-
1
-
-
0034721164
-
The Internet’s Achilles’ heel: Error and attack tolerance of complex networks
-
R. Albert, H. Jeong., and A-L. Barabási, “The Internet’s Achilles’ heel: error and attack tolerance of complex networks,” Nature 406 378, 2000.
-
(2000)
Nature
, vol.406
, pp. 378
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
2
-
-
0003964874
-
-
Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May
-
D. Anderson, T. Frivold, and A. Valdes, “Next-generation intrusion detection expert system (NIDES): A summary,” Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California, May 1995.
-
(1995)
Next-Generation Intrusion Detection Expert System (NIDES): A Summary
-
-
Anderson, D.1
Frivold, T.2
Valdes, A.3
-
4
-
-
0004194675
-
-
Internet Draft: draft-bellovin-itrace- 00.txt, March
-
S.M. Bellovin, “ICMP Traceback Message,” Internet Draft: draft-bellovin-itrace- 00.txt, March 2000.
-
(2000)
ICMP Traceback Message
-
-
Bellovin, S.M.1
-
7
-
-
85055938489
-
-
CERT Advisory CA-2003-04 MS-SQL Serve Worm, January
-
CERT, “CERT Advisory CA-2003-04 MS-SQL Serve Worm,” http://www.cert.org/advisories/CA-2003-04.html, January 2003.
-
(2003)
-
-
-
8
-
-
85055948710
-
-
Cisco netflow, http://www.cisco.com/en/u/products/ps6601/products_ios_protocol_group_home.html.
-
-
-
-
9
-
-
34250211085
-
-
February
-
CNN. “Cyber-attacks batter web heavyweights,” http://archives.cnn.com/2000/TECH/computing/02/09/cyber.attacks.01/, February 2000.
-
(2000)
Cyber-Attacks Batter Web Heavyweights
-
-
-
10
-
-
4544346801
-
-
February
-
CNN. “Immense network assault takes down yahoo,” http://archives.cnn.com/2000/TECH/computing/02/08/yahoo.assault.idg/, February 2000.
-
(2000)
Immense Network Assault Takes down Yahoo
-
-
-
13
-
-
85055954922
-
-
IDIOT — Users Guide, Technical Report TR-96-050, Purdue University, COAST Laboratory, September
-
M. Crosbie, B. Dole, T. Ellis, I. Krsul, and E. Spafford, IDIOT — Users Guide, Technical Report TR-96-050, Purdue University, COAST Laboratory, September 1996.
-
(1996)
-
-
Crosbie, M.1
Dole, B.2
Ellis, T.3
Krsul, I.4
Spafford, E.5
-
14
-
-
85055937746
-
-
DARPA KDD99
-
DARPA KDD99, http://kdd.ics.uci.edu/databases/kddcup/task.html, 2005.
-
(2005)
-
-
-
22
-
-
4544270125
-
Impact Analysis of Faults and Attacks in Large-Scale Networks
-
September/October
-
S. Hariri, G. Qu, T. Dharmagadda, and R. Modukuri, “Impact Analysis of Faults and Attacks in Large-Scale Networks,” IEEE Security and Privacy, September/October 2003 Vol. 1, No. 5.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.5
-
-
Hariri, S.1
Qu, G.2
Dharmagadda, T.3
Modukuri, R.4
-
23
-
-
0027593257
-
Nadir: An automated system for detecting network intrusion and misuse
-
J. Hochberg, et al., Nadir: An automated system for detecting network intrusion and misuse. Computers & Security, 12(23.3):235-248, 1993.
-
(1993)
Computers & Security
, vol.12
, Issue.23
, pp. 235-248
-
-
Hochberg, J.1
-
25
-
-
0029267472
-
State Transition Analysis: A Rule- Based Intrusion Detection Approach
-
K. Ilgun, A. R. Kemmerer, A. P. Porras, “State Transition Analysis: A Rule- Based Intrusion Detection Approach,” IEEE Transactions on Software Engineering, 21(23.3), 1995.
-
(1995)
IEEE Transactions on Software Engineering
, vol.21
, Issue.23
-
-
Ilgun, K.1
Kemmerer, A.R.2
Porras, A.P.3
-
26
-
-
85180745018
-
Implementing Pushback: Router-Based Defense Against DDoS Attacks
-
San Diego, CA, February
-
J. Ioannidis and S.M. Bellovin, “Implementing Pushback: Router-Based Defense Against DDoS Attacks,” Proceedings of NDSS’2002, San Diego, CA, February 2002.
-
(2002)
Proceedings of NDSS’2002
-
-
Ioannidis, J.1
Bellovin, S.M.2
-
27
-
-
0035359901
-
Automatic feature extraction of waveform signals for in-process diagnostic performance improvement
-
J. Jin and J. Shi, “Automatic feature extraction of waveform signals for in-process diagnostic performance improvement,” Journal of Intelligent Manufacturing 12, 257–268, 2001.
-
(2001)
Journal of Intelligent Manufacturing
, vol.12
, pp. 257-268
-
-
Jin, J.1
Shi, J.2
-
28
-
-
0037002475
-
Intrusion Detection: A Brief History and Overview
-
R. Kemmerer and G. Vigna. “Intrusion Detection: A Brief History and Overview,” IEEE Computer 27–30, 2002.
-
(2002)
IEEE Computer
, pp. 27-30
-
-
Kemmerer, R.1
Vigna, G.2
-
33
-
-
85055949531
-
-
A real time Intrusion Detection Expert System (IDES) — Final Report, SRI International, Menlo Park, CA, February
-
T. Lunt, A. Tamaru, F. Gilham, R. Jagannathan, C. Jalali, P. G. Neumann, H. S. Javitz, A. Valdes, T.D. Garvey, A real time Intrusion Detection Expert System (IDES) — Final Report, SRI International, Menlo Park, CA, February 1992.
-
(1992)
-
-
Lunt, T.1
Tamaru, A.2
Gilham, F.3
Jagannathan, R.4
Jalali, C.5
Neumann, P.G.6
Javitz, H.S.7
Valdes, A.8
Garvey, T.D.9
-
35
-
-
85055919393
-
-
Slammer worm
-
Matrix, “Slammer worm.” Retrieved April 20, 2003, from http://www.matrixnetsystems.com/ea/2003/20030130.jsp.
-
(2003)
-
-
-
36
-
-
0002096383
-
A Recent Advance in Data Analysis: Clustering Objects into Classes Characterized by Conjunctive Concepts
-
Laveen N. Kanal and Azriel Rosenfeld (Eds.). New York: North-Holland
-
R.S. Michalski, R. E. Stepp, and E. Diday, “A Recent Advance in Data Analysis: Clustering Objects into Classes Characterized by Conjunctive Concepts,” Progress in Pattern Recognition, Vol. 1, Laveen N. Kanal and Azriel Rosenfeld (Eds.). New York: North-Holland, pp. 33–56, 1981.
-
(1981)
Progress in Pattern Recognition
, vol.1
, pp. 33-56
-
-
Michalski, R.S.1
Stepp, R.E.2
Diday, E.3
-
37
-
-
84904888755
-
Attacking DDoS at the Source
-
Paris, France
-
J. Mirkovic, G. Prier, and P. Reiher, “Attacking DDoS at the Source,” Proceedings of 10th IEEE International Conference on Network Protocol (ICNP2002), 312–321, Paris, France, 2002.
-
(2002)
Proceedings of 10Th IEEE International Conference on Network Protocol (ICNP2002)
, pp. 312-321
-
-
Mirkovic, J.1
Prier, G.2
Reiher, P.3
-
41
-
-
85055924016
-
-
Committee on the Internet under Crisis Conditions: Learning from the Impact of September 11,” The National Academies Press
-
National Research Council, “Committee on the Internet under Crisis Conditions: Learning from the Impact of September 11,” The National Academies Press, 2003. Retrieved from http://www.nap.edu/books/0309087023/html/.
-
(2003)
-
-
-
42
-
-
84942253601
-
COSSACK: Coordinated Suppression of Simultaneous Attacks
-
Washington, D.C
-
C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, “COSSACK: Coordinated Suppression of Simultaneous Attacks,” Proceedings of DARPA Information Survivability Conference and Exposition, Washington, D.C., 2003.
-
(2003)
Proceedings of DARPA Information Survivability Conference and Exposition
-
-
Papadopoulos, C.1
Lindell, R.2
Mehringer, J.3
Hussain, A.4
Govindan, R.5
-
43
-
-
85055948885
-
-
A Report on Internet Worm
-
B. Page, “A Report on Internet Worm,” http://www.ee.ryerson.ca/∼elf/hack/iworm.html.
-
-
-
Page, B.1
-
44
-
-
0034776786
-
On the Effectiveness of Route-Based Packet Filtering for DDoS Attack Prevention in Power-Low Internets
-
San Diego, CA, August, ACM
-
K. Park and H. Lee. “On the Effectiveness of Route-Based Packet Filtering for DDoS Attack Prevention in Power-Low Internets.” In Proceedings of the ACM SIGCOMM, pages 15–26, San Diego, CA, August 2001. ACM.
-
(2001)
Proceedings of the ACM SIGCOMM
, pp. 15-26
-
-
Park, K.1
Lee, H.2
-
46
-
-
0003375670
-
An analysis of using reflectors for distributed denial-of-service attacks
-
July
-
V. Paxson. “An analysis of using reflectors for distributed denial-of-service attacks,” Computer Communication Review 31(23.3), July 2001.
-
(2001)
Computer Communication Review
, vol.31
, Issue.23
-
-
Paxson, V.1
-
47
-
-
0002989559
-
End-to-End Internet Packet Dynamics
-
September
-
V. Paxson, “End-to-End Internet Packet Dynamics,” Proc., SIGCOMM’97, September 1997.
-
(1997)
Proc., SIGCOMM’97
-
-
Paxson, V.1
-
50
-
-
4544337929
-
Online Monitoring and Analysis for Self Protection against Network attacks
-
ICAC, New York, NY
-
G. Qu, S. Hariri, et al., “Online Monitoring and Analysis for Self Protection against Network attacks,” International Conference on Autonomic Computing (ICAC 2004), New York, NY.
-
(2004)
International Conference on Autonomic Computing
-
-
Qu, G.1
Hariri, S.2
-
51
-
-
85055957403
-
Multivariate Statistical Online Analysis for Self Protection against Network Attacks
-
G. Qu, S. Hariri, X. Zhu, J. Jin, and Y. Mazin, “Multivariate Statistical Online Analysis for Self Protection against Network Attacks,” AICSSA’05.
-
AICSSA’05
-
-
Qu, G.1
Hariri, S.2
Zhu, X.3
Jin, J.4
Mazin, Y.5
-
52
-
-
27644496932
-
A New Dependency and Correlation Analysis for Features
-
Special Issue on Intelligent Data Preparation, September
-
G. Qu, S. Hariri, and Y. Mazin, “A New Dependency and Correlation Analysis for Features,” IEEE Transactions on Knowledge and Data Engineering, Special Issue on Intelligent Data Preparation, September, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
-
-
Qu, G.1
Hariri, S.2
Mazin, Y.3
-
53
-
-
85055923862
-
-
Report to the President’s Commission on Critical Infrastructure Protection
-
Threat and Vulnerability Model for Information Security. Report to the President’s Commission on Critical Infrastructure Protection 1997.
-
(1997)
-
-
-
54
-
-
0005720914
-
Misuse detection tools
-
Spring
-
S.E. Smaha and J. Winslow, “Misuse detection tools,” Computer Security Journal 10, 1, Spring, 1994, pp. 39–49.
-
(1994)
Computer Security Journal
, vol.10
, Issue.1
, pp. 39-49
-
-
Smaha, S.E.1
Winslow, J.2
-
55
-
-
0001647024
-
Practical Network Support for IP Traceback
-
August
-
S. Savage, D. Wetherall, A. Karlin, T. Anderson, “Practical Network Support for IP Traceback,” In Proceedings of ACM SIGCOMM’2000, August, 2000.
-
(2000)
Proceedings of ACM SIGCOMM’2000
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
57
-
-
0001887844
-
Hash-Based IP Traceback
-
March 2001
-
A.C. Snoren, C. Partridge, L.A. Sanchez, C.E. Jones, F. Tchakountio, S.T. Kent and W.T. Strayer, “Hash-Based IP Traceback,” Proceedings of ACM SIGCOMM’ 2001, March 2001.
-
(2001)
Proceedings of ACM SIGCOMM’ 2001
-
-
Snoren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
-
58
-
-
0034997397
-
Advanced and Authenticated Marking Schemes for IP Traceback
-
March
-
D. Song and A. Perrig, “Advanced and Authenticated Marking Schemes for IP Traceback,” In Proceedings of ACM SIGCOMM’2001, March 2001.
-
(2001)
Proceedings of ACM SIGCOMM’2001
-
-
Song, D.1
Perrig, A.2
-
60
-
-
0003507850
-
-
2nd edition, Upper Saddle River: Prentice-Hall
-
W. Stallings, “Network Security Essentials” 2nd edition, Upper Saddle River: Prentice-Hall, 2003.
-
(2003)
Network Security Essentials
-
-
Stallings, W.1
-
61
-
-
85084163540
-
CenterTrack: An IP Overlay Network for Tracking DoS Floods
-
Denver, Colorado, August
-
R. Stone, “CenterTrack: An IP Overlay Network for Tracking DoS Floods,” Proceedings of 9th USENIX Security Symposium, Denver, Colorado, August 2000.
-
(2000)
Proceedings of 9Th USENIX Security Symposium
-
-
Stone, R.1
-
62
-
-
85055923490
-
-
Sandia National Laboratories. F. Tsung and J. Shi, (1999), “Integration of Run-to-Run PID Controller and SPC for Process Disturbance Rejection,” IIE Transactions
-
L.P. Swiler, C. Phillips, and T. Gaylor, (1998), “A Graph-Based Network- Vulnerability Analysis System.” Sandia National Laboratories. F. Tsung and J. Shi, (1999), “Integration of Run-to-Run PID Controller and SPC for Process Disturbance Rejection,” IIE Transactions, Vol. 31, pp. 517–527.
-
(1998)
A Graph-Based Network- Vulnerability Analysis System
, vol.31
, pp. 517-527
-
-
Swiler, L.P.1
Phillips, C.2
Gaylor, T.3
-
63
-
-
85055930511
-
-
INBOUNDS: The Integrated Network-Based Ohio University Network Detective Service
-
B. Tjaden, et al, (2004) INBOUNDS: The Integrated Network-Based Ohio University Network Detective Service, retrieved from http://www.mts.jhu.edu/∼marchette/ID04/Papers/SCI2000.pdf
-
(2004)
-
-
Tjaden, B.1
-
64
-
-
85055918860
-
-
Retrieved on April
-
“DoS Attack,” Retrieved on April, 2004 from http://www.webopedia.com/TERM/D/DoS_attack.html.
-
(2004)
-
-
-
65
-
-
0038404196
-
Defending Against Distributed Denial-of-Service Attacks with Max-min Fair Server-centric Router Throttles
-
Miami Beach, FL, May
-
D. Yau, J. Liu, and F. Liang, “Defending Against Distributed Denial-of-Service Attacks with Max-min Fair Server-centric Router Throttles,” Proceedings of IWQoS’2002, Miami Beach, FL, May 2002.
-
(2002)
Proceedings of IWQoS’2002
-
-
Yau, D.1
Liu, J.2
Liang, F.3
-
67
-
-
0035271352
-
An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems
-
N. Ye and Q. Chen, “An Anomaly Detection Technique Based on a Chi-Square Statistic for Detecting Intrusions into Information Systems,” Quality and Reliability Engineering Journal, vol. 17, p. 105–112, 2001.
-
(2001)
Quality and Reliability Engineering Journal
, vol.17
, pp. 105-112
-
-
Ye, N.1
Chen, Q.2
|