-
7
-
-
84888862477
-
Dns amplification attack revisited
-
M. Anagnostopoulos, G. Kambourakis, P. Kopanos, G. Louloudakis, and S. Gritzalis Dns amplification attack revisited Comput. Secur. Part B 39 2013 475 485 < http://www.sciencedirect.com/science/article/pii/S0167404813001405 >
-
(2013)
Comput. Secur. Part B
, Issue.39
, pp. 475-485
-
-
Anagnostopoulos, M.1
Kambourakis, G.2
Kopanos, P.3
Louloudakis, G.4
Gritzalis, S.5
-
8
-
-
85081770459
-
The internet motion sensor: a distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, J. Nazario, D. Watson, et al., The internet motion sensor: a distributed blackhole monitoring system, in: Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS), 2005, pp. 167-179.
-
(2005)
Proceedings of the 12th ISOC Symposium on Network and Distributed Systems Security (SNDSS)
, pp. 167-179
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
Watson, D.5
-
9
-
-
14944341848
-
On the design and use of internet sinks for network abuse monitoring
-
Yegneswaran, Vinod et al., On the design and use of internet sinks for network abuse monitoring, in: Recent Advances in Intrusion Detection, 2004.
-
(2004)
Recent Advances in Intrusion Detection
-
-
Yegneswaran1
Vinod2
-
10
-
-
78650939601
-
Internet background radiation revisited
-
ACM
-
E. Wustrow, M. Karir, M. Bailey, F. Jahanian, and G. Huston Internet background radiation revisited Proceedings of the 10th Annual Conference on Internet Measurement 2010 ACM 62 74
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement
, pp. 62-74
-
-
Wustrow, E.1
Karir, M.2
Bailey, M.3
Jahanian, F.4
Huston, G.5
-
12
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage Inferring internet denial-of-service activity ACM Trans. Comput. Syst. (TOCS) 24 2 2006 115 139
-
(2006)
ACM Trans. Comput. Syst. (TOCS)
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
-
13
-
-
84055171428
-
Corrupted dns resolution paths: the rise of a malicious resolution authority
-
D. Dagon, N. Provos, C.P. Lee, W. Lee, Corrupted dns resolution paths: the rise of a malicious resolution authority, in: NDSS, 2008.
-
(2008)
NDSS
-
-
Dagon, D.1
Provos, N.2
Lee, C.P.3
Lee, W.4
-
14
-
-
14944380936
-
The top speed of flash worms
-
ACM New York, NY, USA
-
S. Staniford, D. Moore, V. Paxson, and N. Weaver The top speed of flash worms Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM '04 2004 ACM New York, NY, USA 33 42 10.1145/1029618.1029624
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode, WORM '04
, pp. 33-42
-
-
Staniford, S.1
Moore, D.2
Paxson, V.3
Weaver, N.4
-
17
-
-
0030287048
-
The expectation-maximization algorithm
-
T.K. Moon The expectation-maximization algorithm Signal Process. Mag. IEEE 13 6 1996 47 60
-
(1996)
Signal Process. Mag. IEEE
, vol.13
, Issue.6
, pp. 47-60
-
-
Moon, T.K.1
-
19
-
-
0000596241
-
Interval estimation from the likelihood function
-
D. Hudson Interval estimation from the likelihood function J. Roy. Stat. Soc. Ser. B (Methodol.) 1971 256 262
-
(1971)
J. Roy. Stat. Soc. Ser. B (Methodol.)
, pp. 256-262
-
-
Hudson, D.1
-
21
-
-
47149094655
-
A detection and offense mechanism to defend against application layer ddos attacks
-
ICNS, IEEE
-
J. Yu, Z. Li, H. Chen, and X. Chen A detection and offense mechanism to defend against application layer ddos attacks Third International Conference on Networking and Services, 2007, ICNS 2007 IEEE 54
-
(2007)
Third International Conference on Networking and Services, 2007
, pp. 54
-
-
Yu, J.1
Li, Z.2
Chen, H.3
Chen, X.4
-
24
-
-
6344247392
-
-
Han, Jiawei, Kamber, Micheline, Pei, Jian, Data Mining: Concepts and Techniques, 2006.
-
(2006)
Data Mining: Concepts and Techniques
-
-
Jiawei, H.1
Micheline, K.2
Jian, P.3
-
27
-
-
84901450923
-
Characterizing dark dns behavior
-
J. Oberheide, M. Karir, Z.M. Mao, Characterizing dark dns behavior, in: Fourth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA), 2007.
-
(2007)
Fourth GI International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA)
-
-
Oberheide, J.1
Karir, M.2
Mao, Z.M.3
-
30
-
-
0001942153
-
Model selection for probabilistic clustering using cross-validated likelihood
-
P. Smyth Model selection for probabilistic clustering using cross-validated likelihood Stat. Comput. 10 1 2000 63 72
-
(2000)
Stat. Comput.
, vol.10
, Issue.1
, pp. 63-72
-
-
Smyth, P.1
-
32
-
-
84928825712
-
-
DShield, (accessed 15.11.13)
-
DShield, Dshield Port Report. < http://www1.dshield.org > (accessed 15.11.13).
-
Dshield Port Report
-
-
-
36
-
-
84928824436
-
-
accessed 15.11.13
-
Open Resolver Project. < http://openresolverproject.org/ > (accessed 15.11.13).
-
-
-
-
37
-
-
84928823214
-
-
accessed 15.11.13
-
Sourcefire, Snort NIDS. < http://www.snort.org/ > (accessed 15.11.13).
-
Snort NIDS
-
-
Sourcefire1
-
41
-
-
24344436426
-
The blaster worm: then and now
-
M. Bailey, E. Cooke, F. Jahanian, D. Watson, and J. Nazario The blaster worm: then and now Secur. Privacy IEEE 3 4 2005 26 31
-
(2005)
Secur. Privacy IEEE
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
Nazario, J.5
-
42
-
-
82955161573
-
Analysis of country-wide internet outages caused by censorship
-
IMC
-
A. Dainotti, C. Squarcella, E. Aben, K.C. Claffy, M. Chiesa, M. Russo, A. Pescape, Analysis of country-wide internet outages caused by censorship, in: Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC, 2011, pp. 1-17.
-
(2011)
Proceedings of the ACM SIGCOMM Internet Measurement Conference
, pp. 1-17
-
-
Dainotti, A.1
Squarcella, C.2
Aben, E.3
Claffy, K.C.4
Chiesa, M.5
Russo, M.6
Pescape, A.7
-
43
-
-
44049086375
-
Practical darknet measurement
-
M. Bailey, E. Cooke, F. Jahanian, A. Myrick, S. Sinha, Practical darknet measurement, in: 2006 40th Annual Conference on Information Sciences and Systems, 2006, p. 14961501.
-
(2006)
2006 40th Annual Conference on Information Sciences and Systems
, pp. 14961501
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Myrick, A.4
Sinha, S.5
-
44
-
-
84878677794
-
Data reduction for the scalable automated analysis of distributed darknet traffic
-
M. Bailey, E. Cooke, F. Jahanian, N. Provos, K. Rosaen, D. Watson, Data reduction for the scalable automated analysis of distributed darknet traffic, in: Proceedings of the USENIX/ACM Internet Measurement Conference, 2005.
-
(2005)
Proceedings of the USENIX/ACM Internet Measurement Conference
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Provos, N.4
Rosaen, K.5
Watson, D.6
-
46
-
-
84872155077
-
Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems
-
P.A.R. Kumar, and S. Selvakumar Detection of distributed denial of service attacks using an ensemble of adaptive and hybrid neuro-fuzzy systems Comput. Commun. 36 3 2013 303 319
-
(2013)
Comput. Commun.
, vol.36
, Issue.3
, pp. 303-319
-
-
Kumar, P.A.R.1
Selvakumar, S.2
-
47
-
-
84870380223
-
Ensemble-based ddos detection and mitigation model
-
ACM New York, NY, USA
-
S. Bhatia, D. Schmidt, and G. Mohay Ensemble-based ddos detection and mitigation model Proceedings of the Fifth International Conference on Security of Information and Networks, SIN '12 2012 ACM New York, NY, USA 79 86 10.1145/2388576.2388587
-
(2012)
Proceedings of the Fifth International Conference on Security of Information and Networks, SIN '12
, pp. 79-86
-
-
Bhatia, S.1
Schmidt, D.2
Mohay, G.3
-
48
-
-
82955197456
-
-
ACM New York, NY, USA
-
D.Q. Le, T. Jeong, H.E. Roman, and J.W.-K. Hong Proceedings of the Second Symposium on Information and Communication Technology, SoICT '11 2011 ACM New York, NY, USA 36 41 10.1145/2069216.2069227
-
(2011)
Proceedings of the Second Symposium on Information and Communication Technology, SoICT '11
, pp. 36-41
-
-
Le, D.Q.1
Jeong, T.2
Roman, H.E.3
Hong, J.W.-K.4
-
49
-
-
77955771346
-
Dtrab: combating against attacks on encrypted protocols through traffic-feature analysis
-
Z.M. Fadlullah, T. Taleb, A.V. Vasilakos, M. Guizani, and N. Kato Dtrab: combating against attacks on encrypted protocols through traffic-feature analysis IEEE/ACM Trans. Network. (TON) 18 4 2010 1234 1247
-
(2010)
IEEE/ACM Trans. Network. (TON)
, vol.18
, Issue.4
, pp. 1234-1247
-
-
Fadlullah, Z.M.1
Taleb, T.2
Vasilakos, A.V.3
Guizani, M.4
Kato, N.5
-
51
-
-
78149346483
-
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
-
ACM
-
G. Yao, J. Bi, and Z. Zhou Passive IP traceback: capturing the origin of anonymous traffic through network telescopes ACM SIGCOMM Computer Communication Review vol. 40 2010 ACM 413 414
-
(2010)
ACM SIGCOMM Computer Communication Review
, vol.40
, pp. 413-414
-
-
Yao, G.1
Bi, J.2
Zhou, Z.3
-
52
-
-
77954294167
-
Study on classification and characteristics of source address spoofing attacks in the internet
-
IEEE
-
J. Bi, P. Hu, and P. Li Study on classification and characteristics of source address spoofing attacks in the internet Ninth International Conference on Networks (ICN), 2010 2010 IEEE 226 230
-
(2010)
Ninth International Conference on Networks (ICN), 2010
, pp. 226-230
-
-
Bi, J.1
Hu, P.2
Li, P.3
-
53
-
-
84893638103
-
Demo abstract: towards extracting semantics by visualizing large traceroute datasets
-
E. Gansner, B. Krishnamurthy, W. Willinger, F. Bustamante, and M. Snchez Demo abstract: towards extracting semantics by visualizing large traceroute datasets Computing 96 1 2014 81 83 10.1007/s00607-013-0290-8
-
(2014)
Computing
, vol.96
, Issue.1
, pp. 81-83
-
-
Gansner, E.1
Krishnamurthy, B.2
Willinger, W.3
Bustamante, F.4
Snchez, M.5
-
54
-
-
84886393996
-
Bgpfuse: Using visual feature fusion for the detection and attribution of bgp anomalies
-
ACM New York, NY, USA
-
S. Papadopoulos, G. Theodoridis, and D. Tzovaras Bgpfuse: Using visual feature fusion for the detection and attribution of bgp anomalies Proceedings of the Tenth Workshop on Visualization for Cyber Security, VizSec '13 2013 ACM New York, NY, USA 57 64 10.1145/2517957.2517965
-
(2013)
Proceedings of the Tenth Workshop on Visualization for Cyber Security, VizSec '13
, pp. 57-64
-
-
Papadopoulos, S.1
Theodoridis, G.2
Tzovaras, D.3
-
56
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
V. Paxson An analysis of using reflectors for distributed denial-of-service attacks SIGCOMM Comput. Commun. Rev. 31 3 2001 38 47 10.1145/505659.505664
-
(2001)
SIGCOMM Comput. Commun. Rev.
, vol.31
, Issue.3
, pp. 38-47
-
-
Paxson, V.1
|