-
1
-
-
21844456680
-
Shield: Vulnerability-driven network filters for preventing known vulnerability exploits
-
DOI 10.1145/1030194.1015489, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
H. Wang, C. Guo, D. Simon, and A. Zugenmaier, "Shield: Vulnerability-driven network filters for preventing known vulnerability exploits," in ACM SIGCOMM Computer Communication Review, vol. 34, no. 4. ACM, 2004, pp. 193-204. (Pubitemid 40954880)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 193-204
-
-
Wang, H.J.1
Guo, C.2
Simon, D.R.3
Zugenmaier, A.4
-
2
-
-
79960349207
-
-
September [Online]
-
A. Matrosov, E. Rodionov, D. Harley, and J. Malcho, "Stuxnet Under the Microscope," eset, September 2010. [Online]. Available: http://www.eset.com/resources/white-papers/Stuxnet-Under-the-Microscope.pdf
-
(2010)
Stuxnet Under the Microscope
-
-
Matrosov, A.1
Rodionov, E.2
Harley, D.3
Malcho, J.4
-
3
-
-
80055025588
-
-
January [Online]
-
"United Press International UPI," January 2009. [Online]. Available: http://www.upi.com/Top-News/2009/01/25/Virus-strikes-15-million-PCs/ UPI-19421232924206/
-
(2009)
United Press International UPI
-
-
-
4
-
-
21844434512
-
-
November [Online]
-
"Microsoft Security Bulletin MS01-033," November 2003. [Online]. Available: http://www.microsoft.com/technet/treeview/default.asp?url=/ technet/security/bulletin/MS01-033.asp.
-
(2003)
Microsoft Security Bulletin MS01-033
-
-
-
5
-
-
21844439815
-
-
January [Online]
-
"Microsoft security bulletin ms02-039," January 2003. [Online]. Available: http://www.microsoft.com/technet/treeview/default.asp?url=/technet/ security/bulletin/MS02-039.asp.
-
(2003)
Microsoft Security Bulletin Ms02-039
-
-
-
6
-
-
2342553315
-
-
September [Online]
-
"Microsoft Security Bulletin MS03-026," September 2003. [Online]. Available: http://www.microsoft.com/technet/treeview/default.asp?url=/ technet/security/bulletin/MS03-026.asp.
-
(2003)
Microsoft Security Bulletin MS03-026
-
-
-
7
-
-
21844451704
-
-
April [Online]
-
"W32. Sasser. Worm," April 2004. [Online]. Available: http://securityresponse.symantec.com/avcenter/venc/data/w32.sasser.worm.html.
-
(2004)
W32. Sasser. Worm
-
-
-
8
-
-
77951555722
-
Evaluating dos attacks against sip-based voip systems
-
IEEE, HI, USA
-
M. Rafique, A. Akbar, and M. Farooq, "Evaluating dos attacks against sip-based voip systems," in Proceedings of 28th Global Telecommunications Conference (GLOBECOM). IEEE, HI, USA, 2009, pp. 1-6.
-
(2009)
Proceedings of 28th Global Telecommunications Conference (GLOBECOM)
, pp. 1-6
-
-
Rafique, M.1
Akbar, A.2
Farooq, M.3
-
11
-
-
80054976490
-
-
[Online]
-
"Remote DoS on Cisco IoS," 2009. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2867.
-
(2009)
Remote dos on Cisco IoS
-
-
-
12
-
-
80054970698
-
-
[Online]
-
"Remote DoS on Asterisks SIP Server," 2007. [Online]. Available: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1306.
-
(2007)
Remote dos on Asterisks SIP Server
-
-
-
14
-
-
70349735505
-
-
[Online]
-
SANS-Institute, "SANS Top-20 2007 Security Risks," 2007. [Online]. Available: http://www.sans.org/top20/
-
(2007)
SANS Top-20 2007 Security Risks
-
-
-
15
-
-
85090433665
-
Snort-lightweight intrusion detection for networks
-
Seattle, WA, USA
-
M. Roesch, "Snort-lightweight intrusion detection for networks," in Proceedings of the 13th USENIX conference on System administration. Seattle, WA, USA, 1999, pp. 229-238.
-
(1999)
Proceedings of the 13th USENIX Conference on System Administration
, pp. 229-238
-
-
Roesch, M.1
-
16
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson, "Bro: A system for detecting network intruders in real-time," Comput. Networks, vol. 31, no. 23, pp. 2435-2463, 1999.
-
(1999)
Comput. Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
17
-
-
80054988153
-
-
[Online]
-
"Hogwash." [Online]. Available: http://sourceforge.net/ projects/hogwash/.
-
Hogwash
-
-
-
18
-
-
56549118700
-
KiF: A stateful SIP fuzzer
-
ACM, NY, USA
-
H. Abdelnur et al., "KiF: a stateful SIP fuzzer," in Proceedings of the 1st international conference on Principles, systems and applications of IP telecommunications. ACM, NY, USA, 2007, pp. 47-56.
-
(2007)
Proceedings of the 1st International Conference on Principles, Systems and Applications of IP Telecommunications
, pp. 47-56
-
-
Abdelnur, H.1
-
19
-
-
80055014113
-
An introduction to SPIKE, the fuzzer creation kit
-
D. Aitel, "An Introduction to SPIKE, the Fuzzer Creation Kit," immunity inc. white paper, 2004.
-
(2004)
Immunity Inc. White Paper
-
-
Aitel, D.1
-
20
-
-
77951617015
-
-
The-VoIP-Network, "VoIP Market Trends," 2008, http://www.the-voip-network.com/voipmarket.html.
-
(2008)
VoIP Market Trends
-
-
-
21
-
-
48749130030
-
Traffic classification through simple statistical fingerprinting
-
M. Crotti, M. Dusi, F. Gringoli, and L. Salgarelli, "Traffic classification through simple statistical fingerprinting," ACM SIGCOMM Computer Communication Review, vol. 37, no. 1, pp. 5-16, 2007.
-
(2007)
ACM Sigcomm Computer Communication Review
, vol.37
, Issue.1
, pp. 5-16
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
23
-
-
33751035543
-
SIP intrusion detection and prevention: Recommendations and prototype implementation
-
S. Niccolini, R. Garroppo, S. Giordano, G. Risi, and S. Ventura, "SIP intrusion detection and prevention: recommendations and prototype implementation," in 1st IEEE Workshop on VoIP Management and Security, 2006, pp. 47-52.
-
(2006)
1st IEEE Workshop on VoIP Management and Security
, pp. 47-52
-
-
Niccolini, S.1
Garroppo, R.2
Giordano, S.3
Risi, G.4
Ventura, S.5
-
24
-
-
80055001605
-
Space dive: A distributed intrusion detection system for voice-over-IP environments
-
V. Apte, Y. Wu, S. Bagchi, S. Garg, and N. Singh, "Space Dive: A Distributed Intrusion Detection System for Voice-over-IP Environments," DSN 2006, p. 222.
-
DSN 2006
, pp. 222
-
-
Apte, V.1
Wu, Y.2
Bagchi, S.3
Garg, S.4
Singh, N.5
-
25
-
-
33947123970
-
A framework for protecting a SIP-based infrastructure against malformed message attacks
-
DOI 10.1016/j.comnet.2006.11.014, PII S1389128606003458
-
D. Geneiatakis, G. Kambourakis, C. Lambrinoudakis, T. Dagiuklas, and S. Gritzalis, "A framework for protecting a SIP-based infrastructure against malformed message attacks," Computer Networks, vol. 51, no. 10, pp. 2580-2593, 2007. (Pubitemid 46678900)
-
(2007)
Computer Networks
, vol.51
, Issue.10
, pp. 2580-2593
-
-
Geneiatakis, D.1
Kambourakis, G.2
Lambrinoudakis, C.3
Dagiuklas, T.4
Gritzalis, S.5
-
26
-
-
34547396634
-
Binpac: A yacc for writing application protocol parsers
-
DOI 10.1145/1177080.1177119, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
R. Pang, V. Paxson, R. Sommer, and L. Peterson, "binpac: A yacc for writing application protocol parsers," in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement. ACM, NY, USA, 2006, pp. 289-300. (Pubitemid 47165611)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 289-300
-
-
Pang, R.1
Paxson, V.2
Sommer, R.3
Peterson, L.4
-
27
-
-
85180532687
-
A generic application-level protocol analyzer and its language
-
N. Borisov, D. Brumley, H. Wang, J. Dunagan, P. Joshi, and C. Guo, "A generic application-level protocol analyzer and its language," in 14h Symposium on Network and Distributed System Security (NDSS), 2007.
-
(2007)
14h Symposium on Network and Distributed System Security (NDSS)
-
-
Borisov, N.1
Brumley, D.2
Wang, H.3
Dunagan, J.4
Joshi, P.5
Guo, C.6
-
28
-
-
58449089032
-
Incorporation of application layer protocol syntax into anomaly detection
-
Springer-Verlag
-
P. Dussel, C. Gehl, P. Laskov, and K. Rieck, "Incorporation of Application Layer Protocol Syntax into Anomaly Detection," in Proceedings of the 4th International Conference on Information Systems Security. Springer-Verlag, 2008, pp. 188-202.
-
(2008)
Proceedings of the 4th International Conference on Information Systems Security
, pp. 188-202
-
-
Dussel, P.1
Gehl, C.2
Laskov, P.3
Rieck, K.4
-
29
-
-
33846369107
-
Learning DFA representations of HTTP for protecting web applications
-
DOI 10.1016/j.comnet.2006.09.016, PII S1389128606002416, From Intrusion Detection to Self-Protection
-
K. Ingham, A. Somayaji, J. Burge, and S. Forrest, "Learning DFA representations of HTTP for protecting web applications," Computer Networks, vol. 51, no. 5, pp. 1239-1255, 2007. (Pubitemid 46131444)
-
(2007)
Computer Networks
, vol.51
, Issue.5
, pp. 1239-1255
-
-
Ingham, K.L.1
Somayaji, A.2
Burge, J.3
Forrest, S.4
-
30
-
-
57349174533
-
A self-learning system for detection of anomalous sip messages
-
Second International Conference, LNCS. Springer
-
K. Rieck, S. Wahl, P. Laskov, P. Domschitz, and K. Muller, "A self-learning system for detection of anomalous sip messages," in Principles, Systems and Applications of IP Telecommunications (IPTCOMM), Second International Conference, LNCS. Springer, 2008, pp. 90-106.
-
(2008)
Principles, Systems and Applications of IP Telecommunications (IPTCOMM)
, pp. 90-106
-
-
Rieck, K.1
Wahl, S.2
Laskov, P.3
Domschitz, P.4
Muller, K.5
-
31
-
-
14844319067
-
Anomaly detection of Web-based attacks
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
C. Kruegel and G. Vigna, "Anomaly detection of web-based attacks," in Proceedings of the 10th ACM conference on Computer and communications security. ACM, NY, USA, 2003, pp. 251-261. (Pubitemid 40673807)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 251-261
-
-
Kruegel, C.1
Vigna, G.2
-
32
-
-
74049088532
-
Using spatio-temporal information in API calls with machine learning algorithms for malware detection
-
ACM
-
F. Ahmed, H. Hameed, M. Shafiq, and M. Farooq, "Using spatio-temporal information in API calls with machine learning algorithms for malware detection," in Proceedings of the 2nd ACM workshop on Security and artificial intelligence. ACM, 2009, pp. 55-62.
-
(2009)
Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence
, pp. 55-62
-
-
Ahmed, F.1
Hameed, H.2
Shafiq, M.3
Farooq, M.4
-
33
-
-
0029716418
-
A sense of self for unix processes
-
IEEE COMPUTER SOCIETY
-
S. Forrest, S. Hofmeyr, A. Somayaji, T. Longstaff et al., "A sense of self for unix processes," in IEEE Symposium on Security and Privacy. IEEE COMPUTER SOCIETY, 1996, pp. 120-128.
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.2
Somayaji, A.3
Longstaff, T.4
-
34
-
-
33750379862
-
Behavioral distance measurement using hidden Markov models
-
D. Gao, M. Reiter, and D. Song, "Behavioral distance measurement using hidden markov models," Lecture Notes in Computer Science, vol. 4219, p. 19, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4219
, pp. 19
-
-
Gao, D.1
Reiter, M.2
Song, D.3
-
35
-
-
33846910249
-
Language models for detection of unknown attacks in network traffic
-
K. Rieck and P. Laskov, "Language models for detection of unknown attacks in network traffic," Journal in Computer Virology, vol. 2, no. 4, pp. 243-256, 2007.
-
(2007)
Journal in Computer Virology
, vol.2
, Issue.4
, pp. 243-256
-
-
Rieck, K.1
Laskov, P.2
-
36
-
-
33750335757
-
Anagram: A content anomaly detector resistant to mimicry attack
-
4219 LNCS, Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
K. Wang, J. Parekh, and S. Stolfo, "Anagram: A content anomaly detector resistant to mimicry attack," in Recent Advances in Intrusion Detection. Springer, 2006, pp. 226-248. (Pubitemid 44617855)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 226-248
-
-
Wang, K.1
Parekh, J.J.2
Stolfo, S.J.3
-
39
-
-
80054994110
-
-
INFIGO-Information-Security, "FTP Fuzzer," http://www.infigo. hr/files/.
-
FTP Fuzzer
-
-
|