-
5
-
-
84857265298
-
-
Nox box, http://noxrepo.org/manual/noxbox.html
-
Nox Box
-
-
-
6
-
-
84872241240
-
-
Open vswitch, http://openvswitch.org/
-
Open Vswitch
-
-
-
10
-
-
58049132069
-
-
Voyage linux, http://linux.voyage.hk/
-
Voyage Linux
-
-
-
11
-
-
79959464543
-
-
Anti-phishingworking group. 4th quarter / 2009
-
Anti-phishingworking group. phishing activity trends report, 4th quarter / 2009 (2010), http://www.antiphishing.org/reports/apwg-report-Q4-2009.pdf
-
(2010)
Phishing Activity Trends Report
-
-
-
12
-
-
56549083676
-
A comparative evaluation of anomaly detectors under portscan attacks
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Ashfaq, A.B., Robert, M.J., Mumtaz, A., Ali, M.Q., Sajjad, A., Khayam, S.A.: A comparative evaluation of anomaly detectors under portscan attacks. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 351-371. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 351-371
-
-
Ashfaq, A.B.1
Robert, M.J.2
Mumtaz, A.3
Ali, M.Q.4
Sajjad, A.5
Khayam, S.A.6
-
13
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
ACM, New York
-
Brauckhoff, D., Tellenbach, B., Wagner, A., May, M., Lakhina, A.: Impact of packet sampling on anomaly detection metrics. In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 159-164. ACM, New York (2006)
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006
, pp. 159-164
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
14
-
-
85032963495
-
Design and implementation of a routing control platform
-
USENIX Association, Berkeley
-
Caesar, M., Caldwell, D., Feamster, N., Rexford, J., Shaikh, A., van der Merwe, J.: Design and implementation of a routing control platform. In: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, NSDI 2005, vol. 2, pp. 15-28. USENIX Association, Berkeley (2005)
-
(2005)
Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation, NSDI 2005
, vol.2
, pp. 15-28
-
-
Caesar, M.1
Caldwell, D.2
Feamster, N.3
Rexford, J.4
Shaikh, A.5
Van Der Merwe, J.6
-
15
-
-
84857259133
-
Moving toward the middle: The case against the end-to-end argument
-
Calvert, K.L., Keith, W., Rebecca, E., Grinter, E.: Moving toward the middle: The case against the end-to-end argument. In: Home Networking. Sixth Workshop on Hot Topics in Networks (2007)
-
(2007)
Home Networking. Sixth Workshop on Hot Topics in Networks
-
-
Calvert, K.L.1
Keith, W.2
Rebecca, E.3
Grinter, E.4
-
16
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
Casado, M., Freedman, M.J., Pettit, J., Luo, J., McKeown, N., Shenker, S.: Ethane: taking control of the enterprise. SIGCOMM Comput. Commun. Rev. 37, 1-12 (2007)
-
(2007)
SIGCOMM Comput. Commun. Rev.
, vol.37
, pp. 1-12
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
17
-
-
44249126961
-
Sane: A protection architecture for enterprise networks
-
USENIX Association, Berkeley
-
Casado, M., Garfinkel, T., Akella, A., Freedman, M.J., Boneh, D., McKeown, N., Shenker, S.: Sane: a protection architecture for enterprise networks. In: Proceedings of the 15th Conference on USENIX Security Symposium, vol. 15. USENIX Association, Berkeley (2006)
-
(2006)
Proceedings of the 15th Conference on USENIX Security Symposium
, vol.15
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.J.4
Boneh, D.5
McKeown, N.6
Shenker, S.7
-
18
-
-
84865535788
-
The home needs an operating system (and an app store)
-
ACM, New York
-
Dixon, C., Mahajan, R., Agarwal, S., Brush, A.J., Lee, B., Saroiu, S., Bahl, V.: The home needs an operating system (and an app store). In: Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets 2010, pp.18:1-18:6. ACM, New York (2010)
-
(2010)
Proceedings of the Ninth ACM SIGCOMM Workshop on Hot Topics in Networks, Hotnets 2010
-
-
Dixon, C.1
Mahajan, R.2
Agarwal, S.3
Brush, A.J.4
Lee, B.5
Saroiu, S.6
Bahl, V.7
-
20
-
-
84878701863
-
Detecting anomalies in network traffic using maximum entropy estimation
-
USENIX Association, Berkeley
-
Gu, Y., McCallum, A., Towsley, D.: Detecting anomalies in network traffic using maximum entropy estimation. In: Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC 2005, p. 32. USENIX Association, Berkeley (2005)
-
(2005)
Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement, IMC 2005
, pp. 32
-
-
Gu, Y.1
McCallum, A.2
Towsley, D.3
-
21
-
-
70350656962
-
Nox: Towards an operating system for networks
-
Gude, N., Koponen, T., Pettit, J., Pfaff, B., Casado, M., McKeown, N., Shenker, S.: Nox: towards an operating system for networks. SIGCOMM Comput. Commun. Rev. 38, 105-110 (2008)
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, pp. 105-110
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
22
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
23
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
Kim, M.S., Kong, H.J., Hong, S.C., Chung, S.H., Hong, J.: A flow-based method for abnormal network traffic detection. In: IEEE/IFIP Network Operations and Management Symposium, NOMS 2004, vol. 1, pp. 599-612 (2004)
-
(2004)
IEEE/IFIP Network Operations and Management Symposium, NOMS 2004
, vol.1
, pp. 599-612
-
-
Kim, M.S.1
Kong, H.J.2
Hong, S.C.3
Chung, S.H.4
Hong, J.5
-
24
-
-
84857207112
-
Onix: A distributed control platform for large-scale production networks
-
USENIX Association, Berkeley
-
Koponen, T., Casado, M., Gude, N., Stribling, J., Poutievski, L., Zhu, M., Ramanathan, R., Iwata, Y., Inoue, H., Hama, T., Shenker, S.: Onix: a distributed control platform for large-scale production networks. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010, pp. 1-6. USENIX Association, Berkeley (2010)
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI 2010
, pp. 1-6
-
-
Koponen, T.1
Casado, M.2
Gude, N.3
Stribling, J.4
Poutievski, L.5
Zhu, M.6
Ramanathan, R.7
Iwata, Y.8
Inoue, H.9
Hama, T.10
Shenker, S.11
-
25
-
-
33847290520
-
Mining anomalies using traffic feature distributions
-
Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: ACM SIGCOMM. pp. 217-228 (2005)
-
(2005)
ACM SIGCOMM
, pp. 217-228
-
-
Lakhina, A.1
Crovella, M.2
Diot, C.3
-
26
-
-
0037661195
-
Network traffic anomaly detection based on packet bytes
-
Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. Springer, Heidelberg
-
Mahoney, M.V.: Network traffic anomaly detection based on packet bytes. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 346-350. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3006
, pp. 346-350
-
-
Mahoney, M.V.1
-
27
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
ACM, New York
-
Mai, J., Chuah, C.N., Sridharan, A., Ye, T., Zang, H.: Is sampled data sufficient for anomaly detection? In: Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006, pp. 165-176. ACM, New York (2006)
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC 2006
, pp. 165-176
-
-
Mai, J.1
Chuah, C.N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
28
-
-
68649129121
-
Openflow: Enabling innovation in campus networks
-
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev. 38, 69-74 (2008)
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
29
-
-
35048831757
-
Fast detection of scanning worm infections
-
Schechter, S.E., Jung, J., Berger, A.W.: Fast detection of scanning worm infections. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 59-81. Springer, Heidelberg (2004) (Pubitemid 39741888)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3224
, pp. 59-81
-
-
Schechter, S.E.1
Jung, J.2
Berger, A.W.3
-
30
-
-
84860603040
-
Implementing and testing a virus throttle
-
USENIX Association, Berkeley
-
Twycross, J., Williamson, M.M.: Implementing and testing a virus throttle. In: Proceedings of the 12th Conference on USENIX Security Symposium, vol. 12, p. 20. USENIX Association, Berkeley (2003)
-
(2003)
Proceedings of the 12th Conference on USENIX Security Symposium
, vol.12
, pp. 20
-
-
Twycross, J.1
Williamson, M.M.2
-
31
-
-
84948951525
-
Throttling viruses: Restricting propagation to defeat malicious mobile code
-
Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. In: ACSAC (2002)
-
(2002)
ACSAC
-
-
Williamson, M.M.1
-
32
-
-
78549264129
-
A study on network management tools of householders
-
ACM, New York
-
Yang, J., Edwards, W.K.: A study on network management tools of householders. In: Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets 2010, pp. 1-6. ACM, New York (2010)
-
(2010)
Proceedings of the 2010 ACM SIGCOMM Workshop on Home Networks, HomeNets 2010
, pp. 1-6
-
-
Yang, J.1
Edwards, W.K.2
|