-
1
-
-
39749138879
-
-
Data clustering, http://www.let.rug.nl/~kleiweg/clustering/
-
Data Clustering
-
-
-
2
-
-
84885887386
-
-
Entropy, http://en.wikipedia.org/wiki/Information-entropy
-
Entropy
-
-
-
3
-
-
84885883809
-
-
Gnu wget, http://www.gnu.org/software/wget/
-
Gnu Wget
-
-
-
4
-
-
84885886669
-
-
Kademlia, http://en.wikipedia.org/wiki/Kademlia
-
Kademlia
-
-
-
10
-
-
38149089416
-
Automated classification and analysis of internet malware
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) LNCS Springer, Heidelberg
-
Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., Nazario, J.: Automated classification and analysis of internet malware. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 178-197. Springer, Heidelberg (2007)
-
(2007)
RAID 2007
, vol.4637
, pp. 178-197
-
-
Bailey, M.1
Oberheide, J.2
Andersen, J.3
Mao, Z.M.4
Jahanian, F.5
Nazario, J.6
-
11
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
NDSS
-
Bayer, U., Comparetti, P.M., Hlauscheck, C., Kruegel, C., Kirda, E.: Scalable, behavior-based malware clustering. In: Network and Distributed System Security Symposium, NDSS (2009)
-
(2009)
Network and Distributed System Security Symposium
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauscheck, C.3
Kruegel, C.4
Kirda, E.5
-
14
-
-
84865382456
-
An introduction to intrusion detection systems
-
Debar, H.: An Introduction to Intrusion Detection Systems. In: Proceedings of Connect (2000)
-
(2000)
Proceedings of Connect
-
-
Debar, H.1
-
15
-
-
14944346102
-
Automatically inferring patterns of resource consumption in network traffic
-
Estan, C., Savage, S., Varghese, G.: Automatically Inferring Patterns of Resource Consumption in Network Traffic. In: Proceedings of ACM SIGCOMM (2003)
-
(2003)
Proceedings of ACM SIGCOMM
-
-
Estan, C.1
Savage, S.2
Varghese, G.3
-
19
-
-
78751511305
-
Measurement and classification of humans and bots in internet
-
Gianvecchio, S., Xie, M., Wu, Z., Wang, H.: Measurement and classification of humans and bots in internet. In: USENIX Security (2008)
-
(2008)
USENIX Security
-
-
Gianvecchio, S.1
Xie, M.2
Wu, Z.3
Wang, H.4
-
21
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B.: Peer-to-peer botnets: Overview and case study. In: Hot Topics in Understanding Botnets (HotBots) (2007)
-
(2007)
Hot Topics in Understanding Botnets (HotBots)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
-
22
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th USENIX Security Symposium (2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
23
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting malware infection through IDS-driven dialog correlation. In: Proceedings of 16th USENIX Security Symposium (2007)
-
(2007)
Proceedings of 16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
25
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and detecting fast-flux service networks. In: NDSS (2008)
-
(2008)
NDSS
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
26
-
-
84885891410
-
-
Malware Threat Center
-
SRI International. Malware Threat Center (2008), http://mtc.sri.org
-
(2008)
-
-
-
28
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: Proceedings of the IEEE Symposium on Security and Privacy (2004)
-
(2004)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
29
-
-
70849095357
-
What's going on? Learning communication rules in edge networks
-
Kandula, S., Chandra, R., Katabi, D.: What's going on? Learning communication rules in edge networks. In: Sigcomm (2008)
-
(2008)
Sigcomm
-
-
Kandula, S.1
Chandra, R.2
Katabi, D.3
-
30
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
WoNS 2006
-
Livadas, C., Walsh, R., Lapsley, D., Strayer, W.T.: Using machine learning techniques to identify botnet traffic. In: Proc. IEEE LCN Workshop on Network Security, WoNS 2006 (2006)
-
(2006)
Proc. IEEE LCN Workshop on Network Security
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
34
-
-
84878700321
-
A first look at modern enterprise traffic
-
Pang, R., Allman, M., Bennett, M., Lee, J., Paxson, V., Tierney, B.: A first look at modern enterprise traffic. In: IMC (2005)
-
(2005)
IMC
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
-
35
-
-
14944369649
-
Characteristics of internet background radiation
-
Pang, R., Yegneswaran, V., Barford, P., Paxson, V., Peterson, L.: Characteristics of Internet background radiation. In: Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference (2004)
-
(2004)
Proceedings of the 4th ACM SIGCOMM Internet Measurement Conference
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
36
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
San Antonio, TX January
-
Paxson, V.: Bro: A system for detecting network intruders in real-time. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, TX (January 1998)
-
(1998)
Proceedings of the 7th USENIX Security Symposium
-
-
Paxson, V.1
-
37
-
-
0023453329
-
Silhouettes: A graphical aid to the interpretation and validation of cluster analysis
-
Rousseeuw, P.: Silhouettes: a graphical aid to the interpretation and validation of cluster analysis. Journal of Computational and Applied Mathematics 20 (1987)
-
(1987)
Journal of Computational and Applied Mathematics
, vol.20
-
-
Rousseeuw, P.1
-
40
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference (2006)
-
(2006)
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
43
-
-
84885887313
-
-
Yegneswaran, V., Porras, P., Saidi, H., Sharif, M., Narayanan, A.: SRI's Multiper-spective Malware Infection Analysis Page (2009), http://www.cyber-ta. org/releases/malware-analysis/public/
-
(2009)
SRI's Multiper-spective Malware Infection Analysis Page
-
-
Yegneswaran, V.1
Porras, P.2
Saidi, H.3
Sharif, M.4
Narayanan, A.5
|