-
1
-
-
84878671343
-
-
CSI, Computer Security Institute
-
CSI, Computer Security Institute. < http://www.gocsi.com >.
-
-
-
-
2
-
-
84863616150
-
CSI/FBI Computer Crime Survey
-
L.A. Gordon, M.P. Loeb, W. Lucyshyn, R. Rich, 2005 CSI/FBI Computer Crime Survey, in: 10th Annual Computer Crime and Security, 2005.
-
(2005)
10th Annual Computer Crime and Security, 2005.
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Rich, R.4
-
3
-
-
84863606992
-
CSI/FBI Computer Crime Survey
-
L.A. Gordon, M.P. Loeb, W. Lucyshyn, R. Rich, 2006 CSI/FBI Computer Crime Survey, in: 11th Annual Computer Crime and Security, 2006.
-
(2006)
11th Annual Computer Crime and Security, 2006
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Rich, R.4
-
5
-
-
84878670581
-
-
Gartner, Gartner
-
Gartner, Gartner. < http://www.gartner.com >.
-
-
-
-
8
-
-
84863634686
-
-
IETF, Internet Informational RFC 4948
-
L. Anderson, E. Davies, L. Zhang, Report from the IAB workshop on Unwanted Traffic March 9-10 2006, IETF, Internet Informational RFC 4948, 2007.
-
(2007)
Report from the IAB Workshop on Unwanted Traffic March 9-10 2006
-
-
Anderson, L.1
Davies, E.2
Zhang, L.3
-
11
-
-
71749107086
-
A survey of coordinated attacks and collaborative intrusion detection
-
C.V. Zhou, C. Leckie, and S. Karunasekera A survey of coordinated attacks and collaborative intrusion detection Computer & Security 29 1 2010 124 140
-
(2010)
Computer & Security
, vol.29
, Issue.1
, pp. 124-140
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
12
-
-
67649827198
-
RIP - A robust IP access architecture
-
D. Sadok, E. Souto, E. Feitosa, J. Kelner, and L. Westberg RIP - a robust IP access architecture Computers & Security 28 6 2009 359 380
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 359-380
-
-
Sadok, D.1
Souto, E.2
Feitosa, E.3
Kelner, J.4
Westberg, L.5
-
19
-
-
14944369649
-
Characteristics of internet background radiation
-
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, L. Peterson, Characteristics of Internet background radiation, in: Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement, 2004, pp. 27-40. (Pubitemid 40372029)
-
(2004)
Proceedings of the 2004 ACM SIGCOMM Internet Measurement Conference, IMC 2004
, pp. 27-40
-
-
Pang, R.1
Barford, P.2
Yegneswaran, V.3
Paxson, V.4
Peterson, L.5
-
20
-
-
84863619656
-
Unwanted Internet traffic: Concepts, characterization, and solutions
-
SBC Porto Alegre, Brazil (Chapter 3)
-
E.L. Feitosa, E. Souto, and D. Sadok Unwanted Internet traffic: concepts, characterization, and solutions Textbook of Mini courses of the VIII of the Brazilian Symposium on Information Security and Computing Systems (SBSeg'08) 2008 SBC Porto Alegre, Brazil (Chapter 3)
-
(2008)
Textbook of Mini Courses of the VIII of the Brazilian Symposium on Information Security and Computing Systems (SBSeg'08)
-
-
Feitosa, E.L.1
Souto, E.2
Sadok, D.3
-
23
-
-
84878671936
-
-
Force10 Networks
-
Force10 Networks, P-Series Overview, 2008. < http://www. force10networks.com/products/pseries.asp >.
-
(2008)
P-Series Overview
-
-
-
24
-
-
84878672647
-
-
OrcaFlow: Terabit-Class Network Traffic Anomaly Detection
-
Cetacea Networks, OrcaFlow: Terabit-Class Network Traffic Anomaly Detection, 2008. < http://www.orcaflow.ca/orcaflow-ca >.
-
(2008)
Cetacea Networks
-
-
-
25
-
-
84878670243
-
-
CloudShield Technologies, Hardware Solutions
-
CloudShield Technologies, Hardware Solutions, 2008. < http://www.cloudshield.com/platform/hardware.asp.
-
(2008)
-
-
-
26
-
-
84878669999
-
-
Snort, 2009. < http://www.snort.org >.
-
(2009)
-
-
-
27
-
-
84878675233
-
-
NFS, Bro Intrusion Detection System
-
NFS, Bro Intrusion Detection System, 2009. < http://bro-ids.org >.
-
(2009)
-
-
-
28
-
-
84878674943
-
-
Prelude-IDS
-
Prelude-IDS Technologies, Prelude-IDS, 2009. < http://www.prelude-ids. com >.
-
(2009)
Prelude-IDS Technologies
-
-
-
29
-
-
84878671266
-
-
Honeyd
-
N. Provos, Honeyd, 2009. < http://www.honeyd.org >.
-
(2009)
-
-
Provos, N.1
-
30
-
-
84878675439
-
-
Nephentes, 2009. < http://nepenthes.carnivore.it >.
-
(2009)
-
-
-
31
-
-
10244261530
-
EWMA forecast of normal system activity for computer intrusion detection
-
N. Ye, Q. Chen, and C.M. Borror EWMA forecast of normal system activity for computer intrusion detection IEEE Transactions on Reliability 53 4 2004 557 566
-
(2004)
IEEE Transactions on Reliability
, vol.53
, Issue.4
, pp. 557-566
-
-
Ye, N.1
Chen, Q.2
Borror, C.M.3
-
32
-
-
0034976075
-
An agent-based Bayesian forecasting model for enhanced network security
-
J. Pikoulas, W. Buchanan, M. Mannion, K. Triantafyllopoulos, An agent-based bayesian forecasting model for enhanced network security, in: IEEE International Conference on Engineering of Computer-based Systems, 2001, pp. 247-254. (Pubitemid 32542139)
-
(2001)
Proceedings of the International Symposium and Workshop on Engineering of Computer Based Systems
, pp. 247-254
-
-
Pikoulas, J.1
Buchanan, W.J.2
Mannion, M.3
Triantafyllopoulos, K.4
-
34
-
-
33750711125
-
Profiling internet backbone traffic: Behavior models and applications
-
DOI 10.1145/1090191.1080112
-
K. Xu, Z. Zhang, S. Bhattacharyya, Profiling Internet backbone traffic: behavior models and applications, in: 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM '05), Philadelphia, Pennsylvania, USA, 2005, pp. 169-180. (Pubitemid 46323502)
-
(2005)
Computer Communication Review
, vol.35
, Issue.4
, pp. 169-180
-
-
Xu, K.1
Zhang, Z.-L.2
Bhattacharyya, S.3
-
35
-
-
84878669980
-
Applying the frequency of episodes in alert correlation
-
SBC Fortaleza, Brazil
-
L.H. Vilaça, E.L. Feitosa, D. Sadok, and J. Kelner Applying the frequency of episodes in alert correlation 10th Brazilian Symposium of Information Security and Computer Systems (SBSeg 2010) 2010 SBC Fortaleza, Brazil 241 254
-
(2010)
10th Brazilian Symposium of Information Security and Computer Systems (SBSeg 2010)
, pp. 241-254
-
-
Vilaça, L.H.1
Feitosa, E.L.2
Sadok, D.3
Kelner, J.4
-
37
-
-
27644509863
-
-
MIT Lincoln Laboratory
-
MIT Lincoln Laboratory, DARPA Intrusion Detection Scenario Specific Data Sets, 2000. < http://www.ll.mit.edu/mission/communications/ist/corpora/ ideval/data/index.html >.
-
(2000)
DARPA Intrusion Detection Scenario Specific Data Sets
-
-
-
38
-
-
84888927134
-
Frequent episode rules for intrusive anomaly detection with internet data mining
-
M. Qin, K. Hwang, Frequent episode rules for intrusive anomaly detection with internet data mining, in: USENIX Security Symposium, 2004.
-
(2004)
USENIX Security Symposium
-
-
Qin, M.1
Hwang, K.2
-
40
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
A.P. Dempster Upper and lower probabilities induced by a multivalued mapping Annals Mathematics Statistics 38 1967 325 339
-
(1967)
Annals Mathematics Statistics
, vol.38
, pp. 325-339
-
-
Dempster, A.P.1
-
41
-
-
0014171914
-
Upper and lower probability inferences based on a sample from a finite univariate population
-
A.P. Dempster Upper and lower probability inferences based on a sample from a finite univariate population Biometrika 54 1967 515 528
-
(1967)
Biometrika
, vol.54
, pp. 515-528
-
-
Dempster, A.P.1
-
43
-
-
84878671851
-
-
Java Dempster Shafer Library
-
T. Reineking, Java Dempster Shafer Library, 2009. < http://sourceforge.net/projects/jds >.
-
(2009)
-
-
Reineking, T.1
-
46
-
-
84878671898
-
-
Emerging Threats, 2010. < http://www.emergingthreates.net >.
-
(2010)
Emerging Threats
-
-
-
47
-
-
84878670551
-
-
Intrusense Packit
-
Intrusense Packit, Network injection and capture, 2010. < http://www.intrusense.com/software/packit >.
-
(2010)
Network Injection and Capture
-
-
-
48
-
-
84878674948
-
-
Scapy
-
Scapy, 2010. < http://www.secdev.org/projects/scapy >.
-
(2010)
-
-
-
49
-
-
84857850323
-
-
Ha.ckers, Slowloris HTTP DoS, 2010. < http://ha.ckers.org/slowloris >.
-
(2010)
Slowloris HTTP DoS
-
-
-
50
-
-
84863606984
-
Keeping DNS trustworthy
-
R. Hyatt Keeping DNS trustworthy ISSA Journal 2006 37 38
-
(2006)
ISSA Journal
, pp. 37-38
-
-
Hyatt, R.1
-
52
-
-
84878674749
-
-
Symantec, Outbreak alert: storm trojan, 2007. < http://www.symantec. com/outbreak/storm-trojan.html >.
-
(2007)
Outbreak Alert: Storm Trojan
-
-
-
53
-
-
78049450607
-
New multi-step worm attack model
-
Y. Robiah, S. Siti Rahayu, S. Shahrin, M.A. Faizal, M. Mohd Zaki, and R. Marliza New multi-step worm attack model Journal of Computing 2 1 2010
-
(2010)
Journal of Computing
, vol.2
, Issue.1
-
-
Robiah, Y.1
Siti Rahayu, S.2
Shahrin, S.3
Faizal, M.A.4
Mohd Zaki, M.5
Marliza, R.6
-
56
-
-
84863606982
-
Security information architecture for automation and control networks
-
SBC Brazil
-
E.L. Feitosa, L.E. Oliveira, B. Lins, A. Carvalho Jr., R. Melo, D. Sadok, and U. Carmo Security information architecture for automation and control networks 8th Brazilian Symposium of Information Security and Computer Systems, Rio Grande do Sul 2008 SBC Brazil 17 30
-
(2008)
8th Brazilian Symposium of Information Security and Computer Systems, Rio Grande Do sul
, pp. 17-30
-
-
Feitosa, E.L.1
Oliveira, L.E.2
Lins, B.3
Carvalho Jr., A.4
Melo, R.5
Sadok, D.6
Carmo, U.7
-
60
-
-
27644518127
-
D-WARD: A source-end defense against flooding denial-of-service attacks
-
DOI 10.1109/TDSC.2005.35
-
J. Mirkovic, and P. Reiher D-WARD: source-end defense against distributed denial-of-service attacks IEEE Transactions on Dependable and Secure Computing Archive 2 3 2005 216 232 (Pubitemid 41560432)
-
(2005)
IEEE Transactions on Dependable and Secure Computing
, vol.2
, Issue.3
, pp. 216-232
-
-
Mirkovic, J.1
Reiher, P.2
-
61
-
-
84942417880
-
Cossack: Coordinated suppression of simultaneous attacks
-
April
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, R. Govindan, Cossack: coordinated suppression of simultaneous attacks, in: Proceedings of 3rd DARPA information Survivability Conference and Exposition (DISCEX 2003), vol. 2, April 2003, pp. 94-96.
-
(2003)
Proceedings of 3rd DARPA Information Survivability Conference and Exposition (DISCEX 2003)
, vol.2
, pp. 94-96
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
63
-
-
18144362064
-
Secure COLlective Defense system
-
SN07-2, GLOBECOM'04 - IEEE Global Telecommunications Conference
-
C. Edward, Y. Cai, D. Wilkinson, Secure collective defense system, in: IEEE Global Telecommunications Conference, 2004, pp. 2245-2249. (Pubitemid 40611005)
-
(2004)
GLOBECOM - IEEE Global Telecommunications Conference
, vol.4
, pp. 2245-2249
-
-
Chow, C.E.1
Cai, Y.2
Wilkinson, D.3
Godavari, G.4
-
65
-
-
44849134557
-
A global security architecture for intrusion detection on computer networks
-
A.K. Ganame, J. Bourgeoisa, R. Bidou, and F. Spiesa A global security architecture for intrusion detection on computer networks Computers & Security 27 2008 30 47
-
(2008)
Computers & Security
, vol.27
, pp. 30-47
-
-
Ganame, A.K.1
Bourgeoisa, J.2
Bidou, R.3
Spiesa, F.4
-
66
-
-
49949084678
-
Multi-agent reinforcement learning for intrusion detection
-
A. Servin, and D. Kudenko Multi-agent reinforcement learning for intrusion detection Lecture Notes in Computer Science 4865 2008 211 223
-
(2008)
Lecture Notes in Computer Science
, vol.4865
, pp. 211-223
-
-
Servin, A.1
Kudenko, D.2
-
67
-
-
51349119727
-
P2P distributed intrusion detections by using mobile agents
-
May
-
Y.M.Z. Dayong, B. Quan, Z. Ye, P2P distributed intrusion detections by using mobile agents, in: Seventh IEEE/ACIS International Conference on Computer and Information Science, 2008 (ICIS 08), May 2008, pp. 259-65.
-
(2008)
Seventh IEEE/ACIS International Conference on Computer and Information Science, 2008 (ICIS 08)
, pp. 259-65
-
-
Dayong, Y.M.Z.1
Quan, B.2
Ye, Z.3
-
68
-
-
38049101469
-
Collaborative attack detection in high-speed networks
-
Springer Leipzig, Germany
-
M. Rehak, M. Pechoucek, P. Celeda, V. Krmicek, P. Minarik, and D. Medvigy Collaborative attack detection in high-speed networks Proceedings of the 5th International Central and Eastern European conference on Multi-Agent Systems and Applications (CEEMAS'07) 2007 Springer Leipzig, Germany pp. 73-82
-
(2007)
Proceedings of the 5th International Central and Eastern European Conference on Multi-Agent Systems and Applications (CEEMAS'07)
, pp. 73-82
-
-
Rehak, M.1
Pechoucek, M.2
Celeda, P.3
Krmicek, V.4
Minarik, P.5
Medvigy, D.6
-
71
-
-
84878672967
-
-
CAIDA
-
CAIDA, The CAIDA DDoS Attack 2007 Dataset, 2010. < http://www.caida.org/data/passive/ddos-20070804-dataset.xml >.
-
(2010)
The CAIDA DDoS Attack 2007 Dataset
-
-
-
72
-
-
84940102146
-
-
UMASS Trace Repository
-
UMASS Trace Repository, UMASS Trace Repository, 2010. < http://trace.cs.umass.edu >.
-
(2010)
UMASS Trace Repository
-
-
-
74
-
-
0004225165
-
-
IETF, Internet Experimental RFC 4765
-
H. Curry, D. Feinstein, B. Debar, The Intrusion Detection Message Exchange Format (IDMEF), IETF, Internet Experimental RFC 4765, 2007.
-
(2007)
The Intrusion Detection Message Exchange Format (IDMEF)
-
-
Curry, H.1
Feinstein, D.2
Debar, B.3
-
75
-
-
74549144718
-
-
IETF, Internet proposed standard RFC 5070
-
R. Danyliw, J. Meijer, Y. Demchenko, The Incident Object Description Exchange Format, IETF, Internet proposed standard RFC 5070, 2007.
-
(2007)
The Incident Object Description Exchange Format
-
-
Danyliw, R.1
Meijer, J.2
Demchenko, Y.3
-
77
-
-
84878675649
-
-
W3C
-
W3C, WSDL W3C Recommendation, 2007. < http://www.w3.org/TR/wsdl20- primer >.
-
(2007)
WSDL W3C Recommendation
-
-
-
78
-
-
45849141843
-
-
W3C
-
W3C, OWL W3C Recommendation, 2004. < http://www.w3.org/TR/owl-features >.
-
(2004)
OWL W3C Recommendation
-
-
-
79
-
-
85084159849
-
Privacy-preserving sharing and correlation of security alert
-
P. Lincoln, P. Porra, V. Shmatikov, Privacy-preserving sharing and correlation of security alert, in: 13th USENIX Security Symposium, 2004, pp. 239-254.
-
(2004)
13th USENIX Security Symposium
, pp. 239-254
-
-
Lincoln, P.1
Porra, P.2
Shmatikov, V.3
-
82
-
-
84942121141
-
Indra: A peer-to-peer approach to network intrusion detection and prevention
-
Linz, Austria
-
R. Janakiraman, M. Waldvogel, Q. Zhang, Indra: a peer-to-peer approach to network intrusion detection and prevention, in: IEEE WETICE 2003 Workshop on Enterprise Security, Linz, Austria, 2003, pp. 226-231.
-
(2003)
IEEE WETICE 2003 Workshop on Enterprise Security
, pp. 226-231
-
-
Janakiraman, R.1
Waldvogel, M.2
Zhang, Q.3
-
84
-
-
84878675192
-
A WS-based infrastructure for integrating intrusion detection systems in large-scale environments
-
J.E.M.S. Brandão, J.S. Fraga, P.M. Mafra, R.R. Obelheiro, A WS-based infrastructure for integrating intrusion detection systems in large-scale environments, in: CoopIS/DOA/ODBASE/GADA, 2006.
-
(2006)
CoopIS/DOA/ODBASE/GADA
-
-
Brandão, J.E.M.S.1
Fraga, J.S.2
Mafra, P.M.3
Obelheiro, R.R.4
-
87
-
-
0043026142
-
-
IETF, Standards Track RFC 3275
-
D. Eastlake, J. Reagle, D. Solo, XML-signature syntax and processing, IETF, Standards Track RFC 3275, 2002.
-
(2002)
XML-signature Syntax and Processing
-
-
Eastlake, D.1
Reagle, J.2
Solo, D.3
|