-
1
-
-
85092041921
-
-
EMIST project
-
EMIST project. http://emist.ist.psu.edu.
-
-
-
-
2
-
-
33847123551
-
Experience with DETER: A testbed for security research
-
Barcelona, Spain, March
-
T. Benzel, B. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experience with DETER: A testbed for security research. In Proc. 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCOM'06), Barcelona, Spain, March, 2006.
-
(2006)
Proc. 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCOM'06)
-
-
Benzel, T.1
Braden, B.2
Kim, D.3
Neuman, C.4
Joseph, A.5
Sklower, K.6
Ostrenga, R.7
Schwab, S.8
-
3
-
-
33751059721
-
-
Technical Report SRI-CSL-05-03, Computer Science Laboratory, SRI
-
L. Briesemeister, P. Porras, and A. Tiwari. Model checking of worm quarantine and counter-quarantine under a group defense. Technical Report SRI-CSL-05-03, Computer Science Laboratory, SRI, 1992.
-
(1992)
Model checking of worm quarantine and counter-quarantine under a group defense
-
-
Briesemeister, L.1
Porras, P.2
Tiwari, A.3
-
5
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
New York, NY, ACM Press
-
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, Farnam Jahanian, and Danny McPherson. Toward understanding distributed blackhole placement. In WORM'04: Proceedings of the 2004 ACM workshop on Rapid malcode, pages 54-64, New York, NY, 2004. ACM Press.
-
(2004)
WORM'04: Proceedings of the 2004 ACM workshop on Rapid malcode
, pp. 54-64
-
-
Cooke, Evan1
Bailey, Michael2
Morley Mao, Z.3
Watson, David4
Jahanian, Farnam5
McPherson, Danny6
-
6
-
-
28044442580
-
Honeystat: Local worm detection using honeypots
-
Sophia Antipolis, France, September
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levin, and H. Owen. Honeystat: Local worm detection using honeypots. In Proceedings of The 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004), Sophia Antipolis, France, September 2004.
-
(2004)
Proceedings of The 7th International Symposium on Recent Advances in Intrusion Detection (RAID 2004)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levin, J.6
Owen, H.7
-
7
-
-
85077703150
-
Polymorphic blending attacks
-
Prahlad Fogla, Monirul Sharif, Roberto Perdisci, Oleg Kolesnikov, and Wenke Lee. Polymorphic blending attacks. In Proc. 15th USENIX Security Symposium, 2006.
-
(2006)
Proc. 15th USENIX Security Symposium
-
-
Fogla, Prahlad1
Sharif, Monirul2
Perdisci, Roberto3
Kolesnikov, Oleg4
Lee, Wenke5
-
8
-
-
85092060116
-
Proactive containment of fast scanning worms through white detection
-
September
-
Y. Jhi, P. Liu, L. Li, Q. Gu, J. Jing, and G. Kesidis. Proactive containment of fast scanning worms through white detection. In Proceedings of 3rd International Conference on Security and Privacy in Communication Networks, September 2007.
-
(2007)
Proceedings of 3rd International Conference on Security and Privacy in Communication Networks
-
-
Jhi, Y.1
Liu, P.2
Li, L.3
Gu, Q.4
Jing, J.5
Kesidis, G.6
-
10
-
-
85092073527
-
Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating Internet worms
-
G. Kesidis, I. Hamadeh, and S. Jiwasurat. Coupled Kermack-Mckendrick models for randomly scanning and bandwidth saturating Internet worms. ACM TOMACS, 2007.
-
(2007)
ACM TOMACS
-
-
Kesidis, G.1
Hamadeh, I.2
Jiwasurat, S.3
-
11
-
-
84878718671
-
Building a time machine for efficient recording and retrieval of high-volume network traffic
-
Berkeley, CA, Oct
-
S. Kornexl, V. Paxson, H. Dreger, A. Feldmann, and R. Sommer. Building a time machine for efficient recording and retrieval of high-volume network traffic. In Proc. Internet Measurement Conference 2005, Berkeley, CA, Oct, 2005.
-
(2005)
Proc. Internet Measurement Conference 2005
-
-
Kornexl, S.1
Paxson, V.2
Dreger, H.3
Feldmann, A.4
Sommer, R.5
-
12
-
-
71649113735
-
Emulation of sequential scanning worms in large enterprises
-
Barcelona, Spain, March
-
L. Li, S. Jiwasurat, I. Hamadeh, P. Liu, G. Kesidis, and C. Neuman. Emulation of sequential scanning worms in large enterprises. In Proc. 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCOM'06), Barcelona, Spain, March, 2006.
-
(2006)
Proc. 2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCOM'06)
-
-
Li, L.1
Jiwasurat, S.2
Hamadeh, I.3
Liu, P.4
Kesidis, G.5
Neuman, C.6
-
13
-
-
71649107704
-
Emulation of single packet UDP scanning worms in large enterprises
-
Beijing, China, August
-
L. Li, S. Jiwasurat, P. Liu, and G. Kesidis. Emulation of single packet UDP scanning worms in large enterprises. In Proc. 19 International Teletraffic Congress (ITC19), Beijing, China, August, 2005.
-
(2005)
Proc. 19 International Teletraffic Congress (ITC19)
-
-
Li, L.1
Jiwasurat, S.2
Liu, P.3
Kesidis, G.4
-
14
-
-
34547346848
-
Visual toolkit for network security experiment specification and data analysis
-
New York, NY, USA, ACM Press
-
L. Li, P. Liu, and G. Kesidis. Visual toolkit for network security experiment specification and data analysis. In VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security, pages 7-14, New York, NY, USA, 2006. ACM Press.
-
(2006)
VizSEC '06: Proceedings of the 3rd international workshop on Visualization for computer security
, pp. 7-14
-
-
Li, L.1
Liu, P.2
Kesidis, G.3
-
15
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience
-
Z. Li, M. Sanghi, Y. Chen, M. Y. Kao, and B. Chavez. Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resilience. In Proceedings of IEEE Symposium on Security and Privacy, 2006.
-
(2006)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M. Y.4
Chavez, B.5
-
16
-
-
18844367440
-
Simulating realistic network worm traffic for worm warning system design and testing
-
Washington, DC
-
M. Liljenstam, D. Nicol, V. Berk, and R. Gray. Simulating realistic network worm traffic for worm warning system design and testing. In Proc. ACM WORM, Washington, DC, 2003.
-
(2003)
Proc. ACM WORM
-
-
Liljenstam, M.1
Nicol, D.2
Berk, V.3
Gray, R.4
-
18
-
-
14944359480
-
A hybrid quarantine defense
-
Washington, DC, Oct. 29
-
P. Porras, L. Biesemeister, K. Levitt, J. Rowe, K. Skinner, and A. Ting. A hybrid quarantine defense. In Proc. ACM WORM, Washington, DC, Oct. 29, 2004.
-
(2004)
Proc. ACM WORM
-
-
Porras, P.1
Biesemeister, L.2
Levitt, K.3
Rowe, J.4
Skinner, K.5
Ting, A.6
-
19
-
-
31844457315
-
Worm evolution tracking via timing analysis
-
New York, NY, USA, ACM Press
-
Moheeb Abu Rajab, Fabian Monrose, and Andreas Terzis. Worm evolution tracking via timing analysis. In WORM'05: Proceedings of the 2005 ACM workshop on Rapid malcode, pages 52-59, New York, NY, USA, 2005. ACM Press.
-
(2005)
WORM'05: Proceedings of the 2005 ACM workshop on Rapid malcode
, pp. 52-59
-
-
Rajab, Moheeb Abu1
Monrose, Fabian2
Terzis, Andreas3
-
21
-
-
84991765629
-
Automated worm fingerprinting
-
Sumeet Singh, Cristian Estan, George Varghese, and Stefan Savage. Automated worm fingerprinting. In OSDI, pages 45-60, 2004.
-
(2004)
OSDI
, pp. 45-60
-
-
Singh, Sumeet1
Estan, Cristian2
Varghese, George3
Savage, Stefan4
-
22
-
-
25844462447
-
Defending against Internet worms: A signature-based approach
-
Miami, Florida, May
-
Y. Tang and S. Chen. Defending against Internet worms: A signature-based approach. In Proc. of IEEE INFOCOM'05, Miami, Florida, May 2005.
-
(2005)
Proc. of IEEE INFOCOM'05
-
-
Tang, Y.1
Chen, S.2
-
23
-
-
14944358991
-
Preliminary results using scale-down to explore worm dynamics
-
Washington, DC, Oct
-
N. Weaver, I. Hamadeh, G. Kesidis, and V. Paxson. Preliminary results using scale-down to explore worm dynamics. In Proc. ACM WORM, Washington, DC, Oct. 2004.
-
(2004)
Proc. ACM WORM
-
-
Weaver, N.1
Hamadeh, I.2
Kesidis, G.3
Paxson, V.4
-
25
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
IEEE Computer Society
-
Matthew M. Williamson. Throttling viruses: Restricting propagation to defeat malicious mobile code. In ACSAC, pages 61-68. IEEE Computer Society, 2002.
-
(2002)
ACSAC
, pp. 61-68
-
-
Williamson, Matthew M.1
-
27
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
New York, NY, ACM Press
-
Cliff Changchun Zou, Weibo Gong, and Don Towsley. Worm propagation modeling and analysis under dynamic quarantine defense. In WORM'03: Proceedings of the 2003 ACM workshop on Rapid malcode, pages 51-60, New York, NY, 2003. ACM Press.
-
(2003)
WORM'03: Proceedings of the 2003 ACM workshop on Rapid malcode
, pp. 51-60
-
-
Zou, Cliff Changchun1
Gong, Weibo2
Towsley, Don3
|