-
1
-
-
84872106869
-
-
Alexa Web Information Company. http://www.alexa.com/topsites/, 2009.
-
(2009)
-
-
-
4
-
-
84872104584
-
-
Google Safe Browsing. http://www.google.com/safebrowsing/diagnostic?site= AS:as-number, 2011.
-
(2011)
-
-
-
9
-
-
34547464544
-
Impact of packet sampling on anomaly detection metrics
-
D. Brauckhoff, B. Tellenbach, A. Wagner, M. May, and A. Lakhina. Impact of packet sampling on anomaly detection metrics. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06
-
-
Brauckhoff, D.1
Tellenbach, B.2
Wagner, A.3
May, M.4
Lakhina, A.5
-
11
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In 1st Workshop on Steps to Reducing Unwanted Traffic on the Internet, pages 39-44, 2005.
-
(2005)
1st Workshop on Steps to Reducing Unwanted Traffic on the Internet
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
13
-
-
62949129764
-
Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures
-
G. Dewaele, K. Fukuda, P. Borgnat, P. Abry, and K. Cho. Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In Proceedings of the 2007 workshop on Large scale attack defense (LSAD'07), 2007.
-
(2007)
Proceedings of the 2007 Workshop on Large Scale Attack Defense (LSAD'07)
-
-
Dewaele, G.1
Fukuda, K.2
Borgnat, P.3
Abry, P.4
Cho, K.5
-
17
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In Usenix Security Symposium, 2008.
-
(2008)
Usenix Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
18
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In 16th Usenix Security Symposium, 2007.
-
(2007)
16th Usenix Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
22
-
-
0006890305
-
Seminumerical algorithms
-
Addison Wesley
-
D. E. Knuth. Seminumerical algorithms. In The Art of Computer Programming, Volume 2, Addison Wesley, 1969.
-
(1969)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
23
-
-
0345040873
-
Classification and regression by randomforest
-
A. Liaw and M. Wiener. Classification and regression by randomforest. In R News, volume 2/3, page 18, 2002.
-
(2002)
R News
, vol.2-3
, pp. 18
-
-
Liaw, A.1
Wiener, M.2
-
25
-
-
34547488856
-
Is sampled data sufficient for anomaly detection?
-
J. Mai, C.-N. Chuah, A. Sridharan, T. Ye, and H. Zang. Is sampled data sufficient for anomaly detection? In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06
-
-
Mai, J.1
Chuah, C.-N.2
Sridharan, A.3
Ye, T.4
Zang, H.5
-
29
-
-
84655175860
-
Traffic aggregation for malware detection
-
M. Reiter and T. Yen. Traffic aggregation for malware detection. In DIMVA, 2008.
-
(2008)
DIMVA
-
-
Reiter, M.1
Yen, T.2
-
30
-
-
56649102068
-
Anomaly characterization in flow-based traffic time series
-
A. Sperotto, R. Sadre, and A. Pras. Anomaly characterization in flow-based traffic time series. In Proceedings of the 8th IEEE international workshop on IP Operations and Management, IPOM '08, pages 15-27, 2008.
-
(2008)
Proceedings of the 8th IEEE International Workshop on IP Operations and Management, IPOM '08
, pp. 15-27
-
-
Sperotto, A.1
Sadre, R.2
Pras, A.3
-
31
-
-
77950794331
-
Fire: Finding rogue networks
-
B. Stone-Gross, C. Kruegel, K. Almeroth, A. Moser, and E. Kirda. Fire: Finding rogue networks. In 2009 Annual Computer Security Applications Conference (ACSAC'09), 2009.
-
(2009)
2009 Annual Computer Security Applications Conference (ACSAC'09)
-
-
Stone-Gross, B.1
Kruegel, C.2
Almeroth, K.3
Moser, A.4
Kirda, E.5
-
35
-
-
78650896043
-
Automatically generating models for botnet detection
-
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda. Automatically generating models for botnet detection. In ESORICS 2009 : 14th European Symposium on Research in Computer Security, 2009.
-
(2009)
ESORICS 2009 : 14th European Symposium on Research in Computer Security
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
|