-
3
-
-
84907332158
-
Principles for developing comprehensive network visibility
-
Allman, M., Kreibich, C., Paxson, V., Sommer, R., and Weaver, N. Principles for developing comprehensive network visibility. In Proc. HOTSEC'08, 2008.
-
(2008)
Proc. HOTSEC'08
-
-
Allman, M.1
Kreibich, C.2
Paxson, V.3
Sommer, R.4
Weaver, N.5
-
4
-
-
84871948645
-
-
Bittwist. http://bittwist.sourceforge.net.
-
-
-
-
5
-
-
84871948437
-
-
Bob hash. http://burtleburtle.net/bob/hash/doobs.html.
-
Bob Hash
-
-
-
6
-
-
77953861458
-
Reformulating the monitor placement problem: Optimal network-wide sampling
-
Cantieni, G. R., Iannaccone, G., Barakat, C., Diot, C., and Thiran, P. Reformulating the monitor placement problem: optimal network-wide sampling. In Proc. CoNEXT '06, 2006.
-
(2006)
Proc. CoNEXT '06
-
-
Cantieni, G.R.1
Iannaccone, G.2
Barakat, C.3
Diot, C.4
Thiran, P.5
-
7
-
-
84871998531
-
-
Cisco blade servers. http://www.cisco.com/en/US/products/ps10280/index. html.
-
Cisco Blade Servers
-
-
-
8
-
-
57349093420
-
Predicting the resource consumption of network intrusion detection systems
-
Dreger, H., Feldmann, A., Paxson, V., and Sommer, R. Predicting the resource consumption of network intrusion detection systems. In Proc. SIGMETRICS '08, 2008.
-
(2008)
Proc. SIGMETRICS '08
-
-
Dreger, H.1
Feldmann, A.2
Paxson, V.3
Sommer, R.4
-
9
-
-
0035360814
-
Deriving traffic demands for operational IP networks: Methodology and experience
-
June
-
Feldmann, A., Greenberg, A., Lund, C., Reingold, N., Rexford, J., and True, F. Deriving traffic demands for operational IP networks: methodology and experience. IEEE/ACM Trans. Netw., 9(3):265-280, June 2001.
-
(2001)
IEEE/ACM Trans. Netw.
, vol.9
, Issue.3
, pp. 265-280
-
-
Feldmann, A.1
Greenberg, A.2
Lund, C.3
Reingold, N.4
Rexford, J.5
True, F.6
-
10
-
-
0036806665
-
Traffic engineering with traditional IP routing protocols
-
Oct
-
Fortz, B., Rexford, J., and Thorup, M. Traffic engineering with traditional IP routing protocols. Communications Magazine, IEEE, 40(10):118-124, Oct 2002.
-
(2002)
Communications Magazine, IEEE
, vol.40
, Issue.10
, pp. 118-124
-
-
Fortz, B.1
Rexford, J.2
Thorup, M.3
-
12
-
-
33750037341
-
A clean slate 4D approach to network control and management
-
Oct.
-
Greenberg, A., Hjalmtysson, G., Maltz, D. A., Myers, A., Rexford, J., Xie, G., Yan, H., Zhan, J., and Zhang, H. A clean slate 4D approach to network control and management. SIGCOMM Comput. Commun. Rev., 35(5):41-54, Oct. 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.5
, pp. 41-54
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D.A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
13
-
-
84871971612
-
Balancing computation-communication tradeoffs in scaling network-wide intrusion detection systems
-
Heorhiadi, V., Reiter, M. K., and Sekar, V. Balancing computation-communication tradeoffs in scaling network-wide intrusion detection systems. Technical Report TR12-001, UNC Chapel Hill, 2012.
-
(2012)
Technical Report TR12-001, UNC Chapel Hill
-
-
Heorhiadi, V.1
Reiter, M.K.2
Sekar, V.3
-
15
-
-
0040291388
-
The click modular router
-
Aug.
-
Kohler, E., Morris, R., Chen, B., Jannotti, J., and Kaashoek, M. F. The click modular router. ACM Trans. Comput. Syst., 18(3):263-297, Aug. 2000.
-
(2000)
ACM Trans. Comput. Syst.
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
17
-
-
35248844425
-
A high performance NIDS using FPGA-based regular expression matching
-
Lee, J., Hwang, S. H., Park, N., Lee, S.-W., Jun, S., and Kim, Y. S. A high performance NIDS using FPGA-based regular expression matching. In Proc. SAC '07, 2007.
-
(2007)
Proc. SAC '07
-
-
Lee, J.1
Hwang, S.H.2
Park, N.3
Lee, S.-W.4
Jun, S.5
Kim, Y.S.6
-
18
-
-
84871967968
-
-
M57 packet traces. https://domex.nps.edu/corp/scenarios/2009-m57/net/.
-
M57 Packet Traces
-
-
-
19
-
-
85175624225
-
OpenFlow: Enabling innovation in campus networks
-
Mar.
-
McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., and Turner, J. OpenFlow: enabling innovation in campus networks. SIGCOMM Comput. Commun. Rev., 38(2):69-74, Mar. 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev.
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
20
-
-
85076292285
-
Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems
-
Meiners, C. R., Patel, J., Norige, E., Torng, E., and Liu, A. X. Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems. In Proc. USENIX Security'10, 2010.
-
(2010)
Proc. USENIX Security'10
-
-
Meiners, C.R.1
Patel, J.2
Norige, E.3
Torng, E.4
Liu, A.X.5
-
21
-
-
0022048209
-
Efficient commit protocols for the tree of processes model of distributed transactions
-
Apr.
-
Mohan, C. and Lindsay, B. Efficient commit protocols for the tree of processes model of distributed transactions. SIGOPS Oper. Syst. Rev., 19(2):40-52, Apr. 1985.
-
(1985)
SIGOPS Oper. Syst. Rev.
, vol.19
, Issue.2
, pp. 40-52
-
-
Mohan, C.1
Lindsay, B.2
-
24
-
-
85084164413
-
Bro: A system for detecting network intruders in real-time
-
Paxson, V. Bro: a system for detecting network intruders in real-time. In Proc. Usenix Security'98, 1998.
-
(1998)
Proc. Usenix Security'98
-
-
Paxson, V.1
-
25
-
-
84871962820
-
-
Pfq homepage. http://netserv.iet.unipi.it/software/pfq/.
-
Pfq Homepage
-
-
-
26
-
-
84871945051
-
-
Pf-ring. http://www.ntop.org/products/pf-ring/.
-
Pf-ring
-
-
-
27
-
-
33847253098
-
Simplifying the synthesis of internet traffic matrices
-
Oct.
-
Roughan, M. Simplifying the synthesis of internet traffic matrices. SIGCOMM Comput. Commun. Rev., 35(5):93-96, Oct. 2005.
-
(2005)
SIGCOMM Comput. Commun. Rev.
, vol.35
, Issue.5
, pp. 93-96
-
-
Roughan, M.1
-
29
-
-
79951700744
-
Network-wide deployment of intrusion detection and prevention systems
-
Sekar, V., Krishnaswamy, R., Gupta, A., and Reiter, M. K. Network-wide deployment of intrusion detection and prevention systems. In Proc. CoNEXT '10, 2010.
-
(2010)
Proc. CoNEXT '10
-
-
Sekar, V.1
Krishnaswamy, R.2
Gupta, A.3
Reiter, M.K.4
-
30
-
-
84888450226
-
The middlebox manifesto: Enabling innovation in middlebox deployment
-
Sekar, V., Ratnasamy, S., Reiter, M. K., Egi, N., and Shi, G. The middlebox manifesto: enabling innovation in middlebox deployment. In Proc. HotNets '11, 2011.
-
(2011)
Proc. HotNets '11
-
-
Sekar, V.1
Ratnasamy, S.2
Reiter, M.K.3
Egi, N.4
Shi, G.5
-
31
-
-
85094661874
-
Ospf monitoring: Architecture, design and deployment experience
-
Shaikh, A. and Greenberg, A. Ospf monitoring: architecture, design and deployment experience. In Proc. NSDI'04, 2004.
-
(2004)
Proc. NSDI'04
-
-
Shaikh, A.1
Greenberg, A.2
-
32
-
-
84866513406
-
Making middleboxes someone else's problem: Network processing as a cloud service
-
Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., and Sekar, V. Making middleboxes someone else's problem: Network processing as a cloud service. In Proc. SIGCOMM, 2012.
-
(2012)
Proc. SIGCOMM
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
-
33
-
-
50249130270
-
XFA: Faster signature matching with extended automata
-
Smith, R., Estan, C., and Jha, S. XFA: Faster signature matching with extended automata. In Proc. IEEE S&P'08, 2008.
-
(2008)
Proc. IEEE S&P'08
-
-
Smith, R.1
Estan, C.2
Jha, S.3
-
34
-
-
84871941926
-
-
Snort. http://www.snort.org.
-
-
-
-
35
-
-
1642408605
-
Measuring isp topologies with rocketfuel
-
Feb.
-
Spring, N., Mahajan, R., Wetherall, D., and Anderson, T. Measuring isp topologies with rocketfuel. IEEE/ACM Trans. Netw., 12(1):2-16, Feb. 2004.
-
(2004)
IEEE/ACM Trans. Netw.
, vol.12
, Issue.1
, pp. 2-16
-
-
Spring, N.1
Mahajan, R.2
Wetherall, D.3
Anderson, T.4
-
36
-
-
8344255032
-
Dynamics of hot-potato routing in IP networks
-
Teixeira, R., Shaikh, A., Griffin, T., and Rexford, J. Dynamics of hot-potato routing in IP networks. In Proc. SIGMETRICS '04/Performance '04, 2004.
-
(2004)
Proc. SIGMETRICS '04/Performance '04
-
-
Teixeira, R.1
Shaikh, A.2
Griffin, T.3
Rexford, J.4
-
37
-
-
65249090163
-
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
-
Vallentin, M., Sommer, R., Lee, J., Leres, C., Paxson, V., and Tierney, B. The NIDS cluster: scalable, stateful network intrusion detection on commodity hardware. In Proc. RAID'07, 2007.
-
(2007)
Proc. RAID'07
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
-
38
-
-
77958033480
-
Regular expression matching on graphics hardware for intrusion detection
-
Vasiliadis, G., Polychronakis, M., Antonatos, S., Markatos, E. P., and Ioannidis, S. Regular expression matching on graphics hardware for intrusion detection. In Proc. RAID '09, 2009.
-
(2009)
Proc. RAID '09
-
-
Vasiliadis, G.1
Polychronakis, M.2
Antonatos, S.3
Markatos, E.P.4
Ioannidis, S.5
-
40
-
-
84978371883
-
An integrated experimental environment for distributed systems and networks
-
Dec.
-
White, B., Lepreau, J., Stoller, L., Ricci, R., Guruprasad, S., Newbold, M., Hibler, M., Barb, C., and Joglekar, A. An integrated experimental environment for distributed systems and networks. SIGOPS Oper. Syst. Rev., 36(SI):255-270, Dec. 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.SI
, pp. 255-270
-
-
White, B.1
Lepreau, J.2
Stoller, L.3
Ricci, R.4
Guruprasad, S.5
Newbold, M.6
Hibler, M.7
Barb, C.8
Joglekar, A.9
-
42
-
-
67650360753
-
SSA: A power and memory efficient scheme to multi-match packet classification
-
Yu, F., Lakshman, T. V., Motoyama, M. A., and Katz, R. H. SSA: a power and memory efficient scheme to multi-match packet classification. In Proc. ANCS '05, 2005.
-
(2005)
Proc. ANCS '05
-
-
Yu, F.1
Lakshman, T.V.2
Motoyama, M.A.3
Katz, R.H.4
|