-
1
-
-
0041065277
-
The internet worm program: An analysis
-
January
-
E. Spafford, "The internet worm program: an analysis, " SIGCOMM Comput.Commun. Rev., vol.19, pp. 17-57, January 1989.
-
(1989)
SIGCOMM Comput.Commun. Rev.
, vol.19
, pp. 17-57
-
-
Spafford, E.1
-
2
-
-
2342522755
-
Security applications of peer-To-peer networks
-
June
-
V. Vlachos, S. Androutsellis-Theotokis, and D. Spinellis, "Security Applications of Peer-To-Peer Networks, " Computer Networks, vol. 45, no. 2, pp 195-205, June 2004.
-
(2004)
Computer Networks
, vol.45
, Issue.2
, pp. 195-205
-
-
Vlachos, V.1
Androutsellis-Theotokis, S.2
Spinellis, D.3
-
3
-
-
85172653912
-
-
June 24
-
M. Duigou. (2004, June 24). Project JXTA [Online]. Available: http://tools.ietf.org/html/draft-duigou-jxta-protocols-05
-
(2004)
Project JXTA [Online]
-
-
Duigou, M.1
-
4
-
-
85172628468
-
-
Project Kenai [Online]. Available: https://jxse.kenai.com/Tutorials/Tutorials.html
-
Project Kenai [Online]
-
-
-
6
-
-
85095970245
-
Experience with EMERALD to date
-
Santa Clara, California
-
P. Neumann and P. Porras, "Experience with EMERALD to date, " in 1st USENIX Workshop Intrusion Detection and Network Monitoring, Santa Clara, California, pp. 73-80, 1999.
-
(1999)
1st USENIX Workshop Intrusion Detection and Network Monitoring
, pp. 73-80
-
-
Neumann, P.1
Porras, P.2
-
9
-
-
84942253601
-
Coback: Coordinated supprebion of simultaneous attacks
-
Washington DC: April
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hubain, and R. Govindan, "Coback: Coordinated supprebion of simultaneous attacks, " in DARPA Information Survivability Conf. and Expo., vol. 1, pp. 2-13, Washington DC, April 2003.
-
(2003)
DARPA Information Survivability Conf. and Expo
, vol.1
, pp. 2-13
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hubain, A.4
Govindan, R.5
-
11
-
-
20844436808
-
Collaborative internet worm Containment
-
M. Cai, K. Hwang, Y. Kwok, S. Song, and Y. Chen. "Collaborative internet worm Containment, " IEEE Security & Privacy, vol. 3, no. 3, pp. 25-33, 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 25-33
-
-
Cai, M.1
Hwang, K.2
Kwok, Y.3
Song, S.4
Chen, Y.5
-
12
-
-
33750682313
-
When gobip is good: Distributed probabilistic inference for detection of slow network intrusions
-
Cambridge MA, London
-
D. Dash, B. Kveton, J. Agosta, E. Schooler, J. Chandrashekar, A. Bachrach, and A. Newman, "When gobip is good: Distributed probabilistic inference for detection of slow network intrusions, " in Proc. Nat. Conf. Artificial Intelligence, vol. 21, pp. 1115. Cambridge MA, London, 2006.
-
(2006)
Proc. Nat. Conf. Artificial Intelligence
, vol.21
, pp. 1115
-
-
Dash, D.1
Kveton, B.2
Agosta, J.3
Schooler, E.4
Chandrashekar, J.5
Bachrach, A.6
Newman, A.7
-
13
-
-
84951926833
-
Trust management for host-based collaborative intrusion detection
-
C. Fung, O. Baysal, J. Zhang, I. Aib, and R. Boutaba, "Trust management for host-based collaborative intrusion detection, " in 19th IFIP/IEEE Int. Workshop Distributed Systems, 2008.
-
(2008)
19th IFIP/IEEE Int. Workshop Distributed Systems
-
-
Fung, C.1
Baysal, O.2
Zhang, J.3
Aib, I.4
Boutaba, R.5
-
14
-
-
51349149626
-
Alpacas: A large-scale privacy-Aware collaborative anti-spam system
-
IEEE
-
Z. Zhong, L. Ramaswamy, and K. Li, "Alpacas: A large-scale privacy-Aware collaborative anti-spam system, " in INFOCOM 2008 27th Conf. Computer Communications IEEE, pp. 556-564, 2008.
-
INFOCOM 2008 27th Conf. Computer Communications
, vol.2008
, pp. 556-564
-
-
Zhong, Z.1
Ramaswamy, L.2
Li, K.3
-
15
-
-
0001833836
-
A framework for cooperative intrusion detection
-
D. Polla, J. McConnell, T. Johnson, J. Marconi, D. Tobin, and D. Frincke, "A framework for cooperative intrusion detection", in Proc. 21st Nat. Information Systems Security Conf., pp. 361-373, 1998.
-
(1998)
Proc. 21st Nat. Information Systems Security Conf
, pp. 361-373
-
-
Polla, D.1
McConnell, J.2
Johnson, T.3
Marconi, J.4
Tobin, D.5
Frincke, D.6
-
17
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
M. Locasto, J. Parekh, A. Keromytis, and S. Stolfo, "Towards collaborative security and P2P intrusion detection, " in Proc. 6th Ann. IEEE SMC, pp. 333-339, 2005.
-
(2005)
Proc. 6th Ann IEEE SMC
, pp. 333-339
-
-
Locasto, M.1
Parekh, J.2
Keromytis, A.3
Stolfo, S.4
-
19
-
-
34248379722
-
Towards scalable and robust distributed intrusion alert fusion with good load balancing
-
ACM New York, NY, USA
-
Z. Li, Y. Chen, and A. Beach, "Towards scalable and robust distributed intrusion alert fusion with good load balancing, " in Proc. 2006 SIGCOMM Workshop Large-scale Attack Defense, pp. 115-122, ACM New York, NY, USA, 2006.
-
(2006)
Proc. 2006 SIGCOMM Workshop Large-scale Attack Defense
, pp. 115-122
-
-
Li, Z.1
Chen, Y.2
Beach, A.3
-
20
-
-
0036917419
-
Early detection of internet worm activity by metering ICMP destination unreachable mebages
-
G. Bakos and V. Berk, "Early detection of internet worm activity by metering icmp destination unreachable mebages, " in Proc. SPIE Aerosense, 2002.
-
(2002)
Proc. SPIE Aerosense
-
-
Bakos, G.1
Berk, V.2
-
23
-
-
0036079912
-
Alert correlation in a cooperative intrusion detection framework
-
F. Cuppens and A. Miege, "Alert correlation in a cooperative intrusion detection framework, " in 2002 IEEE Symp. Security and Privacy, pp. 202-215, 2002
-
(2002)
2002 IEEE Symp. Security and Privacy
, pp. 202-215
-
-
Cuppens, F.1
Miege, A.2
-
25
-
-
71749083441
-
Collaborative detection of fastflux phishing domains
-
February
-
C. V. Zhou, C. Leckie and S. Karunasekera, "Collaborative detection of fastflux phishing domains, " Journal of Networks, vol. 4, pp. 75-84, February 2009.
-
(2009)
Journal of Networks
, vol.4
, pp. 75-84
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
26
-
-
78249256060
-
Community epidemic detection using time-correlated anomalies
-
Springer-Verlag Berlin, Heidelberg
-
A. Oliner, A. Kulkarni, and A. Aiken, "Community Epidemic Detection Using Time-Correlated Anomalies, " in Proc. 13th Int. Conf. Recent Advances in Intrusion Detection, Springer-Verlag Berlin, Heidelberg, 2010
-
(2010)
Proc. 13th Int. Conf. Recent Advances in Intrusion Detection
-
-
Oliner, A.1
Kulkarni, A.2
Aiken, A.3
-
28
-
-
85084164413
-
Bro: A system for detecting network intruders in real time
-
V. Paxson, "BRO: A System for Detecting Network Intruders in Real Time, " in Proc. 7th USENIX Security Symp., 1998.
-
(1998)
Proc. 7th USENIX Security Symp
-
-
Paxson, V.1
-
29
-
-
27544510809
-
Shield: Vulnerability-driven network filter for preventing known vulnerability exploits
-
H. Wang, C. Guo, D. Simon, and A. Zugenmaier, "Shield: Vulnerability-Driven Network Filter for Preventing Known Vulnerability Exploits, " in Proc. ACM SIGCOMM Conf., 2004
-
(2004)
Proc. ACM SIGCOMM Conf
-
-
Wang, H.1
Guo, C.2
Simon, D.3
Zugenmaier, A.4
-
30
-
-
33646048960
-
Honeycomb-creating intrusion detection signatures using honeypots
-
Boston, MA
-
C. Kreibich and J. Crowcroft, "Honeycomb-Creating Intrusion Detection Signatures Using Honeypots, " in ACM Workshop Hot Topics in Networks, Boston, MA, 2003.
-
(2003)
ACM Workshop Hot Topics in Networks
-
-
Kreibich, C.1
Crowcroft, J.2
-
31
-
-
30344438592
-
Anomalous payload-based network intrusion detection
-
K. Wang and S. Stolfo, "Anomalous payload-based network intrusion detection, " in Proc. RAID'2004, 2004.
-
(2004)
Proc. RAID'2004
-
-
Wang, K.1
Stolfo, S.2
-
32
-
-
85084163246
-
Autograph: Toward automated distributed worm distribution
-
K. Kim and B. Karp, "Autograph: Toward Automated Distributed Worm Distribution, " in Proc. USENIX Security Symp., 2004.
-
(2004)
Proc. USENIX Security Symp
-
-
Kim, K.1
Karp, B.2
-
33
-
-
27544498978
-
Polygraph: Automatically generating signatures for polymorphic worms
-
Oakland, CA
-
J. Newsome, B. Karp, and D. Song, "Polygraph: Automatically Generating Signatures for Polymorphic Worms, " in 2005 IEEE Symp. Security and Privacy, Oakland, CA, 2005.
-
(2005)
2005 IEEE Symp. Security and Privacy
-
-
Newsome, J.1
Karp, B.2
Song, D.3
-
34
-
-
33751064824
-
Hamsa: Fast signature generation for zero-day polymorphic worms with provable attack resistance
-
Oakland, CA
-
Z. Li, M. Sanghi, Y. Chen, M. Kao, and B. Chavez, "Hamsa: Fast Signature Generation for Zero-day Polymorphic Worms with Provable Attack Resistance, " in 2006 IEEE Symp. Security and Privacy, Oakland, CA, 2006.
-
(2006)
2006 IEEE Symp. Security and Privacy
-
-
Li, Z.1
Sanghi, M.2
Chen, Y.3
Kao, M.4
Chavez, B.5
-
35
-
-
84991765629
-
Automated worm fingerprinting
-
S. Singh, C. Estan, G. Varghese, and S. Savage, "Automated Worm Fingerprinting, " in 6th Symp. Operating Systems Design and Implementation, 2004.
-
(2004)
6th Symp. Operating Systems Design and Implementation
-
-
Singh, S.1
Estan, C.2
Varghese, G.3
Savage, S.4
-
37
-
-
30144435491
-
Peer-To-peer acceb control architecture using trusted computing technology
-
Stockholm, Sweden
-
R. Sandhu and Z. Xinwen, "Peer-To-Peer Acceb Control Architecture Using Trusted Computing Technology, " in Proc. SACMAT05, Stockholm, Sweden, 2005
-
(2005)
Proc. SACMAT05
-
-
Sandhu, R.1
Xinwen, Z.2
-
39
-
-
33646386296
-
Modeling and analyzing interaction between worm and antiworm in network worm spread
-
Y. Feng, D. Haixin, L. Xing, "Modeling and analyzing interaction between worm and antiworm in network worm spread, " Science in China Series E, vol. 34, no. 8, pp 841-856, 2004
-
(2004)
Science in China Series e
, vol.34
, Issue.8
, pp. 841-856
-
-
Feng, Y.1
Haixin, D.2
Xing, L.3
-
40
-
-
33646065329
-
A first look at peer-To-peer worms: Threats and defense
-
Workshop, NY, USA
-
L. Zhou, L. Zhang, F. McSherry, N. Immorlica, M. Costa, and S. Chien, "A first look at Peer-To-Peer Worms: Threats and Defense, " in Proc. Peer-To-Peer Systems 4th Int. Workshop, NY, USA, pp. 24-35, 2005
-
(2005)
Proc. Peer-To-Peer Systems 4th Int.
, pp. 24-35
-
-
Zhou, L.1
Zhang, L.2
McSherry, F.3
Immorlica, N.4
Costa, M.5
Chien, S.6
-
41
-
-
85172627058
-
Containing worm based on immune-group in scale-free P2P
-
Huhhot, China
-
F. Jianming, H. Zhiyi, C. Binglan, and C. Jingsong, "Containing Worm Based on Immune-group in Scale-free P2P, " in Proc. 1st Int. Conf. Complex Systems and Applications, Huhhot, China, pp. 945-949, 2006
-
(2006)
Proc. 1st Int. Conf. Complex Systems and Applications
, pp. 945-949
-
-
Jianming, F.1
Zhiyi, H.2
Binglan, C.3
Jingsong, C.4
|