-
1
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
DOI 10.1145/1177080.1177086, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
Abu Rajab, M., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: ACM SIGCOMM Conference on Internet Measurement (IMC), pp. 41-52 (2006) (Pubitemid 47165587)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
2
-
-
21644455102
-
Performance debugging for distributed systems of black boxes
-
SOSP'03: Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
Aguilera, M., Mogul, J.,Wiener, J., Reynolds, P., Muthitacharoen, A.: Performance debugging for distributed systems of black boxes. In: Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, pp. 74-89 (2003) (Pubitemid 40929689)
-
(2003)
Operating Systems Review (ACM)
, vol.37
, Issue.5
, pp. 74-89
-
-
Aguilera, M.K.1
Mogul, J.C.2
Wiener, J.L.3
Reynolds, P.4
Muthitacharoen, A.5
-
3
-
-
3042742908
-
An analysis of the slapper worm
-
Arce, I., Levy, E.: An analysis of the slapper worm. IEEE Security and Privacy 1(1), 82-87 (2003)
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
4
-
-
84892062680
-
A survey of clustering data mining techniques
-
Springer, Heidelberg
-
Berkhin, P.: A survey of clustering data mining techniques. In: Grouping Multidimensional Data, pp. 25-71. Springer, Heidelberg (2006)
-
(2006)
Grouping Multidimensional Data
, pp. 25-71
-
-
Berkhin, P.1
-
6
-
-
66549111364
-
Automating network application dependency discovery: Experiences, limitations, and new solutions
-
Chen, X., Zhang, M., Mao, Z.M., Bahl, P.: Automating network application dependency discovery: Experiences, limitations, and new solutions. In: Proceedings of OSDI (2008)
-
(2008)
Proceedings of OSDI
-
-
Chen, X.1
Zhang, M.2
Mao, Z.M.3
Bahl, P.4
-
8
-
-
38149070087
-
Hit-list worm detection and bot identification in large networks using protocol graphs
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007,Springer, Heidelberg
-
Collins, M.P., Reiter, M.K.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 276-295. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 276-295
-
-
Collins, M.P.1
Reiter, M.K.2
-
9
-
-
33646023117
-
An introduction to roc analysis
-
Fawcett, T.: An introduction to roc analysis. Pattern Recogn. Lett. 27(8), 861-874 (2006)
-
(2006)
Pattern Recogn. Lett.
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
10
-
-
51849132124
-
Towards malware inspired management frameworks
-
Fraņcois, J., State, R., Festor, O.: Towards malware inspired management frameworks. In: IEEE/IFIP Network Operations and Management Symposium (NOMS), pp. 105-112 (2008)
-
(2008)
IEEE/IFIP Network Operations and Management Symposium, NOMS
, pp. 105-112
-
-
Fraņcois, J.1
State, R.2
Festor, O.3
-
11
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
July 2008,San Jose, CA
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: USENIX Security Symposium (SS), July 2008, pp. 139-154. San Jose, CA (2008)
-
(2008)
USENIX Security Symposium (SS)
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
12
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
August
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: Bothunter: detecting malware infection through ids-driven dialog correlation. In: USENIX Security Symposium (SS) (August 2007)
-
(2007)
USENIX Security Symposium (SS)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
13
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: Workshop on Large-Scale Exploits and Emergent Threats (LEET). USENIX (2008)
-
(2008)
Workshop on Large-Scale Exploits and Emergent Threats (LEET). USENIX
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
14
-
-
61649121370
-
Towards next-generation botnets
-
IEEE Computer Society, Los Alamitos
-
Hund, R., Hamann, M., Holz, T.: Towards next-generation botnets. In: EC2ND: European Conference on Computer Network Defense, pp. 33-40. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
EC2ND: European Conference on Computer Network Defense
, pp. 33-40
-
-
Hund, R.1
Hamann, M.2
Holz, T.3
-
15
-
-
76749108118
-
Exploiting dynamicity in graphbased traffic analysis: Techniques and applications
-
Iliofotou, M., Faloutsos, M., Mitzenmacher, M.: Exploiting dynamicity in graphbased traffic analysis: techniques and applications. In: ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT (2009)
-
(2009)
ACM International Conference on Emerging Networking Experiments and Technologies, CoNEXT
-
-
Iliofotou, M.1
Faloutsos, M.2
Mitzenmacher, M.3
-
17
-
-
35248866616
-
Koorde: A simple degree-optimal distributed hash table
-
Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003,Springer, Heidelberg
-
Kaashoek, M.F., Karger, D.R.: Koorde: A simple degree-optimal distributed hash table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol. 2735. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2735
-
-
Kaashoek, M.F.1
Karger, D.R.2
-
18
-
-
65249128484
-
What's going on?: Learning communication rules in edge networks
-
Kandula, S., Chandra, R., Katabi, D.: What's going on?: learning communication rules in edge networks. In: Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, pp. 87-98 (2008)
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication
, pp. 87-98
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
19
-
-
33847303101
-
BLINC: Multilevel traffic classification in the dark
-
Karagiannis, T., Papagiannaki, K., Faloutsos, M.: BLINC: multilevel traffic classification in the dark. In: ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM (2005)
-
(2005)
ACM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
21
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
Kim, H., Claffy, K., Fomenkov, M., Barman, D., Faloutsos, M., Lee, K.: Internet traffic classification demystified: myths, caveats, and the best practices. In: ACM CoNEXT (2008)
-
(2008)
ACM CoNEXT
-
-
Kim, H.1
Claffy, K.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
-
25
-
-
85059753615
-
BotGrep: Finding p2p bots with structured graph analysis
-
Nagaraja, S., Mittal, P., Hong, C., Caesar, M., Borisov, N.: BotGrep: Finding p2p bots with structured graph analysis. In: Security Symposium. USENIX (2010)
-
(2010)
Security Symposium. USENIX
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.3
Caesar, M.4
Borisov, N.5
-
27
-
-
0003780986
-
-
Page, L., Brin, S., Motwani, R., Winograd, T.: The pagerank citation ranking: Bringing order to the web (1998)
-
(1998)
The Pagerank Citation Ranking: Bringing Order to the Web
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
29
-
-
34250642066
-
-
Quittek, J., Zseby, T., Claise, B., Zander, S.: Requirements for IP Flow Information Export (IPFIX) (2004), http://www.ietf.org/rfc/rfc3917.txt
-
(2004)
Requirements for IP Flow Information Export (IPFIX)
-
-
Quittek, J.1
Zseby, T.2
Claise, B.3
Zander, S.4
-
30
-
-
34250636365
-
WAP5: Black-box performance debugging for wide-area systems
-
DOI 10.1145/1135777.1135830, Proceedings of the 15th International Conference on World Wide Web
-
Reynolds, P., Wiener, J.L., Mogul, J.C., Aguilera, M.K., Vahdat, A.: Wap5: blackbox performance debugging for wide-area systems. In: Proceedings of the 15th International Conference on World Wide Web, pp. 347-356 (2006) (Pubitemid 46946627)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 347-356
-
-
Reynolds, P.1
Wiener, J.L.2
Mogul, J.C.3
Aguilera, M.K.4
Vahdat, A.5
-
31
-
-
77349112206
-
Hidden markov model modeling of ssh brute-force attacks
-
Sperotto, A., Sadre, R., de Boer, P., Pras, A.: Hidden markov model modeling of ssh brute-force attacks. In: Integrated Management of Systems, Services, Processes and People in IT, pp. 164-176.
-
Integrated Management of Systems, Services, Processes and People in IT
, pp. 164-176
-
-
Sperotto, A.1
Sadre, R.2
De Boer, P.3
Pras, A.4
-
32
-
-
56649102068
-
Anomaly characterization in flow-based traffic time series
-
Sperotto, A., Sadre, R., Pras, A.: Anomaly characterization in flow-based traffic time series. IP Operations and Management, 15-27
-
IP Operations and Management
, pp. 15-27
-
-
Sperotto, A.1
Sadre, R.2
Pras, A.3
-
33
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
DOI 10.1145/964723.383071
-
Stoica, I., Morris, R., Karger, D., Kaashoek, F., Balakrishnan, H.: Chord: A scalable Peer-To-Peer lookup service for internet applications. In: Proceedings of the 2001 ACM SIGCOMM Conference, pp. 149-160 (2001) (Pubitemid 32981961)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
34
-
-
67650478571
-
Actively measuring bots in peer-to-peer networks
-
IEEE,Wuhan
-
Wang, B., Li, Z., Tu, H., Hu, Z., Hu, J.: Actively measuring bots in peer-to-peer networks. In: Networks Security, Wireless Communications and Trusted Computing (NSWCTC). IEEE, Wuhan (2009)
-
(2009)
Networks Security, Wireless Communications and Trusted Computing (NSWCTC)
-
-
Wang, B.1
Li, Z.2
Tu, H.3
Hu, Z.4
Hu, J.5
-
35
-
-
77955127303
-
FlowRank: Ranking netflow records
-
Wang, S., State, R., Ourdane, M., Engel, T.: FlowRank: Ranking netflow records. In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference (2010)
-
(2010)
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
-
-
Wang, S.1
State, R.2
Ourdane, M.3
Engel, T.4
-
36
-
-
77954870415
-
Mining netFlow records for critical network activities
-
Stiller, B., De Turck, F. (eds.), AIMS 2010,Springer, Heidelberg
-
Wang, S., State, R., Ourdane, M., Engel, T.: Mining netFlow records for critical network activities. In: Stiller, B., De Turck, F. (eds.) AIMS 2010. LNCS, vol. 6155, pp. 135-146. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6155
, pp. 135-146
-
-
Wang, S.1
State, R.2
Ourdane, M.3
Engel, T.4
-
37
-
-
79951613635
-
Riskrank: Security risk ranking for ip flow records
-
to appear
-
Wang, S., State, R., Ourdane, M., Engel, T.: Riskrank: Security risk ranking for ip flow records. In: Proceedings of the 6th International Conference on Network and Services Management, CNSM 2010 (2010) (to appear)
-
(2010)
Proceedings of the 6th International Conference on Network and Services Management, CNSM 2010
-
-
Wang, S.1
State, R.2
Ourdane, M.3
Engel, T.4
-
38
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. SIGCOMM Comput. Commun. Rev. 38(4), 171-182 (2008)
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
39
-
-
22844454592
-
A fast parallel clustering algorithm for large spatial databases
-
Xu, X., Jäger, J., Kriegel, H.P.: A fast parallel clustering algorithm for large spatial databases. Data Min. Knowl. Discov. 3(3), 263-290 (1999)
-
(1999)
Data Min. Knowl. Discov.
, vol.3
, Issue.3
, pp. 263-290
-
-
Xu, X.1
Jäger, J.2
Kriegel, H.P.3
|