-
2
-
-
3042852281
-
Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs
-
E. Casey, "Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs," Elsevier Journal of Digital Investigation, vol. 1, pp. 28-43, 2004.
-
(2004)
Elsevier Journal of Digital Investigation
, vol.1
, pp. 28-43
-
-
Casey, E.1
-
3
-
-
0036870198
-
Network forensics analysis
-
V. e. a. Corey, "Network forensics analysis," IEEE Internet Comput., vol. 6, no. 6, 2002.
-
(2002)
IEEE Internet Comput.
, vol.6
, Issue.6
-
-
Corey, V.E.A.1
-
4
-
-
4243105024
-
The discipline of internet forensics
-
August
-
B. H., "The discipline of internet forensics," Communications of the ACM, vol. 46, no. 8, August 2003.
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
-
-
B, H.1
-
5
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," Computer Networks, no. 31, pp. 2435-2463, 1999.
-
(1999)
Computer Networks
, Issue.31
, pp. 2435-2463
-
-
Paxson, V.1
-
7
-
-
33746603312
-
Mining anomalies using traffic feature distributions
-
August 21-26 Philadelphia, PA
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in Proc. SIGCOMM'05, August 21-26, 2005, Philadelphia, PA.
-
(2005)
Proc. SIGCOMM'05
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
8
-
-
84991765629
-
Automated worm fingerprinting
-
USENIX San Fransisco, CA
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated worm fingerprinting," in Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI'04). USENIX, 2004, San Fransisco, CA.
-
(2004)
Proceedings of the 6th Symposium on Operating Systems Design and Implementation (OSDI'04
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
9
-
-
84858486361
-
-
"Netdetector," http://www.niksun.com/product.php?id=4.
-
Netdetector
-
-
-
10
-
-
84885891812
-
-
"Networkminer," http://networkminer.wiki.sourceforge.net/ NetworkMiner.
-
Networkminer
-
-
-
11
-
-
84860092607
-
-
"Netintercept," http://sandstorm.net/products/netintercept.
-
Netintercept
-
-
-
12
-
-
80051534564
-
-
"Wireshark," http://www.wireshark.org.
-
Wireshark
-
-
-
13
-
-
80051490697
-
-
"Snort," http://www.snort.org.
-
Snort
-
-
-
16
-
-
33845543472
-
Network forensics on packet fingerprints
-
Karlstad, Sweden
-
C. Cho, S. Lee, C. Tan, and Y. Tan, "Network forensics on packet fingerprints," in Proc. 21st IFIP Information Security Conference (SEC 2006), 2006, Karlstad, Sweden.
-
(2006)
Proc. 21st IFIP Information Security Conference (SEC 2006
-
-
Cho, C.1
Lee, S.2
Tan, C.3
Tan, Y.4
-
17
-
-
77949456302
-
New payload attribution methods for network forensic investigations
-
2-15 32, February
-
M. Ponec, G. P., W. J., and B. H., "New payload attribution methods for network forensic investigations," ACM Transactions on Information and System Security, vol. 13, no. 2, pp. 15:2-15:32, February 2006.
-
(2006)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
, pp. 15
-
-
Ponec, M.1
-
18
-
-
80051487960
-
-
The leurre.com project
-
"The leurre.com project," http://www.leurrecom.org.
-
-
-
-
19
-
-
0012109964
-
-
The Honeynet Project (ed.) :, 2nd ed. Addison Wesley Professional
-
The Honeynet Project (ed.): Know Your Enemy: Learning about Security Threats, 2nd ed. Addison Wesley Professional, 2004.
-
(2004)
Know Your Enemy: Learning about Security Threats
-
-
-
21
-
-
34547141391
-
The nepenthes platform: An efficient approach to collect malware
-
September Hamburg, Germany
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, "The nepenthes platform: An efficient approach to collect malware," in Proc. 9th international symposium on recent advances in intrusion detection (RAID), September 2006, Hamburg, Germany.
-
(2006)
Proc. 9th International Symposium on Recent Advances in Intrusion Detection (RAID
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
23
-
-
80051526813
-
Building and deploying billy goat, a worm-detection system
-
Baltimore, Maryland
-
J. Riordan, D. Zamboni, and Y. Duponchel, "Building and deploying billy goat, a worm-detection system," in Proc. 18th annual FIRST conference, 2006, Baltimore, Maryland.
-
(2006)
Proc. 18th annual FIRST conference
-
-
Riordan, J.1
Zamboni, D.2
Duponchel, Y.3
-
24
-
-
26444580931
-
Honeypot-based forensics
-
Brisbane, Australia, May 23-27
-
F. Pouget and M. Dacier, "Honeypot-based forensics," in Proc. AusCERT2004, Brisbane, Australia, May 23-27 2004.
-
(2004)
Proc. AusCERT2004
-
-
Pouget, F.1
Dacier, M.2
-
25
-
-
48749114837
-
Internet attack knowledge discovery via clusters and cliques of attack traces
-
F. Pouget, M. Dacier, J. Zimmerman, A. Clark, and G. Mohay, "Internet attack knowledge discovery via clusters and cliques of attack traces," Journal of Information Assurance and Security, vol. 1, pp. 21-32, 2006.
-
(2006)
Journal of Information Assurance and Security
, vol.1
, pp. 21-32
-
-
Pouget, F.1
Dacier, M.2
Zimmerman, J.3
Clark, A.4
Mohay, G.5
-
26
-
-
48749129421
-
A framework for attack patterns' discovery in honeynet data
-
O. Thonnard and M. Dacier, "A framework for attack patterns' discovery in honeynet data," Digital Investigation, vol. 8, pp. S128-S139, 2008.
-
(2008)
Digital Investigation
, vol.8
-
-
Thonnard, O.1
Dacier, M.2
-
27
-
-
58349122750
-
Knowledge discovery from honeypot data for monitoring malicious attacks
-
Auckland, New Zealand
-
H. Jin, O. de Vel, K. Zhang, and N. Liu, "Knowledge discovery from honeypot data for monitoring malicious attacks," in Proc. 21st Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence, 2008, Auckland, New Zealand, pp. 470-481.
-
(2008)
Proc. 21st Australian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence
, pp. 470-481
-
-
Jin, H.1
De Vel, O.2
Zhang, K.3
Liu, N.4
-
28
-
-
69849109516
-
Using honeypots for internet situational awareness
-
College Park, Maryland
-
V. Yegneswaran, P. Barford, and V. Paxson, "Using honeypots for internet situational awareness," in Fourth ACM SIGCOMM Workshop on Hot Topics in Networking (Hotnets IV), 2005, College Park, Maryland.
-
(2005)
Fourth ACM SIGCOMM Workshop on Hot Topics in Networking (Hotnets IV
-
-
Yegneswaran, V.1
Barford, P.2
Paxson, V.3
-
29
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Karlsruhe, Germany
-
C. Estan, S. Savage, and G. Varghese, "Automatically inferring patterns of resource consumption in network traffic," in Proc. SIGCOMM'03, August 25-29, Karlsruhe, Germany 2003.
-
(2003)
Proc. SIGCOMM'03, August
, pp. 25-29
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
30
-
-
33750346628
-
Blinc: Multilevel traffic classification in the dark
-
August Philadelphia, Pennsylvania
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "Blinc: Multilevel traffic classification in the dark," in Proc. SIGCOMM'05, August 21-26, Philadelphia, Pennsylvania 2005.
-
(2005)
Proc. SIGCOMM'05
, pp. 21-26
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
31
-
-
34547427252
-
Semi-automated discovery of application session structure
-
DOI 10.1145/1177080.1177096, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
J. Kannan, J. Jung, V. Paxson, and C. Koksal, "Semi-automated discovery of application session structure," in Proc. Sixth ACM SIGCOMM Conference on Internet Measurement (IMC'06), 2006, Rio de Janeiro, Brazil, pp. 119-132. (Pubitemid 47165594)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 119-132
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.E.4
-
33
-
-
80051520218
-
Wda: A web farm distributed denial of service attack attenuator
-
May
-
E. Doron and A. Wool, "Wda: A web farm distributed denial of service attack attenuator," Computer Networks, vol. 10, no. 1016, May 2010.
-
(2010)
Computer Networks
, vol.10
, Issue.1016
-
-
Doron, E.1
Wool, A.2
-
34
-
-
18144375196
-
Detecting distributed denial-of-service attacks by analyzing tcp syn packets statistically
-
Dallas, TX
-
Y. Ohsita and S. Ata, "Detecting distributed denial-of-service attacks by analyzing tcp syn packets statistically," in Proc. IEEE GLOBECOM, Dallas, TX, 2004, p. 20432049.
-
(2004)
Proc. IEEE GLOBECOM
, pp. 20432049
-
-
Ohsita, Y.1
Ata, S.2
-
36
-
-
80051519211
-
-
Georgia ddos attacks a quick summary of observations
-
"Georgia ddos attacks a quick summary of observations," http://asert.arbornetworks.com/2008/08/ georgia-ddos-attacks-a-quick-summary-of- observations/.
-
-
-
-
38
-
-
0003516333
-
-
Department of Computer Engineering, Chalmers University of Technology, Tech. Rep., March
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Department of Computer Engineering, Chalmers University of Technology, Tech. Rep., March 2000.
-
(2000)
Intrusion Detection Systems: A Survey and Taxonomy
-
-
Axelsson, S.1
-
39
-
-
80051495840
-
-
Tripwire
-
"Tripwire," http://www.tripwire.com/.
-
-
-
-
40
-
-
85077745984
-
Tcp wrapper: Network monitoring, access control, and booby traps
-
September 14-16
-
W. Venema, "Tcp wrapper: Network monitoring, access control, and booby traps," in Proc. 3rd USENIX UNIX Security Symposium, September 14-16 1992, pp. 85-92.
-
(1992)
Proc. 3rd USENIX UNIX Security Symposium
, pp. 85-92
-
-
Venema, W.1
-
41
-
-
0004250162
-
-
Northcutt Cooper Fearnow, and Frederick,. Sams
-
Northcutt, Cooper, Fearnow, and Frederick, Intrusion Signatures and Analysis. Sams, 2001.
-
(2001)
Intrusion Signatures and Analysis
-
-
-
42
-
-
80051498549
-
-
rfeti Nmap nmap.org
-
"Nmap," nmap.org.
-
-
-
|