-
1
-
-
78549255477
-
-
NOX Box. http://noxrepo.org/manual/noxbox.html.
-
NOX Box
-
-
-
3
-
-
78549285545
-
SEPIA: Aggregation of Network Measurements Using Multiparty Computation
-
Zurich, Switzerland, Apr.
-
SEPIA: Aggregation of Network Measurements Using Multiparty Computation. In Passive & Active Measurement (PAM), Zurich, Switzerland, Apr. 2010.
-
(2010)
Passive & Active Measurement (PAM)
-
-
-
4
-
-
72849124827
-
Fighting Coordinated Attackers with Cross-Organizational Information Sharing
-
M. Allman, E. Blanton, V. Paxson, and S. Shenker. Fighting Coordinated Attackers with Cross-Organizational Information Sharing. In Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V), Irvine, CA, Nov. 2006.
-
Proc. 5th ACM Workshop on Hot Topics in Networks (Hotnets-V), Irvine, CA, Nov. 2006
-
-
Allman, M.1
Blanton, E.2
Paxson, V.3
Shenker, S.4
-
5
-
-
84907332158
-
Principles for Developing Comprehensive Network Visibility
-
M. Allman, C. Kreibich,, V. Paxson, R. Sommer, and N. Weaver. Principles for Developing Comprehensive Network Visibility. In Proc. 3rd Usenix Workshop on Hot Topics in Security (HotSec), San Jose, CA, July 2008.
-
Proc. 3rd Usenix Workshop on Hot Topics in Security (HotSec), San Jose, CA, July 2008
-
-
Allman, M.1
Kreibich, C.2
Paxson, V.3
Sommer, R.4
Weaver, N.5
-
6
-
-
84878677794
-
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic
-
M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, and D. Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. In Proc. ACM SIGCOMM Internet Measurement Conference, New Orleans, LA, Oct. 2005.
-
Proc. ACM SIGCOMM Internet Measurement Conference, New Orleans, LA, Oct. 2005
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Provos, N.4
Rosaen, K.5
Watson, D.6
-
8
-
-
70349272437
-
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
-
Chris Kanich and Christian Kreibich and Kirill Levchenko and Brandon Enright and Vern Paxson and Geoffrey M. Voelker and Stefan Savage,. Spamalytics: an Empirical Analysis of Spam Marketing Conversion. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), Arlington, VA, Oct. 2008.
-
Proceedings of the ACM Conference on Computer and Communications Security (CCS), Arlington, VA, Oct. 2008
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Paxson, V.5
Voelker, G.M.6
Stefan Savage7
-
11
-
-
84888402098
-
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In 1st USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Cambridge, MA, July 2005.
-
1st USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), Cambridge, MA, July 2005
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
13
-
-
84904814990
-
Improving Spam Detection Based on Structural Similarity
-
L. H. Gomes, F. D. O. Castro, R. B. Almeida, L. M. A. Bettencourt, V. A. F. Almeida, and J. M. Almeida. Improving Spam Detection Based on Structural Similarity. In Proc. SRUTI Workshop, Cambridge, MA, July 2005.
-
Proc. SRUTI Workshop, Cambridge, MA, July 2005
-
-
Gomes, L.H.1
Castro, F.D.O.2
Almeida, R.B.3
Bettencourt, L.M.A.4
Almeida, V.A.F.5
Almeida, J.M.6
-
14
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. 17th USENIX Security Symposium, Vancouver, BC, Canada, Aug. 2008.
-
Proc. 17th USENIX Security Symposium, Vancouver, BC, Canada, Aug. 2008
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
15
-
-
85041447270
-
Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine
-
S. Hao, N. Syed, N. Feamster, A. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In Proc. 18th USENIX Security Symposium, Montreal, Quebec, Canada, Aug. 2009.
-
Proc. 18th USENIX Security Symposium, Montreal, Quebec, Canada, Aug. 2009
-
-
Hao, S.1
Syed, N.2
Feamster, N.3
Gray, A.4
Krasser, S.5
-
17
-
-
78549276769
-
-
Technical report, Georgia Tech, May Number forthcoming. Available upon request
-
Y. Huang, N. Feamster, A. Lakhina, and J. Xu. Exposing routing problems with network-wide analysis. Technical report, Georgia Tech, May 2006. Number forthcoming. Available upon request.
-
(2006)
Exposing Routing Problems with Network-wide Analysis
-
-
Huang, Y.1
Feamster, N.2
Lakhina, A.3
Xu, J.4
-
19
-
-
84904797011
-
Email Communities of Interest
-
L. Johansen, M. Rowell, K. Butler, and P. McDaniel. Email Communities of Interest. In 4th Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2007.
-
4th Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2007
-
-
Johansen, L.1
Rowell, M.2
Butler, K.3
McDaniel, P.4
-
20
-
-
79960561313
-
Collaborating Against Common Enemies
-
S. Katti, B. Krishnamurthy,, and D. Katabi. Collaborating Against Common Enemies. In Proc. ACM SIGCOMM Internet Measurement Conference, New Orleans, LA, Oct. 2005.
-
Proc. ACM SIGCOMM Internet Measurement Conference, New Orleans, LA, Oct. 2005
-
-
Katti, S.1
Krishnamurthy, B.2
Katabi, D.3
-
22
-
-
78549276067
-
Scalable and Reliabile Collaborative Spam Filters: Harnessing the Global Socail Email Networks
-
J. Kong et al. Scalable and Reliabile Collaborative Spam Filters: Harnessing the Global Socail Email Networks. In 3rd Annual Workshop on the Weblogging Ecosystem, 2006.
-
3rd Annual Workshop on the Weblogging Ecosystem, 2006
-
-
Kong, J.1
-
23
-
-
8344255864
-
Structural analysis of network traffic flows
-
New York, NY, June
-
A. Lakhina, K. Papagiannaki, M. Crovella, C. Diot, E. D. Kolaczyk, and N. Taft. Structural analysis of network traffic flows. In Proc. ACM SIGMETRICS, pages 61-72, New York, NY, June 2004.
-
(2004)
Proc. ACM Sigmetrics
, pp. 61-72
-
-
Lakhina, A.1
Papagiannaki, K.2
Crovella, M.3
Diot, C.4
Kolaczyk, E.D.5
Taft, N.6
-
25
-
-
78549275703
-
-
OpenFlow Switch Consortium. http://www.openflowswitch.org/, 2008.
-
(2008)
-
-
-
26
-
-
85084096263
-
Mao. Peeking into Spammer Behavior from a Unique Vantage Point
-
A. Pathak, Y. C. Hu, and Z. M. Mao. Peeking into Spammer Behavior from a Unique Vantage Point. In Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, Apr. 2008.
-
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), San Francisco, CA, Apr. 2008
-
-
Pathak, A.1
Hu, Y.C.2
Mao, Z.M.3
-
27
-
-
78549236760
-
Behavioral Clustering of HTTP-Based Malware
-
R. Perdisci, W. Lee, and N. Feamster. Behavioral Clustering of HTTP-Based Malware. In Proc. 7th USENIX NSDI, San Jose, CA, Apr. 2010.
-
Proc. 7th USENIX NSDI, San Jose, CA, Apr. 2010
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
29
-
-
78549236762
-
-
Pyzor. http://pyzor.sourceforge.net/.
-
Pyzor
-
-
-
30
-
-
78549269036
-
Can DNSBLs Keep Up with Bots?
-
A. Ramachandran, D. Dagon, and N. Feamster. Can DNSBLs Keep Up with Bots? In 3rd Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2006.
-
3rd Conference on Email and Anti-Spam (CEAS), Mountain View, CA, July 2006
-
-
Ramachandran, A.1
Dagon, D.2
Feamster, N.3
-
31
-
-
33847737144
-
Understanding the Network-Level Behavior of Spammers
-
An earlier version appeared as Georgia Tech TR GT-CSS-2006-001
-
A. Ramachandran and N. Feamster. Understanding the Network-Level Behavior of Spammers. In Proc. ACM SIGCOMM, Pisa, Italy, Aug. 2006. An earlier version appeared as Georgia Tech TR GT-CSS-2006-001.
-
Proc. ACM SIGCOMM, Pisa, Italy, Aug. 2006
-
-
Ramachandran, A.1
Feamster, N.2
-
32
-
-
77952388137
-
Filtering spam with behavioral blacklisting
-
A. Ramachandran, N. Feamster, and S. Vempala. Filtering spam with behavioral blacklisting. In Proc. 14th ACM Conference on Computer and Communications Security, Alexandria, VA, Oct. 2007.
-
Proc. 14th ACM Conference on Computer and Communications Security, Alexandria, VA, Oct. 2007
-
-
Ramachandran, A.1
Feamster, N.2
Vempala, S.3
-
33
-
-
78549272278
-
-
Secure Computing IronMail. http: //www.securecomputing.com/index.cfm? skey=1612, 2007.
-
(2007)
Secure Computing IronMail
-
-
-
34
-
-
78549234962
-
-
SpamCop. http://www.spamcop.net/.
-
SpamCop
-
-
-
35
-
-
78549249708
-
-
Spamhaus, 2006. http://www.spamhaus.org/.
-
(2006)
Spamhaus
-
-
-
36
-
-
33747144912
-
-
May
-
S. J. Stolfo, S. Hershkop, C.-W. Hu, W.-J. Li, O. Nimeskern, and K. Wang. Behavior-based modeling and its application to Email analysis. 6(2):187-221, May 2006.
-
(2006)
Behavior-based Modeling and Its Application to Email Analysis
, vol.6
, Issue.2
, pp. 187-221
-
-
Stolfo, S.J.1
Hershkop, S.2
Hu, C.-W.3
Li, W.-J.4
Nimeskern, O.5
Wang, K.6
-
38
-
-
78549257712
-
Spamming bots: Signatures and characteristics
-
Y. Xie, F. Yu, , K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming bots: Signatures and characteristics. In Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008.
-
Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
39
-
-
36949011812
-
How dynamic are IP addresses
-
Y. Xie, F. Yu, K. Achan, E. Gilum, M. Goldszmidt, and T. Wobber. How dynamic are IP addresses. In Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007.
-
Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gilum, E.4
Goldszmidt, M.5
Wobber, T.6
|