-
1
-
-
79960618060
-
Browsing behavior mimicking attacks on popular websites
-
S. Yu, G. Zhao, S. Guo, Y. Xiang, and A. Vasilakos, "Browsing behavior mimicking attacks on popular websites," in INFOCOM Workshops, 2011, pp. 947-951.
-
INFOCOM Workshops, 2011
, pp. 947-951
-
-
Yu, S.1
Zhao, G.2
Guo, S.3
Xiang, Y.4
Vasilakos, A.5
-
2
-
-
77955872093
-
On anonymity in an electronic society: A survey of anonymous communication systems
-
M. Edman and B. Yener, "On anonymity in an electronic society: A survey of anonymous communication systems," ACM Computing Survey, vol. 42, no. 1, 2009.
-
(2009)
ACM Computing Survey
, vol.42
, Issue.1
-
-
Edman, M.1
Yener, B.2
-
3
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in CCS '09: Proceedings of the 2009 ACM conference on computer communication security, 2009.
-
CCS '09: Proceedings of the 2009 ACM Conference on Computer Communication Security, 2009
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
4
-
-
79951817047
-
Towards situational awareness of large-scale botnet probing events
-
Z. Li, A. Goyal, Y. Chen, and V. Paxson, "Towards situational awareness of large-scale botnet probing events," IEEE Transactions on Information Forensics and Security, vol. 6, no. 1, pp. 175-188, 2011.
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.1
, pp. 175-188
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
5
-
-
84857360605
-
Abnormally malicious autonomous systems and their internet connectivity
-
in press
-
C. Shue, A. Kalafut, and M. Gupta, "Abnormally malicious autonomous systems and their internet connectivity," IEEE Transactions on Networking (in press).
-
IEEE Transactions on Networking
-
-
Shue, C.1
Kalafut, A.2
Gupta, M.3
-
6
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in HotBots'07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
-
HotBots'07: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, 2007
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
7
-
-
79957629730
-
Identifying suspicious activities through dns failure graph analysis
-
N. Jiang, J. Cao, Y. Jin, L. E. Li, and Z.-L. Zhang, "Identifying suspicious activities through dns failure graph analysis," in Proceedings of the IEEE International Conference on Network Protocols, 2010, pp. 144-153.
-
Proceedings of the IEEE International Conference on Network Protocols, 2010
, pp. 144-153
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
Li, L.E.4
Zhang, Z.-L.5
-
8
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A. K. K. Reddy, A. L. N. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Internet Measurement Conference, 2010, pp. 48-61.
-
Internet Measurement Conference, 2010
, pp. 48-61
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.N.3
Ranjan, S.4
-
9
-
-
36249008514
-
A survey of bots used for distributed denial of service attacks
-
V. L. L. Thing, M. Sloman, and N. Dulay, "A survey of bots used for distributed denial of service attacks," in SEC, 2007, pp. 229-240.
-
(2007)
SEC
, pp. 229-240
-
-
Thing, V.L.L.1
Sloman, M.2
Dulay, N.3
-
11
-
-
77952687808
-
An advanced hybrid peer-to-peer botnet
-
P. Wang, S. Sparks, and C. C. Zou, "An advanced hybrid peer-to-peer botnet," IEEE Transactions on Dependable and Secure Computing, vol. 7, no. 2, pp. 113-127, 2010.
-
(2010)
IEEE Transactions on Dependable and Secure Computing
, vol.7
, Issue.2
, pp. 113-127
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
12
-
-
58149490850
-
Information theory based detection against network behavior mimicking ddos attack
-
S. Yu, W. Zhou, and R. Doss, "Information theory based detection against network behavior mimicking ddos attack," IEEE Communications Letters, vol. 12, no. 4, pp. 319-321, 2008.
-
(2008)
IEEE Communications Letters
, vol.12
, Issue.4
, pp. 319-321
-
-
Yu, S.1
Zhou, W.2
Doss, R.3
-
13
-
-
33847761464
-
Non-gaussian and long memory statistical characterizations for internet traffic with anomalies
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-gaussian and long memory statistical characterizations for internet traffic with anomalies," IEEE Transactions on Dependable Secure Computing, vol. 4, no. 1, pp. 56-70, 2007.
-
(2007)
IEEE Transactions on Dependable Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
14
-
-
70349659341
-
Adaptive early packet filtering for protecting firewalls against dos attacks
-
A. El-Atawy, E. Al-Shaer, T. Tran, and R. Boutaba, "Adaptive early packet filtering for protecting firewalls against dos attacks," in Proceedings of the INFOCOM, 2009.
-
Proceedings of the INFOCOM, 2009
-
-
El-Atawy, A.1
Al-Shaer, E.2
Tran, T.3
Boutaba, R.4
-
15
-
-
33746985496
-
Collaborative detection and filtering of shrew ddos attacks using spectral analysis
-
Y. Chen and K. Hwang, "Collaborative detection and filtering of shrew ddos attacks using spectral analysis," Journal of Parallel Distributed Computing, vol. 66, no. 9, pp. 1137-1151, 2006.
-
(2006)
Journal of Parallel Distributed Computing
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
16
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds (awarded best student paper)
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds (awarded best student paper)," in NSDI, 2005.
-
(2005)
NSDI
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
17
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
-
Y. Xie and S.-Z. Yu, "A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors," IEEE/ACM Transactions on Networking, vol. 17, no. 1, pp. 54-65, 2009.
-
(2009)
IEEE/ACM Transactions on Networking
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
19
-
-
0032670943
-
Web caching and zipf-like distributions: Evidence and implications
-
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and zipf-like distributions: Evidence and implications," in Proceedings of the INFOCOM, 1999, pp. 126-134.
-
Proceedings of the INFOCOM, 1999
, pp. 126-134
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
-
20
-
-
33947425424
-
Citations and the zipf-mandelbrot's law
-
Z. K. Silagadze, "Citations and the zipf-mandelbrot's law," Complex Systems, vol. 11, pp. 487-499, 1997.
-
(1997)
Complex Systems
, vol.11
, pp. 487-499
-
-
Silagadze, Z.K.1
-
21
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
M. E. Crovella and A. Bestavros, "Self-similarity in world wide web traffic: evidence and possible causes," IEEE/ACM Transactions on Networking, vol. 5, no. 6, pp. 835-846, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
22
-
-
0032478716
-
Strong regularities in world wide web surfing
-
B. A. Huberman, P. L. T. Pirolli, J. E. Pitkow, and R. M. Lukose, "Strong regularities in world wide web surfing," Science, vol. 280, no. 3, 1998.
-
(1998)
Science
, vol.280
, Issue.3
-
-
Huberman, B.A.1
Pirolli, P.L.T.2
Pitkow, J.E.3
Lukose, R.M.4
-
23
-
-
84861611630
-
-
WorldCup98, http://ita.ee.lbl.gov/html/contrib/WorldCup.html.
-
WorldCup98
-
-
-
25
-
-
39049125624
-
Controlling ip spoofing through interdomain packet filters
-
Z. Duan, X. Yuan, and J. Chandrashekar, "Controlling ip spoofing through interdomain packet filters," IEEE Trans. Dependable Sec. Comput., vol. 5, no. 1, pp. 22-36, 2008.
-
(2008)
IEEE Trans. Dependable Sec. Comput.
, vol.5
, Issue.1
, pp. 22-36
-
-
Duan, Z.1
Yuan, X.2
Chandrashekar, J.3
-
26
-
-
33947503628
-
Defense against spoofed ip traffic using hop-count filtering
-
H. Wang, C. Jin, and K. G. Shin, "Defense against spoofed ip traffic using hop-count filtering," IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 40-53, 2007.
-
(2007)
IEEE/ACM Trans. Netw.
, vol.15
, Issue.1
, pp. 40-53
-
-
Wang, H.1
Jin, C.2
Shin, K.G.3
-
27
-
-
33646742035
-
Packetscore: A statistics-based packet filtering scheme against distributed denial-ofservice attacks
-
Y. Kim, W. C. Lau, M. C. Chuah, and H. J. Chao, "Packetscore: A statistics-based packet filtering scheme against distributed denial-ofservice attacks," IEEE Trans. Dependable Sec. Comput., vol. 3, no. 2, pp. 141-155, 2006.
-
(2006)
IEEE Trans. Dependable Sec. Comput.
, vol.3
, Issue.2
, pp. 141-155
-
-
Kim, Y.1
Lau, W.C.2
Chuah, M.C.3
Chao, H.J.4
-
28
-
-
66249147541
-
A survey of botnet technology and defenses
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, "A survey of botnet technology and defenses," in Proceedings of the 2009 cybersecurity applications and technology conference for Homeland security, 2009.
-
Proceedings of the 2009 Cybersecurity Applications and Technology Conference for Homeland Security, 2009
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
|