-
1
-
-
84894466412
-
-
The Spamhaus Project, accessed on 9 August 2013
-
The Spamhaus Project, "Spamhaus, " 2013, accessed on 9 August 2013. [online]. Available: http://www. spamhaus. org
-
(2013)
-
-
-
2
-
-
84887465235
-
-
The New York Times, March, accessed on 9 August 2013
-
The New York Times, "Firm Is Accused of Sending Spam, and Fight Jams Internet, " March 2013, accessed on 9 August 2013. [online]. Available: http://www. nytimes. com/2013/03/27/technology/ internet/online-dispute-becomes- internet-snarling-attack. html
-
(2013)
Firm Is Accused of Sending Spam, and Fight Jams Internet
-
-
-
3
-
-
84907926344
-
-
Ars Technica, April, accessed on 9 August 2013
-
Ars Technica, "Can a DDoS break the Internet? Sure just not all of it, " April 2013, accessed on 9 August 2013. [online]. Available: http://arstechnica. com/security/2013/04/ can-A-ddos-break-The-internet-sure- just-not-all-of-it/
-
(2013)
Can A DDoS Break the Internet? Sure Just Not All of It
-
-
-
4
-
-
84904053098
-
-
Arbor Networks, December, accessed on 9 August 2013
-
Arbor Networks, "DDoS and Security Reports: The Arbor Networks Security Blog, " December 2012, accessed on 9 August 2013. [online]. Available: http://ddos. arbornetworks. com/2012/12/ lessons-learned-from-The-u- s-financial-services-ddos-attacks/
-
(2012)
DDoS and Security Reports: The Arbor Networks Security Blog
-
-
-
5
-
-
77955157945
-
Cisco systems netFlow services export version 9
-
October
-
B. Claise, "Cisco Systems NetFlow Services Export Version 9, " RFC 3954 (Informational), Internet Engineering Task Force, October 2004. [online]. Available: http://www. ietf. org/rfc/rfc3954. txt
-
(2004)
RFC 3954 (Informational), Internet Engineering Task Force
-
-
Claise, B.1
-
6
-
-
77957759083
-
Architecture for iP flow information export
-
March
-
G. Sadasivan, N. Brownlee, B. Claise, and J. Quittek, "Architecture for IP Flow Information Export, " RFC 5470 (Informational), Internet Engineering Task Force, March 2009. [online]. Available: http: //www. ietf. org/rfc/rfc5470. txt
-
(2009)
RFC 5470 (Informational), Internet Engineering Task Force
-
-
Sadasivan, G.1
Brownlee, N.2
Claise, B.3
Quittek, J.4
-
7
-
-
70450206702
-
Specification of the iP flow information export protocol
-
January
-
B. Claise, S. Bryant, S. Leinen, T. Dietz, and B. Trammell, "Specification of the IP Flow Information Export protocol, " RFC 5101 (Standards Track), Internet Engineering Task Force, January 2008. [online]. Available: http://www. ietf. org/rfc/rfc5101. txt
-
(2008)
RFC 5101 (Standards Track), Internet Engineering Task Force
-
-
Claise, B.1
Bryant, S.2
Leinen, S.3
Dietz, T.4
Trammell, B.5
-
8
-
-
82955180276
-
Network attack detection at flow level
-
ser. Lecture Notes in Computer Science
-
A. A. Galtsev and A. M. Sukhov, "Network Attack Detection at Flow Level, " in Proceedings of the 11th International Conference and 4th International Conference on Smart Spaces and Next Neneration Wired/Wireless Networking, NEW2AN'11/ruSMART'11, ser. Lecture Notes in Computer Science, 2011, pp. 326-334.
-
(2011)
Proceedings of the 11th International Conference and 4th International Conference on Smart Spaces and Next Neneration Wired/Wireless Networking, NEW2AN'11/ruSMART'11
, pp. 326-334
-
-
Galtsev, A.A.1
Sukhov, A.M.2
-
9
-
-
4544268957
-
A flow-based method for abnormal network traffic detection
-
April
-
M.-S. Kim, H.-J. Kang, S.-C. Hong, S.-H. Chung, and J. W. Hong, "A Flow-based Method for Abnormal Network Traffic Detection, " in IEEE Network Operations and Management Symposium, NOMS 2004, vol. 1, April 2004, pp. 599-612.
-
(2004)
IEEE Network Operations and Management Symposium, NOMS 2004
, vol.1
, pp. 599-612
-
-
Kim, M.-S.1
Kang, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
11
-
-
84861978550
-
Real-Time and resilient intrusion detection a flow-Based approach
-
June
-
R. Hofstede and A. Pras, "Real-Time and Resilient Intrusion Detection: A Flow-Based Approach, " in Dependable Networks and Services. Proceedings of the 6th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2012, June 2012, pp. 109-112.
-
(2012)
Dependable Networks and Services. Proceedings of the 6th International Conference on Autonomous Infrastructure, Management and Security, AIMS 2012
, pp. 109-112
-
-
Hofstede, R.1
Pras, A.2
-
12
-
-
84864235747
-
The effects of dDoS attacks on flow monitoring applications
-
R. Sadre, A. Sperotto, and A. Pras, "The Effects of DDoS Attacks on Flow Monitoring Applications, " in IEEE Network Operations and Management Symposium, NOMS 2012, 2012, pp. 269-277.
-
(2012)
IEEE Network Operations and Management Symposium, NOMS 2012
, pp. 269-277
-
-
Sadre, R.1
Sperotto, A.2
Pras, A.3
-
13
-
-
84894475442
-
Introduction to cisco iOS netFlow-A technical overview
-
Cisco Systems, May
-
Cisco Systems, "Introduction to Cisco IOS NetFlow-A Technical Overview, " White paper, May 2012.
-
(2012)
White Paper
-
-
-
14
-
-
84894470407
-
-
Juniper Networks, Inc., November, accessed on 9 August 2013
-
Juniper Networks, Inc., "flow-inactive-timeout-Technical Documentation, " November 2012, accessed on 9 August 2013. [online]. Available: http://www. juniper. net/ techpubs/en US/junos/topics/reference/ configuration-statement/ flow-inactive-timeout-edit-forwarding-options. html
-
(2012)
Flow-inactive-timeout-Technical Documentation
-
-
-
15
-
-
33646423315
-
Application of anomaly detection algorithms for detecting sYN flooding attacks
-
V. A. Siris and F. Papagalou, "Application of Anomaly Detection Algorithms for Detecting SYN Flooding Attacks, " Computer Communications, vol. 29, no. 9, pp. 1433-1442, 2006.
-
(2006)
Computer Communications
, vol.29
, Issue.9
, pp. 1433-1442
-
-
Siris, V.A.1
Papagalou, F.2
-
16
-
-
0036864028
-
EWMA techniques for computer intrusion detection through anomalous changes in event intensity
-
N. Ye, C. Borror, and Y. Zhang, "EWMA Techniques for Computer Intrusion Detection Through Anomalous Changes in Event Intensity, " Quality and Reliability Engineering International, vol. 18, no. 6, pp. 443-451, 2002.
-
(2002)
Quality and Reliability Engineering International
, vol.18
, Issue.6
, pp. 443-451
-
-
Ye, N.1
Borror, C.2
Zhang, Y.3
-
17
-
-
0036343692
-
Detecting sYN flooding attacks
-
H. Wang, D. Zhang, and K. Shin, "Detecting SYN flooding attacks, " in INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3, 2002, pp. 1530-1539.
-
(2002)
INFOCOM 2002. Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies
, vol.3
, pp. 1530-1539
-
-
Wang, H.1
Zhang, D.2
Shin, K.3
-
20
-
-
84862147735
-
Autonomic parameter tuning of anomaly-Based iDSs an sSH case study
-
A. Sperotto, M. Mandjes, R. Sadre, P. T. de Boer, and A. Pras, "Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study, " in IEEE Transactions on Network and Service Management, vol. 9, no. 2, 2012, pp. 128-141.
-
(2012)
IEEE Transactions on Network and Service Management
, vol.9
, Issue.2
, pp. 128-141
-
-
Sperotto, A.1
Mandjes, M.2
Sadre, R.3
De Boer, P.T.4
Pras, A.5
|