-
2
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
New Orleans, LA, pp
-
Burch, H. and Cheswick, B. (2000) 'Tracing anonymous packets to their approximate source', Proceedings of USENIX Large Installation System Administration Conference 2000, New Orleans, LA, pp.319-327.
-
(2000)
Proceedings of USENIX Large Installation System Administration Conference 2000
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
3
-
-
0042474227
-
Modeling the spread of active worms
-
San Francisco, CA
-
Chen, Z., Gao, L. and Kwiat, K. (2003) 'Modeling the spread of active worms', Proceedings of IEEE INFOCOM 2003, San Francisco, CA, Vol. 3, pp.1890-1900.
-
(2003)
Proceedings of IEEE INFOCOM 2003
, vol.3
, pp. 1890-1900
-
-
Chen, Z.1
Gao, L.2
Kwiat, K.3
-
4
-
-
0004204717
-
The Design of GrIDS: A Graph-Based Intrusion Detection System
-
Technical Report CSE-99-2, University of California Davis, Computer Science Department
-
Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Rowe, J., Staniford-Chen, S., Yip, R. and Zerkle, D. (1999) The Design of GrIDS: A Graph-Based Intrusion Detection System, Technical Report CSE-99-2, University of California Davis - Computer Science Department, http://citeseer.nj.nec.com/cheung99design.html.
-
(1999)
-
-
Cheung, S.1
Crawford, R.2
Dilger, M.3
Frank, J.4
Hoagland, J.5
Levitt, K.6
Rowe, J.7
Staniford-Chen, S.8
Yip, R.9
Zerkle, D.10
-
5
-
-
85180777711
-
An algebraic approach to IP traceback
-
San Diego, CA, pp
-
Dean, D., Franklin, M. and Stubblefield, A. (2001) 'An algebraic approach to IP traceback', Proceedings of the 2001 Network and Distributed System Security Symposium, San Diego, CA, pp.1-10.
-
(2001)
Proceedings of the 2001 Network and Distributed System Security Symposium
, pp. 1-10
-
-
Dean, D.1
Franklin, M.2
Stubblefield, A.3
-
7
-
-
85086419824
-
-
Internet Engineering Task Force Homepage
-
Internet Engineering Task Force Homepage (2003) ICMP Traceback (itrace) [www], http://www.ietf.org/html.charters/OLD/ itrace-charter.html.
-
(2003)
ICMP Traceback (itrace) [www]
-
-
-
8
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, pp
-
Jung, J., Paxson, V., Berger, A.W. and Balakrishnan, H. (2004) 'Fast portscan detection using sequential hypothesis testing', Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, pp.211-225.
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
11
-
-
0242314805
-
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S. and Weaver, N. (2003a) The Spread of the Sapphire/Slammer Worm, http://www.caida.org/publications/papers/2003/sapphire/sapphire.html.
-
(2003)
The Spread of the Sapphire/Slammer Worm
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
12
-
-
0042474173
-
Internet quarantine: Requirements for containing self propagating code
-
San Francisco, CA
-
Moore, D., Shannon, C., Voelker, G.M. and Savage, S. (2003b) 'Internet quarantine: Requirements for containing self propagating code', Proceedings of IEEE INFOCOM 2003, San Francisco, CA, Vol. 3, pp.1901-1910.
-
(2003)
Proceedings of IEEE INFOCOM 2003
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
13
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Washington DC, pp
-
Moore, D., Voelker, G. and Savage, S. (2001) 'Inferring internet denial-of-service activity', Proceedings of the 10th USENIX Security Symposium, Washington DC, pp.9-22.
-
(2001)
Proceedings of the 10th USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
14
-
-
84890867180
-
Defense and detection strategies against internet worms
-
Boston, MA, ISBN 1-58053-537-2
-
Nazario, J. (2004) 'Defense and detection strategies against internet worms', Artech House, Boston, MA, ISBN 1-58053-537-2.
-
(2004)
Artech House
-
-
Nazario, J.1
-
16
-
-
85086419345
-
-
NS-2 Homepage (2003) The Network Simulator, NS-2 [www
-
NS-2 Homepage (2003) The Network Simulator - NS-2 [www], http:// www.isi.edu/nsnam/ns/.
-
-
-
-
17
-
-
85086419714
-
-
RawIP Networking FAQ Homepage (1999) RawIP Networking FAQ [www], http://www.ntua.gr/rin/rawfaq.html.
-
RawIP Networking FAQ Homepage (1999) RawIP Networking FAQ [www], http://www.ntua.gr/rin/rawfaq.html.
-
-
-
-
18
-
-
85086419439
-
-
Reiss, S. (2003) 'Hope is a lousy defense - interview with bill joy', Wired Magazine, No. 11.12, pp.8-11.
-
Reiss, S. (2003) 'Hope is a lousy defense - interview with bill joy', Wired Magazine, No. 11.12, pp.8-11.
-
-
-
-
19
-
-
0036947597
-
Single-packet IP traceback
-
Snoeren, A., Partridge, C., Sanchez, L., Jones, C., Tchakountio, F., Schwartz, B., Kent, S. and Strayer, W. (2002) 'Single-packet IP traceback', IEEE/ACM Transactions on Networking (ToN), Vol. 10, No. 6, pp.721-734.
-
(2002)
IEEE/ACM Transactions on Networking (ToN)
, vol.10
, Issue.6
, pp. 721-734
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
Jones, C.4
Tchakountio, F.5
Schwartz, B.6
Kent, S.7
Strayer, W.8
-
20
-
-
85084162258
-
How to own the internet in your spare time
-
San Francisco, CA, pp
-
Staniford, S., Paxson, V. and Weaver, N. (2002) 'How to own the internet in your spare time', Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, pp.149-167.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
22
-
-
85084164480
-
Very fast containment of scanning worms
-
San Diego, CA, pp
-
Weaver, N., Staniford, S. and Paxson, V. (2004) 'Very fast containment of scanning worms', Proceedings of the 13th USENIX Security Symposium San Diego, CA, pp.29-44.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 29-44
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
24
-
-
84944731126
-
Design, implementation and test of an email virus throttle
-
Las Vegas, NV, pp
-
Williamson, M.M. (2003) 'Design, implementation and test of an email virus throttle', Proceedings of the 19th Annual Computer Security Applications Conference, Las Vegas, NV, pp.76-85.
-
(2003)
Proceedings of the 19th Annual Computer Security Applications Conference
, pp. 76-85
-
-
Williamson, M.M.1
-
25
-
-
27544495684
-
Worm origin identification using random moonwalks
-
Oakland, CA, pp
-
Xie, Y., Sekar, V., Maltz, D., Reiter, M. and Zhang, H. (2005) 'Worm origin identification using random moonwalks', Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, pp.242-256.
-
(2005)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 242-256
-
-
Xie, Y.1
Sekar, V.2
Maltz, D.3
Reiter, M.4
Zhang, H.5
|