
-
(2007)
Journal in Computer Virology
, vol.3
, pp. 39-49
-
-
Morin, B.1
Mé, L.2
-
48
-
-
44149118912
-
Intrusion techniques: Comparative study of network intrusion detection systems
-
M. Garuba C. Liu D. Fraites Intrusion techniques: Comparative study of network intrusion detection systems Proc. of 5th International Conference on Information Technology: New Generations (ITNG '08) 592 598 Proc. of 5th International Conference on Information Technology: New Generations (ITNG '08) 2008-Apr.
-
(2008)
, pp. 592-598
-
-
Garuba, M.1
Liu, C.2
Fraites, D.3
-
49
-
-
85177010430
-
Consolidation and evaluation of IDS taxonomies
-
M. Almgren E. L. Barse E. Jonsson Consolidation and evaluation of IDS taxonomies Proc. of 8th Nordic Workshop on Secure IT systems (NordSec '03) Proc. of 8th Nordic Workshop on Secure IT systems (NordSec '03) 2003-Oct.
-
(2003)
-
-
Almgren, M.1
Barse, E.L.2
Jonsson, E.3
-
51
-
-
85177010525
-
-
Z. Li Y. Gao Y. Chen Towards a highspeed router-based anomaly/intrusion detection system Aug. 2005 http://conferences.sigcomm.org/sigcomm/2005/poster-121.pdf
-
(2005)
-
-
Li, Z.1
Gao, Y.2
Chen, Y.3
-
52
-
-
84882757196
-
A dos resilient flow-level intrusion detection approach for high-speed networks
-
Y. Gao Ζ. Li Y. Chen A dos resilient flow-level intrusion detection approach for high-speed networks Proc. of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06) 39 Proc. of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS '06) 2006
-
(2006)
, pp. 39
-
-
Gao, Y.1
Li, Ζ.2
Chen, Y.3
-
53
-
-
85132972574
-
Distributed denial of service: Taxonomies of attacks, tools, and countermeasures
-
S. M. Specht R. B. Lee Distributed denial of service: Taxonomies of attacks, tools, and countermeasures Proc. of the ISCA 17th International Conference on Parallel and Distributed Computing Systems (ISCA ΡDCS'04) 543 550 Proc. of the ISCA 17th International Conference on Parallel and Distributed Computing Systems (ISCA ΡDCS'04) 2004-Sep.
-
(2004)
, pp. 543-550
-
-
Specht, S.M.1
Lee, R.B.2
-
54
-
-
33749821117
-
Detection of super sources and destinations in high-speed networks: Algorithms, analysis and evaluation
-
Q. Zhao J. Xu A. Kumar Detection of super sources and destinations in high-speed networks: Algorithms, analysis and evaluation IEEE Journal on Selected Areas in Communications 24 10 1840 1852 Oct. 2006
-
(2006)
IEEE Journal on Selected Areas in Communications
, vol.24
, Issue.10
, pp. 1840-1852
-
-
Zhao, Q.1
Xu, J.2
Kumar, A.3
-
55
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
M.-S. Kim H.-J. Kong S.-C. Hong S.-H. Chung J. Hong A flow-based method for abnormal network traffic detection Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS'04) 599 612 Proc. of IEEE/IFIP Network Operations and Management Symposium (NOMS'04) 2004-Apr.
-
(2004)
, pp. 599-612
-
-
Kim, M.-S.1
Kong, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.5
-
56
-
-
34748852070
-
Real-time analysis of flow data for network attack detection
-
G. Münz G. Carle Real-time analysis of flow data for network attack detection Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM'07) 100 108 Proc. of 10th IFIP/IEEE International Symposium on Integrated Network Management (IM'07) 2007
-
(2007)
, pp. 100-108
-
-
Münz, G.1
Carle, G.2
-
57
-
-
85177015620
-
-
Diadem Firewall European Project Jul. 2008 http://www.diadem-firewall.org
-
(2008)
-
-
-
58
-
-
14944367267
-
Characterization of network-wide anomalies in traffic flows
-
C. D. A. Lakhina M. Crovella Characterization of network-wide anomalies in traffic flows Proc. of 4th ACM SIGCOMM conference on Internet measurement (IMC '04) 201 206 Proc. of 4th ACM SIGCOMM conference on Internet measurement (IMC '04) 2004
-
(2004)
, pp. 201-206
-
-
Lakhina, C.D.A.1
Crovella, M.2
-
61
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
A. Lakhina M. Crovella C. Diot Diagnosing network-wide traffic anomalies Proc. of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '04) 4 219 230 Proc. of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications (SIGCOMM '04) 2004
-
(2004)
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
62
-
-
85177004963
-
-
Sprint.net Jul. 2008 http://www.sprint.net
-
(2008)
-
-
-
63
-
-
56649102068
-
Anomaly characterization in flow-based traffic time series
-
A. Sperotto R. Sadre A. Pras Anomaly characterization in flow-based traffic time series Proc. of the 8th IEEE International Workshop on IP Operations and Management, IPOM 2008 15 27 Proc. of the 8th IEEE International Workshop on IP Operations and Management, IPOM 2008 Samos Greece 2008-Sep.
-
(2008)
, pp. 15-27
-
-
Sperotto, A.1
Sadre, R.2
Pras, A.3
-
64
-
-
85177022596
-
-
SURFnet Jul. 2008 www.surfnet.nl
-
(2008)
-
-
-
65
-
-
33846200876
-
Entropy based worm and anomaly detection in fast IP networks
-
A. Wagner B. Plattner Entropy based worm and anomaly detection in fast IP networks Proc. of 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE '05) 172 177 Proc. of 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE '05) 2005-June
-
(2005)
, pp. 172-177
-
-
Wagner, A.1
Plattner, B.2
-
66
-
-
84940644968
-
A mathematical theory of communication
-
C. E. Shannon A mathematical theory of communication The Bell System Technical Journal 27 3 379 423 1948
-
(1948)
The Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
-
67
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
C. Gates J. McNutt J. Kadane M. Kellner Scan detection on very large networks using logistic regression modeling Proc. of 11th IEEE Symposium on Computers and Communications (ISCC'06) 402 408 Proc. of 11th IEEE Symposium on Computers and Communications (ISCC'06) 2006
-
(2006)
, pp. 402-408
-
-
Gates, C.1
McNutt, J.2
Kadane, J.3
Kellner, M.4
-
68
-
-
43949111011
-
A two-layered anomaly detection technique based on multi-modal flow behavior models
-
M. Stoecklin J.-Y. L. Boudec A. Kind A two-layered anomaly detection technique based on multi-modal flow behavior models Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 212 221 Proc. of 9th International Conference on Passive and Active Measurement (PAM'08) 2008
-
(2008)
, pp. 212-221
-
-
Stoecklin, M.1
Boudec, J.-Y.L.2
Kind, A.3
-
69
-
-
33846190721
-
Host behaviour based early detection of worm outbreaks in internet backbones
-
T. Dübendorfer B. Plattner Host behaviour based early detection of worm outbreaks in internet backbones Proc. of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) 166 171 Proc. of the 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05) 2005
-
(2005)
, pp. 166-171
-
-
Dübendorfer, T.1
Plattner, B.2
-
70
-
-
85177018656
-
A framework for real-time worm attack detection and backbone monitoring
-
T. Dübendorfer A. Wagner B. Plattner A framework for real-time worm attack detection and backbone monitoring Proc.of 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP' 05) Proc.of 1st IEEE International Workshop on Critical Infrastructure Protection (IWCIP' 05) 2005-Nov.
-
(2005)
-
-
Dübendorfer, T.1
Wagner, A.2
Plattner, B.3
-
71
-
-
18844395616
-
Experiences with worm propagation simulations
-
A. Wagner T. Dübendorfer Β. Plattner R. Hiestand Experiences with worm propagation simulations Proc. of 2003 ACM workshop on Rapid malcode (WORM'03) 34 41 Proc. of 2003 ACM workshop on Rapid malcode (WORM'03) 2003
-
(2003)
, pp. 34-41
-
-
Wagner, A.1
Dübendorfer, T.2
Plattner, Β.3
Hiestand, R.4
-
72
-
-
38049088466
-
An approach for classifying internet worms based on temporal behaviors and packet flows
-
M. Lee T. Shon K. Cho M. Chung J. Seo J. Moon An approach for classifying internet worms based on temporal behaviors and packet flows Proc. of 3rd Int. Conf. on Intelligent Computing (ICIC 2007) 646 655 Proc. of 3rd Int. Conf. on Intelligent Computing (ICIC 2007) 2007
-
(2007)
, pp. 646-655
-
-
Lee, M.1
Shon, T.2
Cho, K.3
Chung, M.4
Seo, J.5
Moon, J.6
-
73
-
-
0038349210
-
Code red worm propagation modeling and analysis
-
C. Zou W. Gong D. Towsley Code red worm propagation modeling and analysis Proc. of 17th USENIX Security Symposium (USENIX Security '08) 138 147 Proc. of 17th USENIX Security Symposium (USENIX Security '08) 2002
-
(2002)
, pp. 138-147
-
-
Zou, C.1
Gong, W.2
Towsley, D.3
-
74
-
-
79955063806
-
Flow-based worm detection using correlated honeypot logs
-
F. Dressler W. Jaegers R. German Flow-based worm detection using correlated honeypot logs Proc. of 15th GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) 181 186 Proc. of 15th GI/ITG Fachtagung Kommunikation in Verteilten Systemen (KiVS 2007) 2007-Feb.
-
(2007)
, pp. 181-186
-
-
Dressler, F.1
Jaegers, W.2
German, R.3
-
75
-
-
38149070087
-
Hit-list worm detection and bot identification in large networks using protocol graphs
-
M. Collins M. Reiter Hit-list worm detection and bot identification in large networks using protocol graphs Proc. of 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07) 276 295 Proc. of 10th International Symposium on Recent Advances in Intrusion Detection (RAID'07) 2007
-
(2007)
, pp. 276-295
-
-
Collins, M.1
Reiter, M.2
-
76
-
-
74049084295
-
Wide-scale botnet detection and characterization
-
D. H. A. Karasaridis B. Rexroad Wide-scale botnet detection and characterization Proc.of the first conference on First Workshop on Hot Topics in Understanding Botnets (HotBots'07) 1 8 Proc.of the first conference on First Workshop on Hot Topics in Understanding Botnets (HotBots'07) 2007
-
(2007)
, pp. 1-8
-
-
Karasaridis, D.H.A.1
Rexroad, B.2
-
77
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
C. Livadas R. Walsh D. Lapsley W. Strayer Using machine learning techniques to identify botnet traffic Proc. of 31st IEEE Conference on Local Computer Networks (LCN'06) 967 974 Proc. of 31st IEEE Conference on Local Computer Networks (LCN'06) 2006
-
(2006)
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.4
-
78
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu R. Perdisci J. Zhang W. Lee Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection Proc. of 17th USENIX Security Symposium (USENIX Security '08) 139 154 Proc. of 17th USENIX Security Symposium (USENIX Security '08) 2008-June
-
(2008)
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
79
-
-
77649329707
-
Botnet research survey
-
Z. Zhu G. Lu Y. Chen Ζ. Fu P. Roberts K. Han Botnet research survey 32nd Annual IEEE International Computer Software and Applications (COMPSAC '08) 967 972 32nd Annual IEEE International Computer Software and Applications (COMPSAC '08) 2008-Aug.
-
(2008)
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Ζ.4
Roberts, P.5
Han, K.6
-
80
-
-
85177013705
-
Flow-based anti-spam
-
Q. Xiaofeng H. Jihong C. Ming Flow-based anti-spam Proc. of 4th IEEE Workshop on IP Operations and Management (IPOMV4) 99 103 Proc. of 4th IEEE Workshop on IP Operations and Management (IPOMV4) 2004-Oct.
-
(2004)
, pp. 99-103
-
-
Xiaofeng, Q.1
Jihong, H.2
Ming, C.3
-
81
-
-
85177019266
-
-
The state of spam, a monthly report-july 2008 Jul. 2008 Symantec.com http://www.symantec.com/
-
(2008)
-
-
-
82
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
A. Ramachandran N. Feamster Understanding the network-level behavior of spammers SIGCOMM Comput. Commun. Rev. 36 4 291 302 2006
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
|