-
1
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
Guofei Gu, Phillip A Porras, Vinod Yegneswaran, Martin W Fong, and Wenke Lee. BotHunter: Detecting malware infection through IDS-driven dialog correlation. In USENIX Security, volume 7, pages 1{16, 2007.
-
(2007)
USENIX Security
, vol.7
, pp. 1-16
-
-
Gu, G.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Lee, W.5
-
2
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Cambridge, MA
-
Anestis Karasaridis, Brian Rexroad, and David Hoein. Wide-scale botnet detection and characterization. In Proceedings of the rst conference on First Workshop on Hot Topics in Understanding Botnets, volume 7. Cambridge, MA, 2007.
-
(2007)
Proceedings of the Rst Conference on First Workshop on Hot Topics in Understanding Botnets
, vol.7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoein, D.3
-
4
-
-
68649129121
-
OpenFlow: Enabling innovation in campus networks
-
Nick McKeown, Tom Anderson, Hari Balakrishnan, Guru Parulkar, Larry Peterson, Jennifer Rexford, Scott Shenker, and Jonathan Turner. OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2):69{74, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
5
-
-
84904188964
-
Provenance-aware security risk analysis for hosts and network ows
-
IEEE
-
Mohsen Rezvani, Aleksandar Ignjatovic, Elisa Bertino, and Sanjay Jha. Provenance-aware security risk analysis for hosts and network ows. In Network Operations and Management Symposium (NOMS), 2014 IEEE, pages 1{8. IEEE, 2014.
-
(2014)
Network Operations and Management Symposium (NOMS), 2014 IEEE
, pp. 1-8
-
-
Rezvani, M.1
Ignjatovic, A.2
Bertino, E.3
Jha, S.4
-
7
-
-
78149258537
-
FlowVisor: A network virtualization layer
-
Tech. Rep
-
Rob Sherwood, Glen Gibb, Kok-Kiong Yap, Guido Appenzeller, Martin Casado, Nick McKeown, and Guru Parulkar. FlowVisor: A network virtualization layer. OpenFlow Switch Consortium, Tech. Rep, 2009.
-
(2009)
OpenFlow Switch Consortium
-
-
Sherwood, R.1
Gibb, G.2
Yap, K.3
Appenzeller, G.4
Casado, M.5
McKeown, N.6
Parulkar, G.7
-
8
-
-
84893570087
-
FRESCO: Modular composable security services for software-dened networks
-
Seungwon Shin, Phillip A Porras, Vinod Yegneswaran, Martin W Fong, Guofei Gu, and Mabry Tyson. FRESCO: Modular composable security services for software-de-ned networks. In NDSS, 2013.
-
(2013)
NDSS
-
-
Shin, S.1
Porras, P.A.2
Yegneswaran, V.3
Fong, M.W.4
Gu, G.5
Tyson, M.6
-
10
-
-
38149024764
-
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
-
Springer
-
Matthias Vallentin, Robin Sommer, Jason Lee, Craig Leres, Vern Paxson, and Brian Tierney. The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware. In Recent Advances in Intrusion Detection, pages 107{126. Springer, 2007.
-
(2007)
Recent Advances in Intrusion Detection
, pp. 107-126
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxson, V.5
Tierney, B.6
|