-
1
-
-
81055140475
-
OPTWALL: A Traffic-Aware Hierarchical Firewall Optimization
-
S. Acharya, M. Abliz, B. Mills, T. F. Znati, J. Wang, Z. Ge, and A. Greenberg. OPTWALL: A Traffic-Aware Hierarchical Firewall Optimization. In Proc. NDSS, 2007.
-
Proc. NDSS, 2007
-
-
Acharya, S.1
Abliz, M.2
Mills, B.3
Znati, T.F.4
Wang, J.5
Ge, Z.6
Greenberg, A.7
-
2
-
-
79951685365
-
Compressing Rectilinear Pictures and Minimizing Access Control Lists
-
D. L. Applegate, G. Calinescu, D. S. Johnson, H. Karloff, K. Ligett, and J. Wang. Compressing Rectilinear Pictures and Minimizing Access Control Lists. In Proc. SODA, 2007.
-
Proc. SODA, 2007
-
-
Applegate, D.L.1
Calinescu, G.2
Johnson, D.S.3
Karloff, H.4
Ligett, K.5
Wang, J.6
-
4
-
-
79951689998
-
-
AT&T Enterprise Threat Management. http://www.business.att.com/ enterprise/Family/business-continuity-enterprise/threat-management-enterprise/.
-
-
-
-
7
-
-
85032963495
-
Design and implementation of a Routing Control Platform
-
M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and J. van der Merwe. Design and implementation of a Routing Control Platform. In Proc. NSDI, 2005.
-
Proc. NSDI, 2005
-
-
Caesar, M.1
Caldwell, D.2
Feamster, N.3
Rexford, J.4
Shaikh, A.5
Van Der Merwe, J.6
-
8
-
-
77953861458
-
Reformulating the Monitor Placement problem: Optimal Network-Wide Sampling
-
G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran. Reformulating the Monitor Placement problem: Optimal Network-Wide Sampling. In Proc. CoNeXT, 2006.
-
Proc. CoNeXT, 2006
-
-
Cantieni, G.R.1
Iannaccone, G.2
Barakat, C.3
Diot, C.4
Thiran, P.5
-
10
-
-
27544502282
-
Optimization of network firewalls policies using directed acyclic graphs
-
E. W. Fulp. Optimization of network firewalls policies using directed acyclic graphs. In Proc. Internet Management Conference, 2005.
-
Proc. Internet Management Conference, 2005
-
-
Fulp, E.W.1
-
12
-
-
0041904827
-
Deriving Traffic Demands for Operational IP Networks: Methodology and Experience
-
A. Feldmann, A. G. Greenberg, C. Lund, N. Reingold, J. Rexford, and F. True. Deriving Traffic Demands for Operational IP Networks: Methodology and Experience. In Proc. ACM SIGCOMM, 2000.
-
Proc. ACM SIGCOMM, 2000
-
-
Feldmann, A.1
Greenberg, A.G.2
Lund, C.3
Reingold, N.4
Rexford, J.5
True, F.6
-
13
-
-
84910626227
-
A Parallel Architecture for Stateful, High-Speed Intrusion Detection
-
L. Foschini, A. V. Thapliyal, L. Cavallaro, C. Kruegel, and G. Vigna. A Parallel Architecture for Stateful, High-Speed Intrusion Detection. In Proc. ICISS, 2008.
-
Proc. ICISS, 2008
-
-
Foschini, L.1
Thapliyal, A.V.2
Cavallaro, L.3
Kruegel, C.4
Vigna, G.5
-
14
-
-
33750037341
-
A Clean Slate 4D Approach to Network Control and Management
-
Oct.
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Meyers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang. A Clean Slate 4D Approach to Network Control and Management. ACM SIGCOMM CCR, 35(5), Oct. 2005.
-
(2005)
ACM SIGCOMM CCR
, vol.35
, Issue.5
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Meyers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
17
-
-
67650317025
-
Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention
-
J. Gonzalez, V. Paxson, and N. Weaver. Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention. In Proc. ACM CCS, 2007.
-
Proc. ACM CCS, 2007
-
-
Gonzalez, J.1
Paxson, V.2
Weaver, N.3
-
21
-
-
70249096351
-
Correlation-Based Load Balancing for Intrusion Detection and Prevention Systems
-
A. Le, E. Al-Shaer, and R. Batouba. Correlation-Based Load Balancing for Intrusion Detection and Prevention Systems. In Proc. SECURECOMM, 2008.
-
Proc. SECURECOMM, 2008
-
-
Le, A.1
Al-Shaer, E.2
Batouba, R.3
-
22
-
-
38149021772
-
MIND: A Distributed Multidimensional Indexing for Network Diagnosis
-
X. Li, F. Bian, H. Zhang, C. Diot, R. Govindan, W. Hong, and G. Iannaccone. MIND: A Distributed Multidimensional Indexing for Network Diagnosis. In Proc. IEEE INFOCOM, 2006.
-
Proc. IEEE INFOCOM, 2006
-
-
Li, X.1
Bian, F.2
Zhang, H.3
Diot, C.4
Govindan, R.5
Hong, W.6
Iannaccone, G.7
-
24
-
-
25644441776
-
Configuring Networks with Content Filtering Nodes with Applications to Network Security
-
M. Kodialam, T. V. Lakshman, and Sudipta Sengupta. Configuring Networks with Content Filtering Nodes with Applications to Network Security. In Proc. INFOCOM, 2005.
-
Proc. INFOCOM, 2005
-
-
Kodialam, M.1
Lakshman, T.V.2
Sengupta, S.3
-
27
-
-
55349083998
-
Declarative infrastructure configuration synthesis and debugging
-
S. Narain, G. Levin, S. Malik, and V. Kaul. Declarative infrastructure configuration synthesis and debugging. Journal of Network and Systems Management, 16(3), 2008.
-
(2008)
Journal of Network and Systems Management
, vol.16
, Issue.3
-
-
Narain, S.1
Levin, G.2
Malik, S.3
Kaul, V.4
-
28
-
-
0033295259
-
Bro: A System for Detecting Network Intruders in Real-Time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
29
-
-
51249173817
-
Randomized rounding: A technique for provably good algorithms and algorithmic proofs
-
Dec.
-
P. Raghavan and C. D. Thompson. Randomized rounding: A technique for provably good algorithms and algorithmic proofs. Combinatorica, 7(4), Dec. 1987.
-
(1987)
Combinatorica
, vol.7
, Issue.4
-
-
Raghavan, P.1
Thompson, C.D.2
-
30
-
-
49749137793
-
Performance of estimated traffic matrices in traffic engineering
-
M. Roughan, M. Thorup, and Y. Zhang. Performance of estimated traffic matrices in traffic engineering. In SIGMETRICS, 2003.
-
(2003)
SIGMETRICS
-
-
Roughan, M.1
Thorup, M.2
Zhang, Y.3
-
31
-
-
79951700744
-
-
Technical Report, CMU-CS-10-124, Comp. Sci. Dept., CMU
-
V. Sekar, R. Krishnaswamy, A. Gupta, and M. K. Reiter. Network-Wide Deployment of Intrusion Detection and Prevention Systems. Technical Report, CMU-CS-10-124, Comp. Sci. Dept., CMU, 2010.
-
(2010)
Network-Wide Deployment of Intrusion Detection and Prevention Systems
-
-
Sekar, V.1
Krishnaswamy, R.2
Gupta, A.3
Reiter, M.K.4
-
32
-
-
84999424855
-
cSamp: A System for Network-Wide Flow Monitoring
-
V. Sekar, M. K. Reiter,W. Willinger, H. Zhang, R. Kompella, and D. G. Andersen. cSamp: A System for Network-Wide Flow Monitoring. In Proc. NSDI, 2008.
-
Proc. NSDI, 2008
-
-
Sekar, V.1
Reiter, M.K.2
Willinger, W.3
Zhang, H.4
Kompella, R.5
Andersen, D.G.6
-
33
-
-
70449118958
-
Scalable Coordination Techniques for Distributed Network Monitoring
-
M. R. Sharma and J. W. Byers. Scalable Coordination Techniques for Distributed Network Monitoring. In Proc. PAM, 2005.
-
Proc. PAM, 2005
-
-
Sharma, M.R.1
Byers, J.W.2
-
34
-
-
33846281935
-
Exploiting Independent State for Network Intrusion Detection
-
R. Sommer and V. Paxson. Exploiting Independent State for Network Intrusion Detection. In Proc. ACSAC, 2005.
-
Proc. ACSAC, 2005
-
-
Sommer, R.1
Paxson, V.2
-
35
-
-
67650434654
-
An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention
-
R. Sommer, V. Paxson, and N. Weaver. An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention. Concurrency and Computation: Practice and Experience, Wiley, 21(10):1255-1279, 2009.
-
(2009)
Concurrency and Computation: Practice and Experience, Wiley
, vol.21
, Issue.10
, pp. 1255-1279
-
-
Sommer, R.1
Paxson, V.2
Weaver, N.3
-
37
-
-
25844461901
-
Locating Network Monitors: Complexity, heuristics and coverage
-
K. Suh, Y. Guo, J. Kurose, and D. Towsley. Locating Network Monitors: Complexity, heuristics and coverage. In Proc. IEEE INFOCOM, 2005.
-
Proc. IEEE INFOCOM, 2005
-
-
Suh, K.1
Guo, Y.2
Kurose, J.3
Towsley, D.4
-
38
-
-
65249090163
-
The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware
-
M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney. The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware. In Proc. RAID, 2007.
-
Proc. RAID, 2007
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
|