-
1
-
-
84946398426
-
The use of Honeynets to detect exploited systems across large enterprise networks
-
J. Levine, R. LaBella, H. Owen, D. Contis, and B. Culver, "The use of Honeynets to detect exploited systems across large enterprise networks," in Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY June 2003. pp. 92-99.
-
Proceedings of the 2003 IEEE Workshop on Information Assurance, United States Military Academy, West Point, NY June 2003
, pp. 92-99
-
-
Levine, J.1
LaBella, R.2
Owen, H.3
Contis, D.4
Culver, B.5
-
2
-
-
3042581533
-
-
Addison-Wesley, Available from
-
L. Spitzner, "Honeypots: Tracking Hackers", Addison-Wesley, Available from: http://www.tracking-hackers.com/book/, 2003.
-
(2003)
Honeypots: Tracking Hackers
-
-
Spitzner, L.1
-
4
-
-
84882736734
-
Employing Honeynets for Network Situational Awareness
-
S. Jajodia, P. Liu, V. Swarup, and C. Wang, Eds., ed: Springer US
-
P. Barford, Y. Chen, A. Goyal, Z. Li, V. Paxson, and V. Yegneswaran, "Employing Honeynets For Network Situational Awareness," in Cyber Situational Awareness. Vol. 46, S. Jajodia, P. Liu, V. Swarup, and C. Wang, Eds., ed: Springer US, 2010, pp. 71-102.
-
(2010)
Cyber Situational Awareness
, vol.46
, pp. 71-102
-
-
Barford, P.1
Chen, Y.2
Goyal, A.3
Li, Z.4
Paxson, V.5
Yegneswaran, V.6
-
5
-
-
68049121093
-
Anomaly detection
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly detection,"ACM Computing Surveys, Vol. 41, pp. 1-58, 2009.
-
(2009)
ACM Computing Surveys
, vol.41
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
6
-
-
48749129421
-
A framework for attack patterns' discovery in honeynet data
-
O. Thonnard and M. Dacier, "A framework for attack patterns' discovery in honeynet data," in Digital Investigation, Vol. 5, pp. S128-S139, 2008.
-
(2008)
Digital Investigation
, vol.5
-
-
Thonnard, O.1
Dacier, M.2
-
7
-
-
50949130514
-
NIS04-1: Wavelet-based detection of DoS attacks
-
A. Dainotti, A. Pescape, and G. Ventre, "NIS04-1: wavelet-based detection of DoS attacks", in Proceedingd of the IEEE Global Telecommunications Conference, GLOBECOM'06, San Francisco, USA, 2006, pp. 1-6.
-
Proceedingd of the IEEE Global Telecommunications Conference, GLOBECOM'06, San Francisco, USA, 2006
, pp. 1-6
-
-
Dainotti, A.1
Pescape, A.2
Ventre, G.3
-
8
-
-
18144369239
-
DiDDeM: A System for Early Detection of TCP SYN Flood Attacks
-
J. Haggerty, T. Berry, Q. Shi, and M. Merabti, "DiDDeM: A System for Early Detection of TCP SYN Flood Attacks", in Proceedings of the IEEE Globecom 2004 - Security and Network Management, USA, 2004, pp. 2037-2042.
-
Proceedings of the IEEE Globecom 2004 - Security and Network Management, USA, 2004
, pp. 2037-2042
-
-
Haggerty, J.1
Berry, T.2
Shi, Q.3
Merabti, M.4
-
10
-
-
0141427794
-
A signal analysis of network traffic anomalies
-
nd ACM SIGCOMM Workshop on Internet measurment, Marseille, France, 2002.
-
nd ACM SIGCOMM Workshop on Internet Measurment, Marseille, France, 2002
-
-
Barford, P.1
Kline, J.2
Plonka, D.3
Ron, A.4
-
11
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in the Proceedings of the 2005 Conference on Applications, technologies, architectures, and protocols for computer communications, Philadelphia, Pennsylvania, USA, 2005.
-
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, 2005
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
12
-
-
63049084484
-
An empirical evaluation of entropy-based traffic anomaly detection
-
th ACM SIGCOMM Conference on Internet Measurement, Vouliagmeni, Greece, 2008.
-
th ACM SIGCOMM Conference on Internet Measurement, Vouliagmeni, Greece, 2008
-
-
Nychis, G.1
Sekar, V.2
Andersen, D.G.3
Kim, H.4
Zhang, H.5
-
13
-
-
75149179043
-
Histogram-based traffic anomaly detection
-
A. Kind, M. P. Stoecklin, and X. Dimitropoulos, "Histogram-based traffic anomaly detection," Network and Service Management, IEEE Transactions, Vol. 6, pp. 110-121, 2009.
-
(2009)
Network and Service Management, IEEE Transactions
, vol.6
, pp. 110-121
-
-
Kind, A.1
Stoecklin, M.P.2
Dimitropoulos, X.3
-
14
-
-
71049160885
-
An entropy-based countermeasure against intelligent dos attacks targeting firewalls
-
th IEEE International Conference on Policies for Distributed Systems and Networks, London, United Kingdom, 2009.
-
th IEEE International Conference on Policies for Distributed Systems and Networks, London, United Kingdom, 2009
-
-
Al-Haidari, F.1
Sqalli, M.2
Salah, K.3
Hamodi, J.4
-
15
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
García-Teodoro, P., J. Díaz-Verdejo, G. Maciá-Fernández, and E. Vázquez, "Anomaly-based network intrusion detection: Techniques, systems and challenges," Computers & Security, 28(1-2), pp. 18-28, 2008.
-
(2008)
Computers & Security
, vol.28
, Issue.1-2
, pp. 18-28
-
-
García-Teodoro, P.1
Díaz-Verdejo, J.2
Maciá- Fernández, G.3
Vázquez, E.4
-
16
-
-
83355163419
-
-
Available from
-
Honeynet Project, "Honeynet Project Challenges," Available from: http://www.honeynet.org/challenges.
-
Honeynet Project Challenges
-
-
-
17
-
-
80053947702
-
-
hack.lu, hack.lu Available from: 2009
-
hack.lu, "Information Security Visualization Contest," hack.lu 2009, Available from: http://2009.hack.lu/index.php/InfoVisContest," 2009.
-
(2009)
Information Security Visualization Contest
-
-
-
18
-
-
21844451952
-
Diagnosing network-wide traffic anomalies
-
Lakhina, A., M. Crovella, and C. Diot, "Diagnosing network-wide traffic anomalies," SIGCOMM Comput. Commun. Rev., 34(4), pp. 219-230, 2004.
-
(2004)
SIGCOMM Comput. Commun. Rev.
, vol.34
, Issue.4
, pp. 219-230
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
|