-
1
-
-
84892406748
-
-
Techcrunch. Hack Attack: Sony Confirms PlayStation Network Outage Caused By 'External Intrusion
-
Techcrunch. Hack Attack: Sony Confirms PlayStation Network Outage Caused By 'External Intrusion'. http: //tinyurl.com/6cbcldv.
-
-
-
-
2
-
-
84892417197
-
-
Forbes. Citibank Reveals One Percent Of Credit Card Accounts Exposed In Hacker Intrusion
-
Forbes. Citibank Reveals One Percent Of Credit Card Accounts Exposed In Hacker Intrusion. http://tinyurl. com/7jxgxqz.
-
-
-
-
3
-
-
84892406819
-
-
The Wall Street Journal. Hackers Targeted Twitter User Data
-
The Wall Street Journal. Hackers Targeted Twitter User Data. http://tinyurl.com/a9tkbn5.
-
-
-
-
4
-
-
84892422544
-
-
ABC news. Major US Newspapers Allege Chinese Hack Attack
-
ABC news. Major US Newspapers Allege Chinese Hack Attack. http://tinyurl.com/bekao8k.
-
-
-
-
5
-
-
84892402067
-
-
Computer World. Google: Phishers stole e-mail from U.S. officials, others
-
Computer World. Google: Phishers stole e-mail from U.S. officials, others. http://tinyurl.com/cav4rwj.
-
-
-
-
6
-
-
84892424073
-
-
The Next Web. Senate website, CIA.gov reportedly hacked
-
The Next Web. Senate website, CIA.gov reportedly hacked. http://tinyurl.com/7y8dv5b.
-
-
-
-
7
-
-
84892384544
-
-
ArsRechnica. Facebook Computers Compromised
-
ArsRechnica. Facebook Computers Compromised. http: //tinyurl.com/cwmvxrv.
-
-
-
-
8
-
-
84892422683
-
-
National Security Council
-
National Security Council. http://www.whitehouse.gov/ cybersecurity.
-
-
-
-
9
-
-
27544493249
-
An experimental evaluation to determine if port scans are precursors to an attack
-
june-1 july
-
S. Panjwani, S. Tan, K.M. Jarrin, and M. Cukier. An experimental evaluation to determine if port scans are precursors to an attack. In Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on, pages 602-611, june-1 july 2005.
-
(2005)
Dependable Systems and Networks, 2005. DSN 2005. Proceedings. International Conference on
, pp. 602-611
-
-
Panjwani, S.1
Tan, S.2
Jarrin, K.M.3
Cukier, M.4
-
10
-
-
84870877621
-
Analysis of a O stealth scan from a botnet
-
Nov
-
A. Dainotti, A. King, K. Claffy, F. Papale, and A. Pescap. Analysis of a "/0" Stealth Scan from a Botnet. In Internet Measurement Conference (IMC), Nov 2012.
-
(2012)
Internet Measurement Conference (IMC)
-
-
Dainotti, A.1
King, A.2
Claffy, K.3
Papale, F.4
Pescap, A.5
-
11
-
-
84892418134
-
-
Internet Storm Center. Reports of a Distributed Injection Scan
-
Internet Storm Center. Reports of a Distributed Injection Scan. http://isc.sans.edu/diary.html?storyid=14251.
-
-
-
-
12
-
-
84892375328
-
-
Emmanuele Zambon &Damiano Bolzoni. Network Intrusion Detection Systems
-
Emmanuele Zambon &Damiano Bolzoni. Network Intrusion Detection Systems. http://www.blackhat.com/ presentations/bh-usa-06/BH-US-06-Zambon.pdf.
-
-
-
-
13
-
-
80053510589
-
Surveying port scans and their detection methodologies
-
M.H. Bhuyan, DK Bhattacharyya, and JK Kalita. Surveying port scans and their detection methodologies. The Computer Journal, 54(10):1565-1581, 2010.
-
(2010)
The Computer Journal
, vol.54
, Issue.10
, pp. 1565-1581
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
-
14
-
-
34547856203
-
Mosaic organization of dna nucleotides
-
Feb
-
C.-K. Peng, S. V. Buldyrev, S. Havlin, M. Simons, H. E. Stanley, and A. L. Goldberger. Mosaic organization of dna nucleotides. Phys. Rev. E, 49:1685-1689, Feb 1994.
-
(1994)
Phys. Rev. e
, vol.49
, pp. 1685-1689
-
-
Peng, C.-K.1
Buldyrev, S.V.2
Havlin, S.3
Simons, M.4
Stanley, H.E.5
Goldberger, A.L.6
-
15
-
-
33744966556
-
Observing internet worm and virus attacks with a small network telescope
-
U. Harder, M.W. Johnson, J.T. Bradley, and W.J. Knottenbelt. Observing internet worm and virus attacks with a small network telescope. Electronic Notes in Theoretical Computer Science, 151(3):47-59, 2006.
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.151
, Issue.3
, pp. 47-59
-
-
Harder, U.1
Johnson, M.W.2
Bradley, J.T.3
Knottenbelt, W.J.4
-
16
-
-
67249104170
-
Correlation among piecewise unwanted traffic time series
-
IEEE
-
K. Fukuda, T. Hirotsu, O. Akashi, and T. Sugawara. Correlation among piecewise unwanted traffic time series. In Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, pages 1-5. IEEE, 2008.
-
(2008)
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
, pp. 1-5
-
-
Fukuda, K.1
Hirotsu, T.2
Akashi, O.3
Sugawara, T.4
-
17
-
-
70350218435
-
Nmap network scanning: The official nmap project guide to network discovery and security scanning author
-
G.F. Lyon. Nmap network scanning: The official nmap project guide to network discovery and security scanning author: Gordon fyodor l. 2009.
-
(2009)
Gordon Fyodor L
-
-
Lyon, G.F.1
-
18
-
-
33947613028
-
Nonlinear, biophysically-informed speech pathology detection
-
M. Little, P. McSharry, I. Moroz, and S. Roberts. Nonlinear, biophysically-informed speech pathology detection. In Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings., volume 2, page II.
-
Acoustics, Speech and Signal Processing, 2006. ICASSP 2006 Proceedings
, vol.2
, pp. 11
-
-
Little, M.1
McSharry, P.2
Moroz, I.3
Roberts, S.4
-
19
-
-
84892383124
-
-
Fing, the ultimate network toolkit
-
Fing, the ultimate network toolkit. http://www. overlooksoft.com/fing.
-
-
-
-
20
-
-
0036090327
-
Practical automated detection of stealthy portscans
-
S. Staniford, J.A. Hoagland, and J.M. McAlerney. Practical automated detection of stealthy portscans. Journal of Computer Security, 10(1/2):105-136, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.1-2
, pp. 105-136
-
-
Staniford, S.1
Hoagland, J.A.2
McAlerney, J.M.3
-
21
-
-
65249157560
-
The divergence and bhattacharyya distance measures in signal selection
-
Thomas Kailath. The divergence and bhattacharyya distance measures in signal selection. Communication Technology, IEEE Transactions on, 15(1):52-60, 1967.
-
(1967)
Communication Technology, IEEE Transactions on
, vol.15
, Issue.1
, pp. 52-60
-
-
Kailath, T.1
-
22
-
-
65249157560
-
The divergence and bhattacharyya distance measures in signal selection
-
Thomas Kailath. The divergence and bhattacharyya distance measures in signal selection. Communication Technology, IEEE Transactions on, 15(1):52-60, 1967.
-
(1967)
Communication Technology, IEEE Transactions on
, vol.15
, Issue.1
, pp. 52-60
-
-
Kailath, T.1
-
25
-
-
84892409151
-
-
jNetPcap. Sli Technologies
-
jNetPcap. Sli Technologies. http://jnetpcap.com/ userguide.
-
-
-
-
26
-
-
76749092270
-
The weka data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I.H. Witten. The weka data mining software: an update. ACM SIGKDD Explorations Newsletter, 11(1):10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
27
-
-
84892386099
-
-
k-Means Clustering
-
k-Means Clustering. http://www.mathworks.com/help/ stats/k-means- clustering.html.
-
-
-
-
29
-
-
84892427600
-
-
Maurice George Kendall. Rank correlation methods. 1948
-
Maurice George Kendall. Rank correlation methods. 1948.
-
-
-
-
30
-
-
0000673504
-
Multivariate generalizations of the wald-wolfowitz and smirnov twosample tests
-
Jerome H Friedman and Lawrence C Rafsky. Multivariate generalizations of the wald-wolfowitz and smirnov twosample tests. The Annals of Statistics, pages 697-717, 1979.
-
(1979)
The Annals of Statistics
, pp. 697-717
-
-
Friedman, J.H.1
Rafsky, L.C.2
-
31
-
-
85081770459
-
The internet motion sensor: A distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, D. Watson, et al. The internet motion sensor: A distributed blackhole monitoring system. In Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS), pages 167-179, 2005.
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
32
-
-
14944341848
-
On the design and use of internet sinks for network abuse monitoring
-
Yegneswaran, Vinod et al. On the design and use of internet sinks for network abuse monitoring. In Recent Advances in Intrusion Detection. 2004.
-
(2004)
Recent Advances in Intrusion Detection.
-
-
Yegneswaran, V.1
-
33
-
-
78650939601
-
Internet background radiation revisited
-
ACM
-
Eric Wustrow, Manish Karir, Michael Bailey, Farnam Jahanian, and Geoff Huston. Internet background radiation revisited. In Proceedings of the 10th annual conference on Internet measurement, pages 62-74. ACM, 2010.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
34
-
-
34547427252
-
Semi-automated discovery of application session structure
-
ACM
-
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, and Can Emre Koksal. Semi-automated discovery of application session structure. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pages 119-132. ACM, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 119-132
-
-
Kannan, J.1
Jung, J.2
Paxson, V.3
Koksal, C.E.4
-
36
-
-
84892391863
-
-
Simone Fatichi. Mann-Kendall Test
-
Simone Fatichi. Mann-Kendall Test. http://tinyurl.com/ cstvpwa.
-
-
-
-
37
-
-
84892424862
-
-
MathWorks. Run test for randomness
-
MathWorks. Run test for randomness. http://tinyurl.com/ d6gtykz.
-
-
-
-
38
-
-
33745205813
-
Inferring internet denial-of-service activity
-
David Moore, Colleen Shannon, Douglas J Brown, Geoffrey M Voelker, and Stefan Savage. Inferring internet denial-of-service activity. ACM Transactions on Computer Systems (TOCS), 24(2):115-139, 2006.
-
(2006)
ACM Transactions on Computer Systems (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
40
-
-
84892409058
-
-
Snort. Available at: http://www.snort.org.
-
-
-
-
45
-
-
51049100612
-
Scan attack detection based on distributed cooperative model
-
IEEE
-
W. Zhang, S. Teng, and X. Fu. Scan attack detection based on distributed cooperative model. In Computer Supported Cooperative Work in Design, 2008. CSCWD 2008. 12th International Conference on, pages 743-748. IEEE, 2008.
-
(2008)
Computer Supported Cooperative Work in Design, 2008. CSCWD 2008. 12th International Conference on
, pp. 743-748
-
-
Zhang, W.1
Teng, S.2
Fu, X.3
-
46
-
-
84870694700
-
Aocd: An adaptive outlier based coordinated scan detection approach
-
M.H. Bhuyan, D.K. Bhattacharyya, and J.K. Kalita. Aocd: An adaptive outlier based coordinated scan detection approach. International Journal of Network Security, 14(6):339-351, 2012.
-
(2012)
International Journal of Network Security
, vol.14
, Issue.6
, pp. 339-351
-
-
Bhuyan, M.H.1
Bhattacharyya, D.K.2
Kalita, J.K.3
|