-
1
-
-
85081770459
-
The Internet Motion Sensor: A Distributed Blackhole Monitoring System
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson. The Internet Motion Sensor: A Distributed Blackhole Monitoring System. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, Feb. 2005.
-
Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, Feb. 2005
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
2
-
-
84878677794
-
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic
-
M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, and D. Watson. Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic. In Proceedings of the USENIX/ACM Internet Measurement Conference, New Orleans, LA, Oct. 2005.
-
Proceedings of the USENIX/ACM Internet Measurement Conference, New Orleans, LA, Oct. 2005
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Provos, N.4
Rosaen, K.5
Watson, D.6
-
3
-
-
21644433634
-
Xen and the Art of Virtualization
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In Proceedings of the 19th ACM Symposium on Operating System Principles (SOSP), Bolton Landing, NY, Oct. 2003.
-
Proceedings of the 19th ACM Symposium on Operating System Principles (SOSP), Bolton Landing, NY, Oct. 2003
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
84885639914
-
Detecting Past and Present Intrusions through Vulnerability-specific Predicates
-
P. Chen, A. Joshi, S. King, and G. Dunlap. Detecting Past and Present Intrusions through Vulnerability-specific Predicates. In Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), Brighton, UK, Oct. 2005.
-
Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), Brighton, UK, Oct. 2005
-
-
Chen, P.1
Joshi, A.2
King, S.3
Dunlap, G.4
-
5
-
-
0009016272
-
An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied
-
B. Cheswick. An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied. In Proceedings of the Winter Usenix Conference, San Francisco, CA, 1992.
-
Proceedings of the Winter Usenix Conference, San Francisco, CA, 1992
-
-
Cheswick, B.1
-
6
-
-
85059766484
-
Live Migration of Virtual Machines
-
C. Clark, K. Fraser, S. Hand, J. G. Hansen, E. Jul, C. Limpach, I. Pratt, and A. Warfield. Live Migration of Virtual Machines. In Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005.
-
Proceedings of the 2nd ACM/USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, May 2005
-
-
Clark, C.1
Fraser, K.2
Hand, S.3
Hansen, J.G.4
Jul, E.5
Limpach, C.6
Pratt, I.7
Warfield, A.8
-
7
-
-
84885679117
-
Vigilante: End-to-End Containment of Internet Worms
-
M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), Brighton, UK, Oct. 2005.
-
Proceedings of the 20th ACM Symposium on Operating System Principles (SOSP), Brighton, UK, Oct. 2005
-
-
Costa, M.1
Crowcroft, J.2
Castro, M.3
Rowstron, A.4
Zhou, L.5
Zhang, L.6
Barham, P.7
-
8
-
-
28044442580
-
HoneyStat: Local Worm Detection Using Honeypots
-
Sept.
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levine, and H. Owen. HoneyStat: Local Worm Detection Using Honeypots. In In Recent Advances In Intrusion Detection (RAID) 2004, Sept. 2004.
-
(2004)
Recent Advances in Intrusion Detection (RAID) 2004
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levine, J.6
Owen, H.7
-
9
-
-
14944379887
-
A Behavioral Approach to Worm Detection
-
D. Ellis, J. Aiken, K. Attwood, and S. Tenaglia. A Behavioral Approach to Worm Detection. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), Fairfax, VA, Oct. 2004.
-
Proceedings of the ACM Workshop on Rapid Malcode (WORM), Fairfax, VA, Oct. 2004
-
-
Ellis, D.1
Aiken, J.2
Attwood, K.3
Tenaglia, S.4
-
10
-
-
0012736571
-
-
RFC 2784, Mar.
-
D. Farinacci, T. Li, S. Hanks, D. Meyer, and P. Traina. RFC 2784 - Generic Routing Encapsulation (GRE). RFC 2784, Mar. 2000.
-
(2000)
RFC 2784 - Generic Routing Encapsulation (GRE)
-
-
Farinacci, D.1
Li, T.2
Hanks, S.3
Meyer, D.4
Traina, P.5
-
12
-
-
0012109964
-
-
Honeynet Project. Pearson Education, Inc., Boston, MA, second edition
-
Honeynet Project. Know Your Enemy: Learning about Security Threats. Pearson Education, Inc., Boston, MA, second edition, 2004.
-
(2004)
Know Your Enemy: Learning about Security Threats
-
-
-
16
-
-
85084163246
-
Autograph: Toward Automated, Distributed Worm Signature Detection
-
H.-A. Kim and B. Karp. Autograph: Toward Automated, Distributed Worm Signature Detection. In Proceedings of the USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
Proceedings of the USENIX Security Symposium, San Diego, CA, Aug. 2004
-
-
Kim, H.-A.1
Karp, B.2
-
17
-
-
0040291388
-
The Click Modular Router
-
Aug.
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The Click Modular Router. ACM Transactions on Computer Systems, 18(3):263-297, Aug. 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
19
-
-
0033890508
-
Transport and Application Protocol Scrubbing
-
Tel-Aviv, Isreal, Mar.
-
G. R. Malan, D. Watson, F. Jahanian, and P. Howell. Transport and Application Protocol Scrubbing. In Proceedings of IEEE Infocom Conference, pages 1381-1390, Tel-Aviv, Isreal, Mar. 2000.
-
(2000)
Proceedings of IEEE Infocom Conference
, pp. 1381-1390
-
-
Malan, G.R.1
Watson, D.2
Jahanian, F.3
Howell, P.4
-
20
-
-
0742276097
-
Inside the Slammer Worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer Worm. IEEE Security and Privacy, 1(4):33-39, July 2003.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
21
-
-
0141762461
-
Code-Red: A case study on the spread and victims of an Internet worm
-
D. Moore, C. Shannon, and J. Brown. Code-Red: a case study on the spread and victims of an Internet worm. In Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, Nov. 2002.
-
Proceedings of the ACM/USENIX Internet Measurement Workshop (IMW), Marseille, France, Nov. 2002
-
-
Moore, D.1
Shannon, C.2
Brown, J.3
-
22
-
-
14944381614
-
-
Technical Report CS2004-0795, UCSD, July
-
D. Moore, C. Shannon, G. Voelker, and S. Savage. Network telescopes: Technical report. Technical Report CS2004-0795, UCSD, July 2004.
-
(2004)
Network Telescopes: Technical Report
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
23
-
-
85084161486
-
Inferring Internet Denial of Service Activity
-
D. Moore, G. M. Voelker, and S. Savage. Inferring Internet Denial of Service Activity. In Proceedings of the USENIX Security Symposium, Washington, D.C., Aug. 2001.
-
Proceedings of the USENIX Security Symposium, Washington, D.C., Aug. 2001
-
-
Moore, D.1
Voelker, G.M.2
Savage, S.3
-
24
-
-
84885662886
-
From AntiVirus to AntiWorm: A New Strategy for A New Threat Landscape
-
Invited talk at
-
C. Nachenberg. From AntiVirus to AntiWorm: A New Strategy for A New Threat Landscape. Invited talk at 2004 ACM Worm, http://www.icir.org/vern/ worm04/carey.ppt.
-
2004 ACM Worm
-
-
Nachenberg, C.1
-
25
-
-
79953672829
-
Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software
-
J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, Feb. 2005.
-
Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, Feb. 2005
-
-
Newsome, J.1
Song, D.2
-
26
-
-
14944369649
-
Characteristics of Internet Background Radiation
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of Internet Background Radiation. In Proceedings of the USENIX/ACM Internet Measurement Conference, Taormina, Sicily, Italy, Oct. 2004.
-
Proceedings of the USENIX/ACM Internet Measurement Conference, Taormina, Sicily, Italy, Oct. 2004
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
28
-
-
18844437024
-
Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code
-
J. Rabek, R. Khazan, S. Lewandowski, and R. Cunningham. Detection of Injected, Dynamically Generated, and Obfuscated Malicious Code. In Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington, D.C., Oct. 2003.
-
Proceedings of the ACM Workshop on Rapid Malcode (WORM), Washington, D.C., Oct. 2003
-
-
Rabek, J.1
Khazan, R.2
Lewandowski, S.3
Cunningham, R.4
-
29
-
-
84991765629
-
Automated Worm Fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage. Automated Worm Fingerprinting. In Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Francisco, CA, Dec. 2004.
-
Proceedings of the 6th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), San Francisco, CA, Dec. 2004
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
31
-
-
0003605887
-
-
Pocket Books, New York, NY
-
C. Stoll. The Cuckoo's Egg. Pocket Books, New York, NY, 1990.
-
(1990)
The Cuckoo's Egg
-
-
Stoll, C.1
-
33
-
-
33749864044
-
New Streaming Algorithms for Superspreader Detection
-
S. Venkataraman, D. Song, P. Gibbons, and A. Blum. New Streaming Algorithms for Superspreader Detection. In Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, Feb. 2005.
-
Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05), San Diego, CA, Feb. 2005
-
-
Venkataraman, S.1
Song, D.2
Gibbons, P.3
Blum, A.4
-
35
-
-
33750356750
-
-
Technical Report MSR-TR-2005-72, Microsoft Research, Aug.
-
Y.-M. Wang, D. Beck, X. Jiang, and R. Roussev. Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites that Exploit Browser Vulnerabilities. Technical Report MSR-TR-2005-72, Microsoft Research, Aug. 2005.
-
(2005)
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
-
36
-
-
84908879835
-
Parallax: Managing Storage for a Million Machines
-
A. Warfield, R. Ross, K. Fraser, C. Limpach, and S. Hand. Parallax: Managing Storage for a Million Machines. In Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005.
-
Proceedings of the 10th USENIX Workshop on Hot Topics in Operating Systems (HotOS-X), Santa Fe, NM, June 2005
-
-
Warfield, A.1
Ross, R.2
Fraser, K.3
Limpach, C.4
Hand, S.5
-
37
-
-
85084164480
-
Very Fast Containment of Scanning Worms
-
N. Weaver, S. Staniford, and V. Paxson. Very Fast Containment of Scanning Worms. In Proceedings of the USENIX Security Symposium, San Diego, CA, Aug. 2004.
-
Proceedings of the USENIX Security Symposium, San Diego, CA, Aug. 2004
-
-
Weaver, N.1
Staniford, S.2
Paxson, V.3
-
38
-
-
84978438355
-
Scale and Performance in the Denali Isolation Kernel
-
A. Whitaker, M. Shaw, and S. D. Gribble. Scale and Performance in the Denali Isolation Kernel. In Proceedings of the 5th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), Boston, MA, Dec. 2002.
-
Proceedings of the 5th ACM/USENIX Symposium on Operating System Design and Implementation (OSDI), Boston, MA, Dec. 2002
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S.D.3
|