-
2
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
San Diego, CA, February
-
Michael Bailey, Evan Cooke, Farnam Jahanian, Jose Nazario, and David Watson. The Internet Motion Sensor: A distributed blackhole monitoring system. In Proceedings of Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, February 2005.
-
(2005)
Proceedings of Network and Distributed System Security Symposium (NDSS '05)
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
3
-
-
24344436426
-
The blaster worm: Then and now
-
Michael Bailey, Evan Cooke, David Watson, Faranam Jahanian, and Jose Nazario. The Blaster Worm: Then and Now. IEEE Security & Privacy, 3(4):26-31, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Watson, D.3
Jahanian, F.4
Nazario, J.5
-
5
-
-
0009016272
-
An evening with berferd in which a cracker is lured, endured, and studied
-
January 20 - January 24, 1992 San Francisco, California Berkeley, CA, USA, Winter
-
Bill Cheswick. An evening with Berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter 1992 USENIX Conference: January 20 - January 24, 1992, San Francisco, California, pages 163-174, Berkeley, CA, USA, Winter 1992.
-
(1992)
Proceedings of the Winter 1992 USENIX Conference
, pp. 163-174
-
-
Cheswick, B.1
-
7
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
New York, October 29 ACM Press
-
Evan Cooke, Michael Bailey, Z. Morley Mao, David Watson, and Farnam Jahanian. Toward understanding distributed blackhole placement. In Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM-04), New York, October 29 2004. ACM Press.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode (WORM-04)
-
-
Cooke, E.1
Bailey, M.2
Morley Mao, Z.3
Watson, D.4
Jahanian, F.5
-
8
-
-
84861803524
-
-
June
-
Team CYMRU. The darknet project. http://www.cymru.com/Darknet/index.html, June 2004.
-
(2004)
The Darknet Project
-
-
-
9
-
-
35048879637
-
Honeystat: Local worm detection using honeypots
-
Lecture Notes in Computer Science, Sophia-Antipolis, French Riviera, France, October Springer
-
David Dagon, Xinzhou Qin, Guofei Gu, Julian Grizzard, John Levine, Wenke Lee, and Henry Owen. Honeystat: Local worm detection using honeypots. In Recent Advances in Intrusion Detection, 7th International Symposium, (RAID 2004), Lecture Notes in Computer Science, Sophia-Antipolis, French Riviera, France, October 2004. Springer.
-
(2004)
Recent Advances in Intrusion Detection, 7th International Symposium, (RAID 2004)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Grizzard, J.4
Levine, J.5
Lee, W.6
Owen, H.7
-
10
-
-
0029716418
-
A sense of self for unix processes
-
Oakland, CA, May
-
Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, and Thomas A. Longstaff. A sense of self for Unix processes. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 120-128, Oakland, CA, May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
12
-
-
0035153870
-
A statistical approach to predictive detection
-
Amsterdam, Netherlands January
-
Joseph L. Hellerstein, Fan Zhang, and Shahabuddin Shahabuddin. A statistical approach to predictive detection. Computer Networks (Amsterdam, Netherlands: 1999), 35(1):77-95, January 2001.
-
(1999)
Computer Networks
, vol.35
, Issue.1
, pp. 77-95
-
-
Hellerstein, J.L.1
Fan, Z.2
Shahabuddin, S.3
-
13
-
-
0005018009
-
-
Cisco Systems Inc. Netflow services and applications. http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/nappswp.htm, 2002.
-
(2002)
Netflow Services and Applications
-
-
-
14
-
-
0343822522
-
Adaptive thresholding for proactive network problem detection
-
Newport, Rhode Island, April
-
Chuanyi Ji and Marina Thottan. Adaptive thresholding for proactive network problem detection. In Third IEEE International Workshop on Systems Management, pages 108-116, Newport, Rhode Island, April 1998.
-
(1998)
Third IEEE International Workshop on Systems Management
, pp. 108-116
-
-
Ji, C.1
Thottan, M.2
-
15
-
-
85084164812
-
Collapsar: A VM-based architecture for network attack detention center
-
San Diego, CA, USA, August
-
Xuxian Jiang and Dongyan Xu. Collapsar: A VM-based architecture for network attack detention center. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Jiang, X.1
Xu, D.2
-
16
-
-
21644490164
-
Backtracking intrusions
-
Bolton Landing, NY, USA, October ACM
-
Samuel T. King and Peter M. Chen. Backtracking intrusions. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03), pages 223-236, Bolton Landing, NY, USA, October 2003. ACM.
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP'03)
, pp. 223-236
-
-
King, S.T.1
Chen, P.M.2
-
19
-
-
84878732637
-
-
January
-
Robert Lemos. MySQL worm halted. http://ecoustics-cnet.com.com/ MySQL+worm+halted/2100-73493-5555242.html, January 2005.
-
(2005)
MySQL Worm Halted
-
-
Lemos, R.1
-
20
-
-
0002418527
-
An extensible probe architecture for network protocol performance measurement
-
Vancouver, British Columbia, September
-
G. Robert Malan and Farnam Jahanian. An extensible probe architecture for network protocol performance measurement. In Proceedings of ACM SIGCOMM, pages 177-185, Vancouver, British Columbia, September 1998.
-
(1998)
Proceedings of ACM SIGCOMM
, pp. 177-185
-
-
Robert Malan, G.1
Jahanian, F.2
-
21
-
-
0742276097
-
Inside the slammer worm
-
David Moore, Vern Paxson, Stefan Savage, Colleen Shannon, Stuart Staniford, and Nicholas Weaver. Inside the Slammer worm. IEEE Security & Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
22
-
-
28044457069
-
Network telescopes
-
UC San Diego, July
-
David Moore, Colleen Shannon, Geoffrey M. Voelker, and Stefan Savage. Network telescopes. Technical Report CS2004-0795, UC San Diego, July 2004.
-
(2004)
Technical Report CS2004-0795
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
23
-
-
85084161486
-
Inferring internet denial-of-service activity
-
Washington, D.C., August
-
David Moore, Geoffrey M. Voelker, and Stefan Savage. Inferring Internet denial-of-service activity. In Proceedings of the Tenth USENIX Security Symposium, pages 9-22, Washington, D.C., August 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
24
-
-
14944369649
-
Characteristics of internet background radiation
-
ACM Press
-
Ruoming Pang, Vinod Yegneswaran, Paul Barford, Vern Paxson, and Larry Peterson. Characteristics of Internet background radiation. In Proceedings of the 4th ACM SIGCOMM conference on Internet measurement, pages 27-40. ACM Press, 2004.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 27-40
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
25
-
-
85084163190
-
A virtual honeypot framework
-
San Diego, CA, USA, August
-
Niels Provos. A Virtual Honeypot Framework. In Proceedings of the 13th USENIX Security Symposium, pages 1-14, San Diego, CA, USA, August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 1-14
-
-
Provos, N.1
-
28
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
USENIX, editor November 7 - 12, 1999, Seattle, WA, USA, Berkeley, CA, USA USENIX
-
Martin Roesch. Snort - lightweight intrusion detection for networks. In USENIX, editor, Proceedings of the Thirteenth Systems Administration Conference (LISA XIII): November 7 - 12, 1999, Seattle, WA, USA, Berkeley, CA, USA, 1999. USENIX.
-
(1999)
Proceedings of the Thirteenth Systems Administration Conference (LISA XIII)
-
-
Roesch, M.1
-
30
-
-
84878738894
-
Center for internet epidemiology and defenses
-
Stefan Savage, Geoffrey Voelker, George Varghese, Vern Paxson, and Nicholas Weaver. Center for Internet epidemiology and defenses. NSF CyberTrust Center Proposal, 2004.
-
(2004)
NSF CyberTrust Center Proposal
-
-
Savage, S.1
Voelker, G.2
Varghese, G.3
Paxson, V.4
Weaver, N.5
-
31
-
-
4344627335
-
The spread of the witty worm
-
July/August
-
Colleen Shannon and David Moore. The spread of the Witty worm. IEEE Security & Privacy, 2(4):46-50, July/August 2004.
-
(2004)
IEEE Security & Privacy
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
36
-
-
84878684747
-
-
Symantec Corporation
-
Symantec Corporation. DeepSight Analyzer. http://analyzer.securityfocus. com/, 2005.
-
(2005)
DeepSight Analyzer
-
-
-
37
-
-
84878698009
-
-
Johannes Ullrich. DSHIELD. http://www.dshield.org, 2000.
-
(2000)
-
-
Ullrich, J.1
-
38
-
-
84878712922
-
On the design and use of internet sinks for network abuse monitoring
-
Sophia Antipolis, French Riviera, France, October
-
Paul Barford Vinod Yegneswaran and Dave Plonka. On the design and use of Internet sinks for network abuse monitoring. In Recent Advances in Intrusion Detection - Proceedings of the 7th International Symposium (RAID 2004), Sophia Antipolis, French Riviera, France, October 2004.
-
(2004)
Recent Advances in Intrusion Detection - Proceedings of the 7th International Symposium (RAID 2004)
-
-
Barford, P.1
Yegneswaran, V.2
Plonka, D.3
-
39
-
-
84885575254
-
Scalability, fidelity and containment in the potemkin virtual honey-farm
-
To appear Brighton, UK, October
-
Michael Vrable, Justin Ma, Jay Chen, David Moore, Erik Van-dekieft, Alex C. Snoeren, Geoffrey M. Voelker, and Stefan Savage. Scalability, fidelity and containment in the potemkin virtual honey-farm. In To appear in Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), Brighton, UK, October 2005.
-
(2005)
Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP)
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Van-Dekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
40
-
-
84892612179
-
An effective architecture and algorithm for detecting worms with various scan techniques
-
San Diego, CA, February Internet Society
-
J. Wu, S. Vangala, L. Gao, and K. Kwiat. An effective architecture and algorithm for detecting worms with various scan techniques. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2004), San Diego, CA, February 2004. Internet Society.
-
(2004)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS 2004)
-
-
Wu, J.1
Vangala, S.2
Gao, L.3
Kwiat, K.4
-
41
-
-
85137546697
-
Global intrusion detection in the DOMINO overlay system
-
San Diego, CA, February
-
Vinod Yegneswaran, Paul Barford, and Somesh Jha. Global intrusion detection in the DOMINO overlay system. In Proceedings of Network and Distributed System Security Symposium (NDSS '04), San Diego, CA, February 2004.
-
(2004)
Proceedings of Network and Distributed System Security Symposium (NDSS '04)
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
|