-
1
-
-
8744304460
-
-
Technical Report University of California San Diego, CA
-
Lee, C.B., Roedel, C. and Elena, S. (2003) Detection and Characterization of Port Scan Attacks. Technical Report, University of California, San Diego, CA. http://cseweb.ucsd.edu/users/clbailey/PortScans.pdf.
-
(2003)
Detection and Characterization of Port Scan Attacks
-
-
Lee, C.B.1
Roedel, C.2
Elena, S.3
-
2
-
-
0004568554
-
A review of port scanning techniques
-
De Vivo, M., Carrasco, E., Isern, G. and de Vivo, G.O. (1999) A review of port scanning techniques. SIGCOMM Comput. Commun. Rev., 29, 41-48.
-
(1999)
SIGCOMM Comput. Commun. Rev.
, vol.29
, pp. 41-48
-
-
De Vivo, M.1
Carrasco, E.2
Isern, G.3
De Vivo, G.O.4
-
3
-
-
27544493249
-
An experimental evaluation to determine if port scans are precursors to an attack
-
Washington, DC, USA, June 28-July 1. IEEE Computer Society
-
Panjwani, S., Tan, S. and Jarrin, K.M. (2005) An Experimental Evaluation to Determine If Port Scans are Precursors to an Attack. Proc. DSN'05, Washington, DC, USA, June 28-July 1, pp. 602-611. IEEE Computer Society.
-
(2005)
Proc. DSN'05
, pp. 602-611
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.M.3
-
5
-
-
80053482670
-
Portscan detection using netflow data
-
Brno, CZ, . Faculty of Information Technology BUT
-
Gregr, M. (2010) Portscan Detection Using Netflow Data. Proc. EEICT'10, Brno, CZ, pp. 229-233. Faculty of Information Technology BUT.
-
(2010)
Proc. EEICT'10
, pp. 229-233
-
-
Gregr, M.1
-
6
-
-
0242529347
-
Practical automated detection of stealthy portscans
-
Athens, Greece, November 1, ACM
-
Staniford, S., Hoagland, J.A. and McAlerney, J.M. (2000) Practical Automated Detection of Stealthy Portscans. Proc. CCS'00, Athens, Greece, November 1, pp. 1-4. ACM.
-
(2000)
Proc. CCS'00
, pp. 1-4
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
7
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
Staniford, S., Hoagland, J.A. and McAlerney, J.M. (2002) Practical automated detection of stealthy portscans. J. Comput. Secur., 10, 105-136.
-
(2002)
J. Comput. Secur.
, vol.10
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
8
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
Yegneswaran, V., Barford, P. and Ullrich, J. (2003) Internet intrusions: global characteristics and prevalence. SIGMETRICS Perform. Eval. Rev., 31, 138-147.
-
(2003)
SIGMETRICS Perform. Eval. Rev.
, vol.31
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
-
9
-
-
80053525635
-
Distributed information gathering
-
hybrid@hotmail.com
-
hybrid@hotmail.com (1999) Distributed information gathering. Phrack Mag., Article 9, 9.
-
(1999)
Phrack Mag., Article
, vol.9
, pp. 9
-
-
-
10
-
-
84906789612
-
Idle port scanning and non-interference analysis of network protocol stacks using model checking
-
Washington, DC, USA. USENIX Association
-
Ensafi, R., Park, J.C., Kapur,D. and Crandall, J.R. (2010) Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking. Proc. USENIX Security'10, Washington, DC, USA, pp. 257-272. USENIX Association.
-
(2010)
Proc. USENIX Security'10
, pp. 257-272
-
-
Ensafi, R.1
Park, J.C.2
Kapur, D.3
Crandall, J.R.4
-
11
-
-
0000949239
-
Grids: A graph based intrusion detection system for large networks
-
Baltimore, MD, USA, October. NIST
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K.,Wee, C.,Yip, R. and Zerkle, D. (1996) Grids: A Graph Based Intrusion Detection System for Large Networks. Proc. 19th NISS'96, Baltimore, MD, USA, October, pp. 361-370. NIST.
-
(1996)
Proc. 19th NISS'96
, pp. 361-370
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
12
-
-
67649650450
-
Analysis techniques for detecting coordinated attacks and probes
-
Santa Clara, CA, USA, April 9-12. USENIX Association
-
Green, J., Marchette, D., Northcutt, S. and Ralph, B. (1999) Analysis Techniques for Detecting Coordinated Attacks and Probes. Proc. WIDNM'99, Santa Clara, CA, USA, April 9-12, pp. 1-9. USENIX Association.
-
(1999)
Proc. WIDNM'99
, pp. 1-9
-
-
Green, J.1
Marchette, D.2
Northcutt, S.3
Ralph, B.4
-
13
-
-
84942250809
-
Surveillance detection in high bandwidth environments
-
Washington, DC, USA, April 22-24, IEEE Computer Society
-
Robertson, S., Siegel, E.V., Miller, M. and Stolfo, S.J. (2003) Surveillance Detection in High Bandwidth Environments. Proc. DARPA DISCEX III'03, Washington, DC, USA, April 22-24, pp. 130-139. IEEE Computer Society.
-
(2003)
Proc. DARPA DISCEX III'03
, pp. 130-139
-
-
Robertson, S.1
Siegel, E.V.2
Miller, M.3
Stolfo, S.J.4
-
14
-
-
0024984013
-
A network security monitor
-
Oakland, CA, USA, May 7-9, IEEE Computer Society
-
Heberlein, T., Dias, G., Levitt, K., Mukherjee, B., Wood, J. and Wolber, D. (1990) A Network Security Monitor. Proc. RISP'90, Oakland, CA, USA, May 7-9, pp. 296-304. IEEE Computer Society.
-
(1990)
Proc. RISP'90
, pp. 296-304
-
-
Heberlein, T.1
Dias, G.2
Levitt, K.3
Mukherjee, B.4
Wood, J.5
Wolber, D.6
-
15
-
-
8644229619
-
The art of port scanning
-
Fyodor (1997) The art of port scanning. Phrack Mag., Article 11, 7.
-
(1997)
Phrack Mag., Article
, vol.11
, pp. 7
-
-
Fyodor1
-
16
-
-
80053520432
-
-
QoSient. Argus.
-
QoSient. Argus. http://www.qosient.com/argus/.
-
-
-
-
17
-
-
0037710746
-
A probabilistic approach to detecting network scans
-
Florence, Italy, April 15-19, IEEE Computer Society
-
Leckie, C. and Kotagiri, R. (2002) A Probabilistic Approach to Detecting Network Scans. Proc. NOMS'02, Florence, Italy, April 15-19, pp. 359-372. IEEE Computer Society.
-
(2002)
Proc. NOMS'02
, pp. 359-372
-
-
Leckie, C.1
Kotagiri, R.2
-
18
-
-
8844256294
-
Detecting network portscans through anomaly detection
-
Orlando, FL, USA, April 12
-
Kim, H., Kim, S., Kouritzin, M.A. and Sun,W. (2004) Detecting Network Portscans Through Anomaly Detection. Proc. SPIE 5429, Orlando, FL, USA, April 12, pp. 254-263.
-
(2004)
Proc. SPIE 5429
, pp. 254-263
-
-
Kim, H.1
Kim, S.2
Kouritzin, M.A.3
Sun, W.4
-
19
-
-
0037741425
-
A real-time intrusion detection system (ids) for large scale networks and its evaluations
-
Kato, N., Nitou, H., Ohta, K., Mansfield, G. and Nemoto, Y. (1999)A real-time intrusion detection system (ids) for large scale networks and its evaluations. IEICE Trans. Commun., E82-B, 1817-1825.
-
(1999)
IEICE Trans. Commun.
, vol.E82-B
, pp. 1817-1825
-
-
Kato, N.1
Nitou, H.2
Ohta, K.3
Mansfield, G.4
Nemoto, Y.5
-
20
-
-
33745592857
-
Detection of novel network attacks using data mining
-
Melbourne, FL, USA, November 19
-
Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.-N., Dokas, P., Kumar, V. and Srivastava, J. (2003) Detection of Novel Network Attacks Using Data Mining. Proc. ICDM WDMCS'03, Melbourne, FL, USA, November 19, pp. 30-39.
-
(2003)
Proc. ICDM WDMCS'03
, pp. 30-39
-
-
Ertoz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.-N.4
Dokas, P.5
Kumar, V.6
Srivastava, J.7
-
21
-
-
68049121093
-
Anomaly detection: A survey
-
Chandola, V., Banerjee, A. and Kumar, V. (2009) Anomaly detection: A survey. ACM Comput. Surv., 41, 1-58.
-
(2009)
ACM Comput. Surv.
, vol.41
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
22
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
Pula-Cagliari, Sardinia, Italy, June 26-29. IEEE Computer Society
-
Gates, C., McNutt, J.J., Kadane, J.B. and Kellner, M. (2006) Scan Detection on Very Large Networks Using Logistic Regression Modeling. Proc. ISCC'06, Pula-Cagliari, Sardinia, Italy, June 26-29, pp. 402-408. IEEE Computer Society.
-
(2006)
Proc. ISCC'06
, pp. 402-408
-
-
Gates, C.1
McNutt, J.J.2
Kadane, J.B.3
Kellner, M.4
-
23
-
-
0038323501
-
Live traffic analysis of TCP/IP gateways
-
San Diego, CA, USA, March. ISOC Press
-
Porras, P. and Valdes, A. (1998) Live Traffic Analysis of TCP/IP Gateways. Proc. ISOC NDSS'98, San Diego, CA, USA, March. ISOC Press.
-
(1998)
Proc. ISOC NDSS'98
-
-
Porras, P.1
Valdes, A.2
-
24
-
-
0002629036
-
EMERALD: Event monitoring enabling responses to anomalous live disturbances
-
Menlo Park, CA 94025, USA, October 22-25. NIST
-
Porras, P.A. and Neumann, P.G. (1997) EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances. Proc. NCSC'97, Menlo Park, CA 94025, USA, October 22-25, pp. 353-365. NIST.
-
(1997)
Proc. NCSC'97
, pp. 353-365
-
-
Porras, P.A.1
Neumann, P.G.2
-
25
-
-
80053556180
-
Reconnaissance scan detection heuristics to disrupt the preattack information gathering
-
Paris, France, June 24-26 IEEE Computer Society
-
Udhayan, J., Prabu, M.M., Krishnan, V.A. and Anitha, R. (2009) Reconnaissance Scan Detection Heuristics to Disrupt the Preattack Information Gathering. Proc. N2S'09, Paris, France, June 24-26, pp. 1-5. IEEE Computer Society.
-
(2009)
Proc. N2S'09
, pp. 1-5
-
-
Udhayan, J.1
Prabu, M.M.2
Krishnan, V.A.3
Anitha, R.4
-
26
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Seattle, WA, USA, November 7-12. USENIX Association
-
Roesch, M. (1999) Snort-lightweight Intrusion Detection for Networks. Proc. LISA'99, Seattle, WA, USA, November 7-12, pp. 229-238. USENIX Association.
-
(1999)
Proc. LISA'99
, pp. 229-238
-
-
Roesch, M.1
-
27
-
-
85086751284
-
Scan detection: A data mining approach
-
Sutton Place Hotel, Newport Beach, CA, USA, April 21-23. SIAM
-
Gyorgy, S.U., György, J.S. and Hui, X. (2005) Scan Detection: A Data Mining Approach. Proc. SIAM ICDM'05, Sutton Place Hotel, Newport Beach, CA, USA, April 21-23, pp. 118-129. SIAM.
-
(2005)
Proc SIAM ICDM'05
, pp. 118-129
-
-
Gyorgy, S.U.1
György, J.S.2
Hui, X.3
-
28
-
-
80053516719
-
Detection of portscans using IP header data
-
Enschede, January 21
-
Haan, G.-H.K. (2005) Detection of Portscans Using IP Header Data. Proc. TBRC'05, Enschede, January 21.
-
(2005)
Proc. TBRC'05
-
-
Haan, G.-H.K.1
-
29
-
-
80053497234
-
An adaptive algorithm to detect port scans
-
Rong-sheng, S., Xiao-yong, L. and Jian-hua, L. (2004) An adaptive algorithm to detect port scans. J. Shanghai Univ. (Engl. Ed.), 8, 328-332.
-
(2004)
J. Shanghai Univ. (Engl. Ed.)
, vol.8
, pp. 328-332
-
-
Rong-sheng, S.1
Xiao-yong, L.2
Jian-hua, L.3
-
31
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Oakland, CA, USA, May 9-12, IEEE Computer Society
-
Jung, J., Paxson, V., Berger, A.W. and Balakrishnan, H. (2004) Fast Portscan Detection Using Sequential Hypothesis Testing. Proc. SECPRI'04, Oakland, CA, USA, May 9-12, pp. 211-225. IEEE Computer Society.
-
(2004)
Proc. SECPRI'04
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
32
-
-
85084164413
-
Bro:A system for detecting network intruders in real-time
-
San Antonio, TX, USA, January 26-29. USENIXAssociation
-
Paxson,V. (1998) Bro:ASystem for Detecting Network Intruders in Real-Time. Proc. USENIX Security Symp.'98, San Antonio, TX, USA, January 26-29, pp. 2435-2463. USENIXAssociation.
-
(1998)
Proc. USENIX Security Symp.
, vol.98
, pp. 2435-2463
-
-
Paxson, V.1
-
33
-
-
84941149577
-
The OSU flow-tools package and cisco netflow logs
-
New Orleans, LA, USA, December 3-8. USENIX Association
-
Fullmer,M. and Romig, S. (2000) The OSU Flow-Tools Package and Cisco Netflow Logs. Proc. LISA'00, New Orleans, LA, USA, December 3-8, pp. 291-303. USENIX Association.
-
(2000)
Proc. LISA'00
, pp. 291-303
-
-
Fullmer, M.1
Romig, S.2
-
34
-
-
77951114448
-
A novel approach to scan detection on the backbone
-
Washington, DC, USA, April 27-29, IEEE Computer Society
-
Zhang, Y. and Fang, B. (2009) A Novel Approach to Scan Detection on the Backbone. Proc. ITNG'09, Washington, DC, USA, April 27-29, pp. 16-21. IEEE Computer Society.
-
(2009)
Proc. ITNG'09
, pp. 16-21
-
-
Zhang, Y.1
Fang, B.2
-
35
-
-
33751053025
-
Connectionless port scan detection on the backbone
-
Phoenix, AZ, USA, April 10-12, IEEE Computer Society
-
Sridharan,A.,Ye,T. and Bhattacharyya, S. (2006) Connectionless Port Scan Detection on the Backbone. Proc. IPCCC'06, Phoenix, AZ, USA, April 10-12, pp. 567-576. IEEE Computer Society.
-
(2006)
Proc. IPCCC'06
, pp. 567-576
-
-
Sridharan, A.1
Ye, T.2
Bhattacharyya, S.3
-
36
-
-
42549143607
-
Scalable double filter structure for port scan detection
-
Istanbul, Turkey, June 11-15, IEEE Computer Society
-
Kong, S., He, T., Shao, X., An, C. and Li, X. (2006) Scalable Double Filter Structure for Port Scan Detection. Proc. ICC'06, Istanbul, Turkey, June 11-15, pp. 2177-2182. IEEE Computer Society.
-
(2006)
Proc. ICC'06
, pp. 2177-2182
-
-
Kong, S.1
He, T.2
Shao, X.3
An, C.4
Li, X.5
-
37
-
-
66649085194
-
Port scan detection
-
Habitat World, IHC, New Delhi, India, December 12-14, IEEE Computer Society
-
Gadge, J. and Patil, A.A. (2008) Port Scan Detection. Proc. ICON'08, Habitat World, IHC, New Delhi, India, December 12-14, pp. 1-6. IEEE Computer Society.
-
(2008)
Proc. ICON'08
, pp. 1-6
-
-
Gadge, J.1
Patil, A.A.2
-
38
-
-
0028385414
-
Fuzzy logic, neural networks, and soft computing
-
Zadeh, L.A. (1994) Fuzzy logic, neural networks, and soft computing. Commun. ACM, 37, 77-84.
-
(1994)
Commun ACM
, vol.37
, pp. 77-84
-
-
Zadeh, L.A.1
-
39
-
-
4544373082
-
Detecting low-profile probes and novel denialof- service attacks
-
West Point, NY, USA, June, IEEE Computer Society
-
Basu, R., Cunningham, R.K., Webster, S.E. and Lippmann, R.P. (2001) Detecting Low-profile Probes and Novel Denialof- Service Attacks. Proc. IWIAS'01,West Point, NY, USA, June, pp. 5-10. IEEE Computer Society.
-
(2001)
Proc. IWIAS'01
, pp. 5-10
-
-
Basu, R.1
Cunningham, R.K.2
Webster, S.E.3
Lippmann, R.P.4
-
40
-
-
77958030888
-
Improved detection of low-profile probe and denial-of-service attacks
-
Baltimore, MD, USA, June 11-13
-
Streilein, W.W., Cunningham, R.K. and Webster, S.E. (2002) Improved Detection of Low-profile Probe and Denial-of-Service Attacks. Proc. Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection, Baltimore, MD, USA, June 11-13, pp. 11-13.
-
(2002)
Proc. Workshop on Statistical and Machine Learning Techniques in Computer Intrusion Detection
, pp. 11-13
-
-
Streilein, W.W.1
Cunningham, R.K.2
Webster, S.E.3
-
41
-
-
70449130709
-
A novel fast port scan method using partheno-genetic algorithm
-
Los Alamitos, CA, USA, August 8-11. IEEE Computer Society
-
Chen, J.J. and Cheng, X.J. (2009) A Novel Fast Port Scan Method Using Partheno-genetic Algorithm. Proc. ICCSIT'09, Los Alamitos, CA, USA, August 8-11, pp. 219-222. IEEE Computer Society.
-
(2009)
Proc. ICCSIT'09
, pp. 219-222
-
-
Chen, J.J.1
Cheng, X.J.2
-
42
-
-
52949119607
-
On detecting port scanning using fuzzy based intrusion detection system
-
Crete Island, Greece, August 6-8, IEEE Computer Society
-
El-Hajj, W., Aloul, F., Trabelsi, Z. and Zaki, N. (2008) On Detecting Port Scanning Using Fuzzy Based Intrusion Detection System. Proc. IWCMC'08, Crete Island, Greece, August 6-8, pp. 105-110. IEEE Computer Society.
-
(2008)
Proc. IWCMC'08
, pp. 105-110
-
-
El-Hajj, W.1
Aloul, F.2
Trabelsi, Z.3
Zaki, N.4
-
43
-
-
62949214093
-
Network traffic analysis using refined bayesian reasoning to detect flooding and port scan attacks
-
Phuket, Thailand, December 20-22, IEEE Computer Society
-
Liu, D., Zhang, M.W. and Li, T. (2008) Network Traffic Analysis Using Refined Bayesian Reasoning to Detect Flooding and Port Scan Attacks. Proc. ICACTE'08, Phuket, Thailand, December 20-22, pp. 1000-1004. IEEE Computer Society.
-
(2008)
Proc. ICACTE'08
, pp. 1000-1004
-
-
Liu, D.1
Zhang, M.W.2
Li, T.3
-
44
-
-
47249157282
-
A comparative study of fuzzy inference systems, neural networks and adaptive neuro fuzzy inference systems for portscan detection
-
Naples, Italy, December, Springer
-
Shafiq, M.Z., Farooq, M. and Khayam, S.A. (2008) A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. Proc. EVO'08, Naples, Italy, December, pp. 52-61. Springer.
-
(2008)
Proc. EVO'08
, pp. 52-61
-
-
Shafiq, M.Z.1
Farooq, M.2
Khayam, S.A.3
-
46
-
-
35648969617
-
A denial of service detector based on maximum likelihood detection and the random neural network
-
Oke, G. and Loukas, G. (2007) A denial of service detector based on maximum likelihood detection and the random neural network. Comput. J., 50, 717-727.
-
(2007)
Comput. J.
, vol.50
, pp. 717-727
-
-
Oke, G.1
Loukas, G.2
-
47
-
-
70350179965
-
A slow port scan attack detection mechanism based on fuzzy logic and a stepwise policy
-
University of Washington, Seattle, USA, July 21-22, IEEE Computer Society
-
Kim, J. and Lee, J.H. (2008) A Slow Port Scan Attack Detection Mechanism Based on Fuzzy Logic and a Stepwise Policy. Proc. IET ICIE'08, University ofWashington, Seattle, USA, July 21-22, pp. 1-5. IEEE Computer Society.
-
(2008)
Proc. IET ICIE'08
, pp. 1-5
-
-
Kim, J.1
Lee, J.H.2
-
48
-
-
20444438039
-
Passive visual fingerprinting of networkattack tools
-
ACMm, Washington, DC, USA, October
-
Conti, G. and Abdullah, K. (2004) Passive Visual Fingerprinting of NetworkAttackTools. Proc.VizSEC/DMSEC'04,Washington, DC, USA, October, 29, pp. 45-54. ACM.
-
(2004)
Proc.VizSEC/DMSEC'04
, vol.29
, pp. 45-54
-
-
Conti, G.1
Abdullah, K.2
-
49
-
-
80053505465
-
-
Fyodor. Nmap.
-
Fyodor. Nmap. http://nmap.org/.
-
-
-
-
50
-
-
80053500232
-
-
Superscan
-
FoundStone, a division of McAfee. Superscan. http://www. foundstone.com/us/resources/proddesc/superscan.htm.
-
FoundStone, a division of McAfee
-
-
-
51
-
-
80053527612
-
-
Tenable Network Security Inc. Columbia. Nessus
-
Tenable Network Security Inc. Columbia. Nessus. http://www. nessus.org/nessus/.
-
-
-
-
52
-
-
20444484611
-
NVisionIP: Netflow visualizations of system state for security situational awareness
-
Washington, DC, USA, October 29, ACM
-
Lakkaraju, K., Yurcik, W. and Lee, A.J. (2004) NVisionIP: Netflow Visualizations of System State for Security Situational Awareness. Proc. VizSEC/DMSEC'04, Washington, DC, USA, October 29, pp. 65-72. ACM.
-
(2004)
Proc. VizSEC/DMSEC'04
, pp. 65-72
-
-
Lakkaraju, K.1
Yurcik, W.2
Lee, A.J.3
-
53
-
-
33745653877
-
Interactive visualization for network and port scan detection
-
Seattle, WA, USA, September 7-9, Springer, Berlin
-
Muelder, C., Ma, K.-L. and Bartoletti, T. (2006) Interactive Visualization for Network and Port Scan Detection. LNCS, RAID'05, Seattle, WA, USA, September 7-9, pp. 265-283. Springer, Berlin.
-
(2006)
LNCS, RAID'05
, pp. 265-283
-
-
Muelder, C.1
Ma, K.-L.2
Bartoletti, T.3
-
54
-
-
20444495766
-
PortVis:A tool for port-based detection of security events
-
Washington, DC, USA, October 29, ACM
-
McPherson, J., Ma, K.-L., Krystosk, P., Bartoletti, T. and Christensen, M. (2004) PortVis:A Tool for Port-Based Detection of Security Events. Proc. VizSEC/DMSEC'04,Washington, DC, USA, October 29, pp. 73-81. ACM.
-
(2004)
Proc. VizSEC/DMSEC'04
, pp. 73-81
-
-
McPherson, J.1
Ma, K.-L.2
Krystosk, P.3
Bartoletti, T.4
Christensen, M.5
-
55
-
-
33745460819
-
Visualizing network data for intrusion detection
-
West Point, NY, USA, June. IEEE Computer Society
-
Abdullah, K., Lee, C., Conti, G. and Copeland, J.A. (2005) Visualizing Network Data for Intrusion Detection. Proc. IEEE IAW'05, West Point, NY, USA, June, pp. 100-108. IEEE Computer Society.
-
(2005)
Proc IEEE IAW'05
, pp. 100-108
-
-
Abdullah, K.1
Lee, C.2
Conti, G.3
Copeland, J.A.4
-
56
-
-
35348837981
-
Visualising communication network security attacks
-
Washington, DC, USA, July 4-6, IEEE Computer Society
-
Musa, S. and Parish, D.J. (2007) Visualising Communication Network Security Attacks. Proc. IV'07, Washington, DC, USA, July 4-6, pp. 726-733. IEEE Computer Society.
-
(2007)
Proc. IV'07
, pp. 726-733
-
-
Musa, S.1
Parish, D.J.2
-
57
-
-
33845483451
-
Searching for open windows and unlocked doors: Port scanning in large-scale commodity clusters
-
Cardiff, UK, May 9-12, IEEE Computer Society
-
Lee, A.J., Koenig, G.A., Meng, X. andYurcik,W. (2005) Searching for Open Windows and Unlocked Doors: Port Scanning in Large-Scale Commodity Clusters. Proc. CCGRID'05, Cardiff, UK, May 9-12, pp. 146-151. IEEE Computer Society.
-
(2005)
Proc. CCGRID'05
, pp. 146-151
-
-
Lee, A.J.1
Koenig, G.A.2
Meng, X.3
Yurcik, W.4
-
58
-
-
20444445205
-
NVisionCC: A visualization framework for high performance cluster security
-
New York, NY, USA, October 29, ACM
-
Yurcik, W., Meng, X. and Kiyanclar, N. (2004) NVisionCC: A Visualization Framework for High Performance Cluster Security. Proc. VizSEC/DMSEC'04, New York, NY, USA, October 29, pp. 133-137. ACM.
-
(2004)
Proc. VizSEC/DMSEC'04
, pp. 133-137
-
-
Yurcik, W.1
Meng, X.2
Kiyanclar, N.3
-
59
-
-
60349087613
-
A novel visualization approach for efficient network scans detection
-
Horizon Resort, Sanya, Hainan Island, China, December 13-15, IEEE Computer Society
-
Jiawan, Z., Liang, L., Liangfu, L. and Ning, Z. (2008) A Novel Visualization Approach for Efficient Network Scans Detection. Proc. SECTECH'08, Horizon Resort, Sanya, Hainan Island, China, December 13-15, pp. 23-26. IEEE Computer Society.
-
(2008)
Proc. SECTECH'08
, pp. 23-26
-
-
Jiawan, Z.1
Liang, L.2
Liangfu, L.3
Ning, Z.4
-
61
-
-
0345477912
-
A methodology for using intelligent agents to provide automated intrusion response
-
United States MilitaryAcademy,West Point, NY, USA, June 6-7. IEEE Computer Society
-
Curtis, A.C.J., John, M.D.H., John, R.S. and Udo,W.P. (2000)A Methodology for Using Intelligent Agents to Provide Automated Intrusion Response. Proc. IEEE SMC IAW'00, United States MilitaryAcademy,West Point, NY, USA, June 6-7, pp. 110-116. IEEE Computer Society.
-
(2000)
Proc IEEE SMC IAW'00
, pp. 110-116
-
-
Curtis, A.C.J.1
John, M.D.H.2
John, R.S.3
Udo, W.P.4
-
62
-
-
51049100612
-
Scan attack detection based on distributed cooperative model
-
Xi'an, China,April 16-18. IEEE Computer Society
-
Zhang, W., Teng, S. and Fu, X. (2008) Scan Attack Detection Based on Distributed Cooperative Model. Proc. CSCWD'08, Xi'an, China,April 16-18, pp. 743-748. IEEE Computer Society.
-
(2008)
Proc. CSCWD'08
, pp. 743-748
-
-
Zhang, W.1
Teng, S.2
Fu, X.3
-
63
-
-
33846199593
-
A self-aware approach to denial of service defence
-
Gelenbe, E. and Loukas, G. (2007) A self-aware approach to denial of service defence. Comput. Netw., 51, 1299-1314.
-
(2007)
Comput. Netw.
, vol.51
, pp. 1299-1314
-
-
Gelenbe, E.1
Loukas, G.2
-
64
-
-
50249125438
-
Detecting denial of service attacks with bayesian classifiers and the random neural network
-
London, UK, July, IEEE, USA
-
Oke, G., Loukas, G. and Gelenbe, E. (2007) Detecting Denial of Service Attacks with Bayesian Classifiers and the Random Neural Network. Proc. FUZZ-IEEE'07, London, UK, July, pp. 1964-1969. IEEE, USA.
-
(2007)
Proc. FUZZ-IEEE'07
, pp. 1964-1969
-
-
Oke, G.1
Loukas, G.2
Gelenbe, E.3
-
65
-
-
84870227311
-
Likelihood ratios and recurrent random neural networks in detection of denial of service attacks
-
San Diego, CA, USA, July
-
Loukas, G. and Oke, G. (2007) Likelihood Ratios and Recurrent Random Neural Networks in Detection of Denial of Service Attacks. Proc. SPECTS'07, San Diego, CA, USA, July 16-18.
-
(2007)
Proc. SPECTS'07
, pp. 16-18
-
-
Loukas, G.1
Oke, G.2
-
66
-
-
0001373628
-
Random neural networks with negative and positive signals and product form solution
-
Gelenbe, E. (1989) Random neural networks with negative and positive signals and product form solution. Neural Comput., 1, 502-510.
-
(1989)
Neural Comput.
, vol.1
, pp. 502-510
-
-
Gelenbe, E.1
-
67
-
-
21344486418
-
G-networks:A unifying model for neural and queueing networks
-
Gelenbe, E. (1994) G-networks:A unifying model for neural and queueing networks. Ann. Oper. Res., 48, 433-461.
-
(1994)
Ann. Oper. Res.
, vol.48
, pp. 433-461
-
-
Gelenbe, E.1
-
68
-
-
55449106994
-
Synchronized interactions in spiked neuronal networks
-
Gelenbe, E. and Timotheou, S. (2008) Synchronized interactions in spiked neuronal networks. Comput. J., 51, 723-730.
-
(2008)
Comput. J.
, vol.51
, pp. 723-730
-
-
Gelenbe, E.1
Timotheou, S.2
-
69
-
-
33847256529
-
The devil and packet trace anonymization
-
Pang, R., Allman, M., Paxson, V. and Lee, J. (2006) The devil and packet trace anonymization. SIGCOMM Comput. Commun. Rev., 36, 29-38.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
70
-
-
84878700321
-
A first look at modern enterprise traffic
-
Berkeley, CA, USA, October 19-21. USENIX Association
-
Pang, R.,Allman, M., Bennett, M., Lee, J., Paxson,V. andTierney, B. (2005)A First Look at Modern Enterprise Traffic. Proc. ACM IMC'05, Berkeley, CA, USA, October, 19-21, pp. 2-2. USENIX Association.
-
(2005)
Proc. ACM IMC'05
, pp. 2-2
-
-
Pang R.Allman, M.1
Bennett, M.2
Lee, J.3
Paxson, V.4
Tierney, B.5
-
71
-
-
80053538426
-
-
Winpcap
-
Technologies, C.Winpcap. http://www.winpcap.org.
-
-
-
Technologies, C.1
-
72
-
-
80053484031
-
-
symantec.com. Symantec security response
-
symantec.com. Symantec security response. http://security response.symantec.com/avcenter.
-
-
-
-
73
-
-
84928016636
-
The base-rate fallacy and the difficulty of intrusion detection
-
Axelsson, S. (2000) The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Secur., 3, 186-205.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, pp. 186-205
-
-
Axelsson, S.1
-
74
-
-
85019691440
-
Testing intrusion detection systems: A critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory
-
McHugh, J. (2000) Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inf. Syst. Secur., 3, 262-294.
-
(2000)
ACM Trans. Inf. Syst. Secur.
, vol.3
, pp. 262-294
-
-
McHugh, J.1
-
75
-
-
56549083676
-
A comparative evaluation of anomaly detectors under portscan attacks
-
Cambridge, MA, USA, September 15-17, Springer, Berlin
-
Ashfaq, A.B., Robert, M.J., Mumtaz, A., Ali, M.Q., Sajjad, A. and Khayam, S.A. (2008) A Comparative Evaluation of Anomaly Detectors Under Portscan Attacks. Proc. RAID'08, Cambridge, MA, USA, September 15-17, pp. 351-371. Springer, Berlin.
-
(2008)
Proc. RAID'08
, pp. 351-371
-
-
Ashfaq, A.B.1
Robert, M.J.2
Mumtaz, A.3
Ali, M.Q.4
Sajjad, A.5
Khayam, S.A.6
|