-
1
-
-
27544493249
-
An experimental evaluation to determine if port scans are precursors to an attack
-
Proceedings - 2005 International Conference on Dependable Systems and Networks
-
S. Panjwani, S. Tan, K. M. Jarrin, and M. Cukier, "An experimental evaluation to determine if port scans are precursors to an attack," in Proc. IEEE Int. Conf. Depend. Syst. Netw., Yokohama, Japan, 2005, pp. 602-611. (Pubitemid 41538274)
-
(2005)
Proceedings of the International Conference on Dependable Systems and Networks
, pp. 602-611
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.M.3
Cukier, M.4
-
2
-
-
85019691440
-
Testing intrusion detection systems:Acritique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory
-
J. McHugh, "Testing intrusion detection systems:Acritique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory," Trans. Inf. Syst. Security, vol. 10, no. 4, pp. 262-294, 2000.
-
(2000)
Trans. Inf. Syst. Security
, vol.10
, Issue.4
, pp. 262-294
-
-
McHugh, J.1
-
3
-
-
14944369649
-
Characteristics of internet background radiation
-
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson, "Characteristics of internet background radiation," in Proc. 4th ACM SIGCOMM IMC, New York, 2004, pp. 27-40. (Pubitemid 40372029)
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
, pp. 27-40
-
-
Pang, R.1
Barford, P.2
Yegneswaran, V.3
Paxson, V.4
Peterson, L.5
-
4
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. Savage, "Inferring internet denial-of-service activity," Trans. Comput. Syst., vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
Trans. Comput. Syst.
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
5
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
V. Yegneswaran, P. Barford, and J. Ulrich, "Internet intrusions: Global characteristics and prevalence," in Proc. ACMSIGMETRICS, 2003, pp. 138-147.
-
(2003)
Proc. ACMSIGMETRICS
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ulrich, J.3
-
6
-
-
84942250809
-
Surveillance detection in high bandwidth environments
-
Washington, DC, Apr.
-
S. Robertson, E. Siegel, M. Miller, and S. Stolfo, "Surveillance detection in high bandwidth environments," in Proc. 3rd IEEE DISCEX, Washington, DC, Apr. 2003, vol. 1, pp. 130-138.
-
(2003)
Proc. 3rd IEEE DISCEX
, vol.1
, pp. 130-138
-
-
Robertson, S.1
Siegel, E.2
Miller, M.3
Stolfo, S.4
-
7
-
-
42149134786
-
A brief history of scanning
-
San Diego, CA, Oct.
-
M. Allman, V. Paxson, and J. Terrell, "A brief history of scanning," in Proc. ACM SIGCOMM IMC, San Diego, CA, Oct. 2007, pp. 77-82.
-
(2007)
Proc. ACM SIGCOMM IMC
, pp. 77-82
-
-
Allman, M.1
Paxson, V.2
Terrell, J.3
-
9
-
-
0742283589
-
-
Sourcefire, Inc., Columbia, MD [Online]
-
M. Roesch, "Snort," Sourcefire, Inc., Columbia, MD, 2003 [Online]. Available: http://www.snort.org
-
(2003)
Snort
-
-
Roesch, M.1
-
10
-
-
80054102323
-
-
Sourcefire, Inc., Columbia, MD [Online]
-
"Snort Users Manual" Sourcefire, Inc., Columbia, MD, 2009 [Online]. Available: http://cvs.snort.org/viewcvs. cgi/*checkout*/ snort/doc/snort-manual.pdf?rev=1.72.2. 1&only-with-tag=SNORT-2-8- 0&content-type=application/pdf
-
(2009)
Snort Users Manual
-
-
-
11
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J. Hoagland, and J. McAlerney, "Practical automated detection of stealthy portscans," J. Comput. Security vol. 10, no. 1/2, pp. 105-136, 2002. (Pubitemid 34531414)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
12
-
-
27844566482
-
The MINDS-Minnesota intrusion detection system
-
Cambridge, MA: AAAI/MIT Press
-
L. Ertöz, E. Eilertson, A. Lazarevic, P.-N. Tan, V. Kumar, J. Srivastava, and P. Dokas, "The MINDS-Minnesota Intrusion Detection System," in Data Mining: Next Generation Challenges and Future Directions. Cambridge, MA: AAAI/MIT Press, 2004, pp. 199-218.
-
(2004)
Data Mining: Next Generation Challenges and Future Directions
, pp. 199-218
-
-
Ertöz, L.1
Eilertson, E.2
Lazarevic, A.3
Tan, P.-N.4
Kumar, V.5
Srivastava, J.6
Dokas, P.7
-
13
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan, "Fast portscan detection using sequential hypothesis testing," in Proc. IEEE S&P, 2004, pp. 211-225.
-
(2004)
Proc. IEEE S&P
, pp. 211-225
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
14
-
-
34547284915
-
Scan detection on very large networks using logistic regression modeling
-
Washington, DC
-
C. Gates, J. J. McNutt, J. B. Kadane, and M. I. Kellner, "Scan detection on very large networks using logistic regression modeling," in Proc. 11th IEEE Symp. Comput. Commun.,Washington, DC, 2006, pp. 402-408.
-
(2006)
Proc. 11th IEEE Symp. Comput. Commun.
, pp. 402-408
-
-
Gates, C.1
McNutt, J.J.2
Kadane, J.B.3
Kellner, M.I.4
-
15
-
-
80053477490
-
-
Ph.D. dissertation, School of Computer Science, Carleton Univ., Ottawa, ON, Canada
-
D. Whyte, "Network scanning detection strategies for enterprise networks," Ph.D. dissertation, School of Computer Science, Carleton Univ., Ottawa, ON, Canada, 2008.
-
(2008)
Network Scanning Detection Strategies for Enterprise Networks
-
-
Whyte, D.1
-
16
-
-
33745474966
-
Scan detection: A data mining approach
-
Proceedings of the Sixth SIAM International Conference on Data Mining
-
G. J. Simon, H. Xiong, E. Eilertson, and V. Kumar, J. Ghosh, D. Lambert, D. B. Skillicorn, and J. Srivastava, Eds., "Scan detection: A data mining approach," in Proc. 6th SIAM Int. Conf. Data Mining, Bethesda, MD, Apr. 2006, pp. 118-129. (Pubitemid 43955531)
-
(2006)
Proceedings of the Sixth SIAM International Conference on Data Mining
, vol.2006
, pp. 118-129
-
-
Simon, G.J.1
Xiong, H.2
Eilertson, E.3
Kumar, V.4
-
17
-
-
4544373082
-
Detecting low-profile probes and novel denial-of-service attacks
-
West Point, NY
-
R. Basu, R. K. Cunningham, S. E. Webster, and R. P. Lippmann, "Detecting low-profile probes and novel denial-of-service attacks," in Proc. IEEE SMC IA&S Workshop, West Point, NY, 2001, pp. 5-10.
-
(2001)
Proc. IEEE SMC IA&S Workshop
, pp. 5-10
-
-
Basu, R.1
Cunningham, R.K.2
Webster, S.E.3
Lippmann, R.P.4
-
18
-
-
77958030888
-
Improved detection of low-profile probe and novel denial-of-service attacks
-
Baltimore, MD, Jun. [Online]
-
W. Streilein, R. Cunningham, and S. Webster, "Improved detection of low-profile probe and novel denial-of-service attacks," in Proc. Workshop Statist. Mach. Learn. Tech. Comput. Intrusion Detect., Baltimore, MD, Jun. 2002 [Online]. Available: http://ams.jhu.edu/~cidwkshop/Presentations2002/Streilein- Paper.pdf
-
(2002)
Proc. Workshop Statist. Mach. Learn. Tech. Comput. Intrusion Detect.
-
-
Streilein, W.1
Cunningham, R.2
Webster, S.3
-
19
-
-
70350771144
-
Internet traffic classification demystified: Myths, caveats, and the best practices
-
Madrid, Spain, Dec.
-
H. Kim, K. C. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee, A. Azcorra, G. de Veciana, K. W. Ross, and L. Tassiulas, Eds., "Internet traffic classification demystified: Myths, caveats, and the best practices," in Proc. ACM CoNEXT, Madrid, Spain, Dec. 2008, p. 11.
-
(2008)
Proc. ACM CoNEXT
, pp. 11
-
-
Kim, H.1
Claffy, K.C.2
Fomenkov, M.3
Barman, D.4
Faloutsos, M.5
Lee, K.6
Azcorra, A.7
De Veciana, G.8
Ross, K.W.9
Tassiulas, L.10
-
20
-
-
85008008496
-
Internet traffic behavior profiling for network security monitoring
-
Dec.
-
K. Xu, Z.-L. Zhang, and S. Bhattacharyya, "Internet traffic behavior profiling for network security monitoring," IEEE/ACM Trans. Netw., vol. 16, no. 6, pp. 1241-1252, Dec. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.6
, pp. 1241-1252
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
21
-
-
77953863007
-
-
DefenceR&DCanada, Ottawa, ON, Canada, Tech. Rep. DRDC Ottawa TM 2003-139
-
J. Treurniet and J. H. Lefebvre, "A finite state machine model of TCP connections in the transport layer," DefenceR&DCanada, Ottawa, ON, Canada, Tech. Rep. DRDC Ottawa TM 2003-139, 2003.
-
(2003)
A Finite State Machine Model of TCP Connections in the Transport Layer
-
-
Treurniet, J.1
Lefebvre, J.H.2
-
22
-
-
80054122280
-
-
Defence R&D Canada, Ottawa, ON, Canada, Tech. Rep. DRDC Ottawa TM, 2005-168
-
J. Treurniet, "A finite state machine algorithm for detecting TCP anomalies: An examination of the 1999 DARPA intrusion detection evaluation data set," Defence R&D Canada, Ottawa, ON, Canada, Tech. Rep. DRDC Ottawa TM 2005-168, 2005.
-
(2005)
A Finite State Machine Algorithm for Detecting TCP Anomalies: An Examination of the 1999 DARPA Intrusion Detection Evaluation Data Set
-
-
Treurniet, J.1
-
23
-
-
84906784342
-
Detecting low-profile scans in tcp anomaly event data
-
New York
-
J. Treurniet, "Detecting low-profile scans in tcp anomaly event data," in Proc. ACM PST, New York, 2006, pp. 1-8.
-
(2006)
Proc. ACM PST
, pp. 1-8
-
-
Treurniet, J.1
-
25
-
-
0003260781
-
Transmission control protocol
-
Sep. [Online]
-
J. Postel, "Transmission Control Protocol," RFC 793, Sep. 1981 [Online]. Available: http://www.ietf.org/rfc/rfc793.txt
-
(1981)
RFC
, vol.793
-
-
Postel, J.1
-
26
-
-
0003355302
-
User datagram protocol
-
Aug. [Online]
-
J. Postel, "User Datagram Protocol," RFC 768, Aug. 1980 [Online]. Available: http://www.ietf.org/rfc/rfc768.txt
-
(1980)
RFC
, vol.768
-
-
Postel, J.1
-
27
-
-
0003232377
-
Internet control message protocol
-
Sep. [Online]
-
J. Postel, "Internet Control Message Protocol," RFC 792, Sep. 1981 [Online]. Available: http://www.ietf.org/rfc/rfc792.txt
-
(1981)
RFC
, vol.792
-
-
Postel, J.1
-
28
-
-
69349097375
-
-
Ph.D. dissertation, Faculty of Computer Science, Dalhousie Univ., Halifax, NS, Canada
-
C. Gates, "Co-ordinated port scans: A model, a detector and an evaluation methodology," Ph.D. dissertation, Faculty of Computer Science, Dalhousie Univ., Halifax, NS, Canada, 2006.
-
(2006)
Co-ordinated Port Scans: A Model, A Detector and An Evaluation Methodology
-
-
Gates, C.1
-
30
-
-
80054123001
-
-
Apostols, West Lafayette, IN [Online]
-
"Queso," Apostols, West Lafayette, IN, 1998 [Online]. Available: http://ftp.cerias.purdue.edu/pub/tools/unix/scanners/queso
-
(1998)
Queso
-
-
-
32
-
-
0003208908
-
File transfer protocol
-
Oct. [Online]
-
J. Postel and J. Reynolds, "File Transfer Protocol," RFC 959, Oct. 1985 [Online]. Available: http://www.ietf.org/rfc/rfc959.txt
-
(1985)
RFC
, vol.959
-
-
Postel, J.1
Reynolds, J.2
-
33
-
-
35048862795
-
Performance measurement and analysis of h.323 traffic
-
Antibes Juan-les-Pins, France, Apr.
-
P. Calyam, M. Sridharan, W. Mandrawa, and P. Schopis, "Performance measurement and analysis of h.323 traffic," in Proc. PAM, Antibes Juan-les-Pins, France, Apr. 2004, pp. 137-146.
-
(2004)
Proc. PAM
, pp. 137-146
-
-
Calyam, P.1
Sridharan, M.2
Mandrawa, W.3
Schopis, P.4
-
35
-
-
48649105415
-
Tracking darkports for network defense
-
Miami Beach, FL, Dec.
-
D. Whyte, P. C. v. Oorschot, and E. Kranakis, "Tracking darkports for network defense," in Proc. 23rd Annu. IEEE ACSAC, Miami Beach, FL, Dec. 2007, pp. 161-171.
-
(2007)
Proc. 23rd Annu. IEEE ACSAC
, pp. 161-171
-
-
Whyte, D.1
Oorschot, P.C.V.2
Kranakis, E.3
|