-
1
-
-
70349866348
-
Detecting spam at the network level
-
A. Sperotto, G. Vliek, R. Sadre, and A. Pras, "Detecting Spam at the Network Level," in Proc. of the 15th Open European Summer School and IFIP TC6.6 Workshop (EUNICE '09), 2009, pp. 208-216.
-
(2009)
Proc. of the 15th Open European Summer School and IFIP TC6.6 Workshop (EUNICE '09)
, pp. 208-216
-
-
Sperotto, A.1
Vliek, G.2
Sadre, R.3
Pras, A.4
-
2
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller, "An Overview of IP Flow-Based Intrusion Detection," IEEE Communications Surveys & Tutorials, vol. 12, no. 3, pp. 343-356, 2010.
-
(2010)
IEEE Communications Surveys & Tutorials
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
3
-
-
56649102068
-
Anomaly characterization in flow-based traffic time series
-
A. Sperotto, R. Sadre, and A. Pras, "Anomaly Characterization in Flow-Based Traffic Time Series," in Proc. of the 8th IEEE International Workshop on IP Operations and Management (IPOM '08), 2008, pp. 15-27.
-
(2008)
Proc. of the 8th IEEE International Workshop on IP Operations and Management (IPOM '08)
, pp. 15-27
-
-
Sperotto, A.1
Sadre, R.2
Pras, A.3
-
4
-
-
77049103625
-
A labeled data set for flow-based intrusion detection
-
A. Sperotto, R. Sadre, D. F. van Vliet, and A. Pras, "A Labeled Data Set For Flow-based Intrusion Detection," in Proc. of the 9th IEEE International Workshop on IP Operations and Management (IPOM '09), 2009, pp. 39-50.
-
(2009)
Proc. of the 9th IEEE International Workshop on IP Operations and Management (IPOM '09)
, pp. 39-50
-
-
Sperotto, A.1
Sadre, R.2
Van Vliet, D.F.3
Pras, A.4
-
5
-
-
77349112206
-
Hidden Markov model modeling of SSH brute-force attacks
-
A. Sperotto, R. Sadre, P. T. de Boer, and A. Pras, "Hidden Markov Model modeling of SSH brute-force attacks," in Proc. of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM '09) (Best Paper Award), 2009, pp. 164-176.
-
(2009)
Proc. of the 20th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM '09) (Best Paper Award)
, pp. 164-176
-
-
Sperotto, A.1
Sadre, R.2
De Boer, P.T.3
Pras, A.4
-
6
-
-
77955457225
-
The network data handling war: MySQL vs. NfDump
-
R. J. Hofstede, A. Sperotto, T. Fioreze, and A. Pras, "The Network Data Handling War: MySQL vs. NfDump," in Proc. of the 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications, 2010, pp. 167-176.
-
(2010)
Proc. of the 16th EUNICE/IFIP WG 6.6 Workshop on Networked Services and Applications
, pp. 167-176
-
-
Hofstede, R.J.1
Sperotto, A.2
Fioreze, T.3
Pras, A.4
-
7
-
-
76649121504
-
Using NetFlow/IPFIX for network management
-
A. Pras, R. Sadre, A. Sperotto, T. Fioreze, D. Hausheer, and J. Schoenwaelder, "Using NetFlow/IPFIX for Network Management," Journal of Network and Systems Management, vol. 17, no. 4, 2009.
-
(2009)
Journal of Network and Systems Management
, vol.17
, Issue.4
-
-
Pras, A.1
Sadre, R.2
Sperotto, A.3
Fioreze, T.4
Hausheer, D.5
Schoenwaelder, J.6
-
8
-
-
70449356588
-
Self-management of hybrid networks: Can we trust NetFlow data?
-
T. Fioreze, L. Granville, A. Pras, A. Sperotto, and R. Sadre, "Self-Management of Hybrid Networks: Can We Trust NetFlow Data?" in Proc. of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM '09), 2009, pp. 577-584.
-
(2009)
Proc. of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM '09)
, pp. 577-584
-
-
Fioreze, T.1
Granville, L.2
Pras, A.3
Sperotto, A.4
Sadre, R.5
-
11
-
-
34250015634
-
-
Jan.
-
International Telecommunication Union, "Ict statistics," http://www.itu.int/ITU-D/icteye/, Jan. 2010.
-
(2010)
Ict Statistics
-
-
-
14
-
-
70450206702
-
Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information
-
B. Claise, "Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information," RFC 5101 (Proposed Standard), 2008.
-
(2008)
RFC 5101 (Proposed Standard)
-
-
Claise, B.1
-
16
-
-
0034226287
-
A revised taxonomy for intrusion detection systems
-
H. Debar, M. Dacier, and A. Wespi, "A revised taxonomy for intrusion detection systems," Annales des Telecommunications, vol. 55, no. 7-8, pp. 361-378, 2000.
-
(2000)
Annales des Telecommunications
, vol.55
, Issue.7-8
, pp. 361-378
-
-
Debar, H.1
Dacier, M.2
Wespi, A.3
-
17
-
-
0003516333
-
Intrusion detection systems: A survey and taxonomy
-
S. Axelsson, "Intrusion detection systems: A survey and taxonomy," Chalmers Univ., Tech. Rep. 99-15, 2000.
-
(2000)
Chalmers Univ., Tech. Rep.
, pp. 99-15
-
-
Axelsson, S.1
-
18
-
-
33751089862
-
Efficient packet matching for gigabit network intrusion detection using TCAMs
-
M. Gao, K. Zhang, and J. Lu, "Efficient packet matching for gigabit network intrusion detection using TCAMs," in Proc. of 20th Int. Conf. on Advanced Information Networking and Applications (AINA'06), 2006, pp. 249-254.
-
(2006)
Proc. of 20th Int. Conf. on Advanced Information Networking and Applications (AINA'06)
, pp. 249-254
-
-
Gao, M.1
Zhang, K.2
Lu, J.3
-
19
-
-
56549099368
-
Gnort: High performance network intrusion detection using graphics processors
-
G. Vasiliadis, S. Antonatos, M. Polychronakis, E. P. Markatos, and S. Ioannidis, "Gnort: High Performance Network Intrusion Detection Using Graphics Processors," in Proc. of the 11th Int. Symp. on Recent Advances in Intrusion Detection (RAID '08), 2008, pp. 116-134.
-
(2008)
Proc. of the 11th Int. Symp. on Recent Advances in Intrusion Detection (RAID '08)
, pp. 116-134
-
-
Vasiliadis, G.1
Antonatos, S.2
Polychronakis, M.3
Markatos, E.P.4
Ioannidis, S.5
-
21
-
-
14844312929
-
Operational experiences with high-volume network intrusion detection
-
H. Dreger, A. Feldmann, V Paxson, and R. Sommer, "Operational experiences with high-volume network intrusion detection," in Proc. of the 11th ACM Conf. on Computer and Communications Security (CCS '04), 2004, pp. 2-11.
-
(2004)
Proc. of the 11th ACM Conf. on Computer and Communications Security (CCS '04)
, pp. 2-11
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
22
-
-
80052770561
-
-
Jan.
-
P. Haag, "Nfsen: Netflow sensor," http://nfsen.sourceforge.net, Jan. 2011.
-
(2011)
-
-
Haag, P.1
-
23
-
-
80052780747
-
-
Jan.
-
The Cooperative Association for Internet Data Analysis, "CAIDA DATA," http://www.caida.org/data, Jan. 2011.
-
(2011)
CAIDA DATA
-
-
-
25
-
-
80052694964
-
-
Jan.
-
Simpleweb, "Trace repository," http://traces.simpleweb.org, Jan. 2011.
-
(2011)
Trace Repository
-
-
-
27
-
-
0024610919
-
A tutorial on hidden Markov models and selected applications in speech recognition
-
L. R. Rabiner, "A tutorial on hidden Markov models and selected applications in speech recognition," Proc. of the IEEE, vol. 77, no. 2, pp. 257-286, 1989.
-
(1989)
Proc. of the IEEE
, vol.77
, Issue.2
, pp. 257-286
-
-
Rabiner, L.R.1
|