-
1
-
-
51949093835
-
Botnet research survey
-
Turku, Finland. IEEE, July-August
-
Y. C. Z. F. P. R. Z. Zhu, G. Lu and K. Han, "Botnet research survey," in Proc. of the 32nd Annual IEEE International Conference on Computer Software and Applications (COMPSAC'08), Turku, Finland. IEEE, July-August 2008, pp. 967-972.
-
(2008)
Proc. of the 32nd Annual IEEE International Conference On Computer Software and Applications (COMPSAC'08)
, pp. 967-972
-
-
Zhu, Y.C.Z.F.P.R.Z.1
Lu, G.2
Han, K.3
-
2
-
-
84886905280
-
-
Accssed January
-
"OSSEC," http://www.ossec.net, Accssed January 2011.
-
(2011)
OSSEC
-
-
-
3
-
-
84886877300
-
-
Accssed January
-
"TripWire," http://www.tripwire.com, Accssed January 2011.
-
(2011)
TripWire
-
-
-
4
-
-
84886895771
-
-
Accssed January
-
"Snort," http://www.snort.org, Accssed January 2011.
-
(2011)
Snort
-
-
-
5
-
-
84886880021
-
-
Accssed January
-
"Bro," http://www.bro-ids.org, Accssed January 2011.
-
(2011)
Bro
-
-
-
6
-
-
84886883941
-
-
Accssed January
-
J. Ullrich, "DShield," http://www.dshield.org/indexd.html, Accssed January 2011.
-
(2011)
DShield
-
-
Ullrich, J.1
-
7
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
Oakland, California, USA. IEEE, May
-
F. Cuppens and A. Miege, "Alert correlation in a cooperative intrusion detection framework," in Proc. of 2002 IEEE Symposium on Security and Privacy, Oakland, California, USA. IEEE, May 2002, pp. 202-215.
-
(2002)
Proc. of 2002 IEEE Symposium On Security and Privacy
, pp. 202-215
-
-
Cuppens, F.1
Miege, A.2
-
8
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
Linz, Austria. IEEE, June
-
R. Janakiraman and M. Zhang, "Indra: a peer-to-peer approach to network intrusion detection and prevention," in Proc. of the 12th IEEE International Workshops on Enabling Technologies (WETICE'03), Linz, Austria. IEEE, June 2003, pp. 226-231.
-
(2003)
Proc. of the 12th IEEE International Workshops On Enabling Technologies (WETICE'03)
, pp. 226-231
-
-
Janakiraman, R.1
Zhang, M.2
-
9
-
-
20844436808
-
Collaborative internet worm containment
-
M. Cai, K. Hwang, Y. Kwok, S. Song, and Y. Chen, "Collaborative internet worm containment," IEEE Security & Privacy, vol. 3, no. 3, pp. 25-33, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.3
Song, S.4
Chen, Y.5
-
10
-
-
70350552071
-
Trust management for host-based collaborative intrusion detection
-
Samos Island, Greece. IEEE, September
-
C. Fung, O. Baysal, J. Zhang, I. Aib, and R. Boutaba, "Trust management for host-based collaborative intrusion detection," in Proc. of the 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management (DSOM'08), Samos Island, Greece. IEEE, September 2008.
-
(2008)
Proc. of the 19th IFIP/IEEE International Workshop On Distributed Systems: Operations and Management (DSOM'08)
-
-
Fung, C.1
Baysal, O.2
Zhang, J.3
Aib, I.4
Boutaba, R.5
-
11
-
-
35048855121
-
Agent-based distributed intrusion alert system
-
Hiroshima, Japan, LNCS, Springer-Verlag, November
-
A. Ghosh and S. Sen, "Agent-based distributed intrusion alert system," in Proc. of the 6th International Workshop on Distributed Computing (IWDC'04), Hiroshima, Japan, LNCS, vol. 3326. Springer-Verlag, November 2004, pp. 240-251.
-
(2004)
Proc. of the 6th International Workshop On Distributed Computing (IWDC'04)
, vol.3326
, pp. 240-251
-
-
Ghosh, A.1
Sen, S.2
-
12
-
-
85137546697
-
Global intrusion detection in the domino overlay system
-
San Diego, USA, February
-
V. Yegneswaran, P. Barford, and S. Jha, "Global intrusion detection in the domino overlay system," in Proc. of Network and Distributed System Security Symposium (NDSS'04), San Diego, USA, February 2004.
-
Proc. of Network and Distributed System Security Symposium (NDSS'04)
, pp. 2004
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
13
-
-
33750682313
-
When gossip is good: Distributed probabilistic inference for detection of slow network intrusions
-
D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999
-
D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, "When gossip is good: Distributed probabilistic inference for detection of slow network intrusions," in Proc. of the National Conference on Artificial Intelligence, vol. 21, no. 2. Menlo Park, CA; Cambridge, MA; London; AAAI Press; MIT Press; 1999, 2006, p. 1115.
-
(2006)
Proc. of the National Conference On Artificial Intelligence
, vol.21
, Issue.2
, pp. 1115
-
-
-
14
-
-
33745469273
-
Towards collaborative security and p2p intrusion detection
-
New York, USA. IEEE, June
-
A. K. M.E. Locasto, J.J. Parekh and S. Stolfo, "Towards collaborative security and p2p intrusion detection," in Proc. of 2005 IEEE Information Assurance Workshop (IAW'05), New York, USA. IEEE, June 2005, pp. 30-36.
-
(2005)
Proc. of 2005 IEEE Information Assurance Workshop (IAW'05)
, pp. 30-36
-
-
Locasto, A.K.M.E.1
Parekh, J.J.2
Stolfo, S.3
-
15
-
-
51349149626
-
Alpacas: A large-scale privacy-aware collaborative anti-spam system
-
Phoenix, Arizona, USA. IEEE, June
-
Z. Zhong, L. Ramaswamy, and K. Li, "Alpacas: A large-scale privacy-aware collaborative anti-spam system," in Proc. of IEEE INFOCOM 2008, Phoenix, Arizona, USA. IEEE, June 2008, pp. 556-564.
-
(2008)
Proc. of IEEE INFOCOM 2008
, pp. 556-564
-
-
Zhong, Z.1
Ramaswamy, L.2
Li, K.3
-
16
-
-
84947273682
-
The sybil attack
-
Cambridge, MA, USA, LNCS, Springer-Verlag, March
-
J. Douceur, "The sybil attack," in Proc. of the 1st International Workshop on Peer-to-Peer Systems (IPTPS'02), Cambridge, MA, USA, LNCS, vol. 2429. Springer-Verlag, March 2002, pp. 251-260.
-
(2002)
Proc. of the 1st International Workshop On Peer-to-Peer Systems (IPTPS'02)
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
-
17
-
-
0002101577
-
Reputation systems
-
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, "Reputation systems," Commun. ACM, vol. 43, no. 12, pp. 45-48, 2000.
-
(2000)
Commun. ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
18
-
-
35048879637
-
Honeystat: Local worm detection using honeypots
-
French Riviera, France, LNCS. Springer-Verlag, September
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen, "Honeystat: Local worm detection using honeypots," in Proc. of the 7th International Symposium on Recent Advances in Intrusion Detection (RAID'04), French Riviera, France, LNCS. Springer-Verlag, September 2004, pp. 39-58.
-
(2004)
Proc. of the 7th International Symposium On Recent Advances In Intrusion Detection (RAID'04)
, pp. 39-58
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
19
-
-
84886912261
-
-
Accssed January
-
"myNetWatchman," http://www.mynetwatchman.com, Accssed January 2011.
-
(2011)
MyNetWatchman
-
-
-
21
-
-
84886926781
-
-
SANS Internet Storm Center (ISC), Accssed January
-
"SANS Internet Storm Center (ISC)," http://isc.sans.org, Accssed January 2011.
-
(2011)
-
-
-
22
-
-
70449403415
-
Robust and sscalable trust management for collaborative intrusion detection
-
Long Island, NY, USA. IEEE, June
-
C. Fung, J. Zhang, I. Aib, and R. Boutaba, "Robust and sscalable trust management for collaborative intrusion detection," in Proc. of the 11th IFIP/IEEE International Symposium on Integrated Network Management (IM'09), Long Island, NY, USA. IEEE, June 2009.
-
(2009)
Proc. of the 11th IFIP/IEEE International Symposium On Integrated Network Management (IM'09)
-
-
Fung, C.1
Zhang, J.2
Aib, I.3
Boutaba, R.4
-
23
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Cambridge, MA, USA, August
-
J. Grizzard, V. Sharma, C. Nunnery, B. Kang, and D. Dagon, "Peer-to-peer botnets: Overview and case study," in Proc. of the First USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, USA, August 2007.
-
(2007)
Proc. of the First USENIX Workshop On Hot Topics In Understanding Botnets (HotBots'07)
-
-
Grizzard, J.1
Sharma, V.2
Nunnery, C.3
Kang, B.4
Dagon, D.5
-
24
-
-
58149145577
-
Detection and mitigation of fast-flux service networks
-
San Diego, USA, February
-
T. Holz, C. Gorecki, K. Rieck, and F. Freiling, "Detection and mitigation of fast-flux service networks," in Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), San Diego, USA, February 2008.
-
(2008)
Proc. of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.4
-
25
-
-
51149084743
-
A self-healing, self-protecting collaborative intrusion detection architecture to trace-back fast-flux phishing domains
-
Salvador, Brazil. IEEE, April
-
C. V. Zhou, C. Leckie, S. Karunasekera, and T. Peng, "A self-healing, self-protecting collaborative intrusion detection architecture to trace-back fast-flux phishing domains," in Proc. of the 2nd IEEE Workshop on Autonomic Communication and Network Management (ACNM'08), Salvador, Brazil. IEEE, April 2008.
-
(2008)
Proc. of the 2nd IEEE Workshop On Autonomic Communication and Network Management (ACNM'08)
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
Peng, T.4
-
26
-
-
71749083441
-
Collaborative detection of fast flux phishing domains
-
February
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "Collaborative detection of fast flux phishing domains," Journal of Networks, vol. 4, no. 1, pp. 75-84, February 2009.
-
(2009)
Journal of Networks
, vol.4
, Issue.1
, pp. 75-84
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
|