-
1
-
-
84983319251
-
Microsoft vulnerabilities study: Mitigating risk by removing user privileges
-
Microsoft vulnerabilities study: Mitigating risk by removing user privileges," in Avetco whitepaper, 2013
-
(2013)
Avetco Whitepaper
-
-
-
3
-
-
84983321326
-
-
April
-
"Open vswitch manual," http://openvswitch.org/support/dist-docs/ovsbenchmark. 1.txt, April 2015
-
(2015)
-
-
-
6
-
-
33745211604
-
Live forensics: Diagnosing your system without killing it first
-
F. Adelstein, "Live forensics: diagnosing your system without killing it first," Communications of the ACM, vol. 49, no. 2, pp. 63-66, 2006
-
(2006)
Communications of the ACM
, vol.49
, Issue.2
, pp. 63-66
-
-
Adelstein, F.1
-
7
-
-
0002738343
-
Security problems in the TCP/ip protocol suite
-
S. M. Bellovin, "Security problems in the tcp/ip protocol suite," ACM SIGCOMM Computer Communication Review, vol. 19, no. 2, pp. 32-48, 1989
-
(1989)
ACM SIGCOMM Computer Communication Review
, vol.19
, Issue.2
, pp. 32-48
-
-
Bellovin, S.M.1
-
8
-
-
78549259165
-
On the analysis of the zeus botnet crimeware toolkit
-
H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang, "On the analysis of the zeus botnet crimeware toolkit," in Privacy Security and Trust (PST), 2010 Eighth Annual International Conference on. IEEE, 2010, pp. 31-38
-
(2010)
Privacy Security and Trust (PST), 2010 Eighth Annual International Conference On. IEEE
, pp. 31-38
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
9
-
-
36949033604
-
Ethane: Taking control of the enterprise
-
Aug
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, "Ethane: Taking control of the enterprise," SIGCOMM Comput. Commun. Rev., vol. 37, no. 4, pp. 1-12, Aug. 2007. [Online]. Available: http://doi.acm.org/10.1145/1282427.1282382
-
(2007)
SIGCOMM Comput. Commun. Rev
, vol.37
, Issue.4
, pp. 1-12
-
-
Casado, M.1
Freedman, M.J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
10
-
-
33846286141
-
Design and implementation of an extrusion-based break-in detector for personal computers
-
W. Cui, R. H. Katz, and W.-t. Tan, "Design and implementation of an extrusion-based break-in detector for personal computers," in Computer Security Applications Conference, 21st Annual. IEEE, 2005, pp. 10-pp
-
(2005)
Computer Security Applications Conference, 21st Annual. IEEE
, pp. 10
-
-
Cui, W.1
Katz, R.H.2
Tan, W.-T.3
-
11
-
-
80053141664
-
Devoflow: Scaling flow management for high-performance networks
-
ser. SIGCOMM '11. New York, NY, USA: ACM
-
A. R. Curtis, J. C. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, and S. Banerjee, "Devoflow: Scaling flow management for high-performance networks," in Proceedings of the ACM SIGCOMM 2011 Conference, ser. SIGCOMM '11. New York, NY, USA: ACM, 2011, pp. 254-265. [Online]. Available: http://doi.acm.org/10.1145/2018436.2018466
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference
, pp. 254-265
-
-
Curtis, A.R.1
Mogul, J.C.2
Tourrilhes, J.3
Yalagandula, P.4
Sharma, P.5
Banerjee, S.6
-
12
-
-
84920906633
-
Ettm: A scalable fault tolerant network manager
-
ser. NSDI'11. Berkeley, CA, USA: USENIX Association
-
C. Dixon, H. Uppal, V. Brajkovic, D. Brandon, T. Anderson, and A. Krishnamurthy, "Ettm: A scalable fault tolerant network manager," in Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation, ser. NSDI'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 85-98
-
(2011)
Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation
, pp. 85-98
-
-
Dixon, C.1
Uppal, H.2
Brajkovic, V.3
Brandon, D.4
Anderson, T.5
Krishnamurthy, A.6
-
14
-
-
85126494045
-
Bridging the host-network divide: Survey, taxonomy, and solution
-
ser. LISA '06. Berkeley, CA, USA: USENIX Association
-
G. A. Fink, V. Duggirala, R. Correa, and C. North, "Bridging the host-network divide: Survey, taxonomy, and solution," in Proceedings of the 20th Conference on Large Installation System Administration, ser. LISA '06. Berkeley, CA, USA: USENIX Association, 2006, pp. 20-20. [Online]. Available: http://dl.acm.org/citation.cfm?id=1267793.1267813
-
(2006)
Proceedings of the 20th Conference on Large Installation System Administration
, pp. 20
-
-
Fink, G.A.1
Duggirala, V.2
Correa, R.3
North, C.4
-
15
-
-
77953296690
-
More netflow tools for performance and security
-
ser. LISA '04. Berkeley, CA, USA: USENIX Association
-
C. Gates, M. Collins, M. Duggan, A. Kompanek, and M. Thomas, "More netflow tools for performance and security," in Proceedings of the 18th USENIX Conference on System Administration, ser. LISA '04. Berkeley, CA, USA: USENIX Association, 2004, pp. 121-132. [Online]. Available: http://dl.acm.org/citation.cfm?id=1052676.1052691
-
(2004)
Proceedings of the 18th USENIX Conference on System Administration
, pp. 121-132
-
-
Gates, C.1
Collins, M.2
Duggan, M.3
Kompanek, A.4
Thomas, M.5
-
16
-
-
84983235959
-
Technology investigation of openflow and testing
-
July
-
GEANT, "Technology investigation of openflow and testing," GEANT Whitepaper DJ1-2.1. [Online] http://geant3.archive.geant.net/ Media Centre/Media Library/Media%20Library/GN3-13-003 DJ1-2-1 Technology-Investigation-of-OpenFlow-and-Testing.pdf, July 2013
-
(2013)
GEANT Whitepaper DJ1-2.1
-
-
-
18
-
-
77954330731
-
-
T. Hinrichs, N. Gude, M. Casado, J. Mitchell, and S. Shenker, "Expressing and enforcing flow-based network security policies," 2008
-
(2008)
Expressing and Enforcing Flow-based Network Security Policies
-
-
Hinrichs, T.1
Gude, N.2
Casado, M.3
Mitchell, J.4
Shenker, S.5
-
19
-
-
77954334002
-
Practical declarative network management
-
ser. WREN '09. New York, NY, USA: ACM
-
T. L. Hinrichs, N. S. Gude, M. Casado, J. C. Mitchell, and S. Shenker, "Practical declarative network management," in Proceedings of the 1st ACM Workshop on Research on Enterprise Networking, ser. WREN '09. New York, NY, USA: ACM, 2009. [Online]. Available: http://doi.acm.org/10.1145/1592681.1592683
-
(2009)
Proceedings of the 1st ACM Workshop on Research on Enterprise Networking
-
-
Hinrichs, T.L.1
Gude, N.S.2
Casado, M.3
Mitchell, J.C.4
Shenker, S.5
-
20
-
-
84983282979
-
-
IBM Data Sheet July
-
IBM Corporation, "Ibm system networking RackSwitch G8264," IBM Data Sheet [Online] http://www-01.ibm.com/common/ssi/cgibin/ ssialias?subtype=SPandinfotype=PMandappname=STGE QC QC USENandhtmlfid=QCD03020USENandattachment=QCD03020USEN. PDF#loaded, July 2014
-
(2014)
IBM System Networking RackSwitch G8264
-
-
-
21
-
-
4444325873
-
Identification protocol
-
February
-
M. S. Johns, "Identification protocol," IETF RFC 1413, February 1993
-
(1993)
IETF RFC 1413
-
-
Johns, M.S.1
-
22
-
-
84958538905
-
What you need to know about SDN flow tables
-
M. Kuzniar, P. Peresini, and D. Kostic, "What you need to know about sdn flow tables," in Lecture Notes in Computer Science (LNCS), no. EPFL-CONF-204742, 2015
-
(2015)
Lecture Notes in Computer Science (LNCS), No. EPFL-CONF-204742
-
-
Kuzniar, M.1
Peresini, P.2
Kostic, D.3
-
24
-
-
84920392933
-
Tango: Simplifying SDN control with automatic switch property inference, abstraction, and optimization
-
A. Lazaris, D. Tahara, X. Huang, E. Li, A. Voellmy, Y. R. Yang, and M. Yu, "Tango: Simplifying SDN control with automatic switch property inference, abstraction, and optimization," in ACM International on Con-ference on Emerging Networking Experiments and Technologiesmerging Networking Experiments and Technologies. ACM, 2014, pp. 199-212
-
(2014)
ACM International on Con-ference on Emerging Networking Experiments and Technologiesmerging Networking Experiments and Technologies. ACM
, pp. 199-212
-
-
Lazaris, A.1
Tahara, D.2
Huang, X.3
Li, E.4
Voellmy, A.5
Yang, Y.R.6
Yu, M.7
-
25
-
-
84968792791
-
-
C. Low, "Icmp attacks illustrated," SANS Institute URL: http://rr. sans. org/threats/ICMP attacks. php (12/11/2001), 2001
-
(2001)
ICMP Attacks Illustrated
-
-
Low, C.1
-
26
-
-
78650002259
-
Blade: An attack-agnostic approach for preventing drive-by malware infections
-
L. Lu, V. Yegneswaran, P. Porras, and W. Lee, "Blade: an attack-agnostic approach for preventing drive-by malware infections," in Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010, pp. 440-450
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security. ACM
, pp. 440-450
-
-
Lu, L.1
Yegneswaran, V.2
Porras, P.3
Lee, W.4
-
27
-
-
84983314272
-
Openflow: Enabling innovation in campus networks
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, "Openflow: Enabling innovation in campus networks," ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69-74, 2008
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.2
, pp. 69-74
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
31
-
-
84927741456
-
Virtualized security at the network edge: A user-centric approach
-
April
-
D. Montero, M. Yannuzzi, A. Shaw, L. Jacquin, A. Pastor, R. Serral-Gracia, A. Lioy, F. Risso, C. Basile, R. Sassu, M. Nemirovsky, F. Ciaccia, M. Georgiades, S. Charalambides, J. Kuusijarvi, and F. Bosco, "Virtualized security at the network edge: a user-centric approach," Communications Magazine, IEEE, vol. 53, no. 4, pp. 176-186, April 2015
-
(2015)
Communications Magazine, IEEE
, vol.53
, Issue.4
, pp. 176-186
-
-
Montero, D.1
Yannuzzi, M.2
Shaw, A.3
Jacquin, L.4
Pastor, A.5
Serral-Gracia, R.6
Lioy, A.7
Risso, F.8
Basile, C.9
Sassu, R.10
Nemirovsky, M.11
Ciaccia, F.12
Georgiades, M.13
Charalambides, S.14
Kuusijarvi, J.15
Bosco, F.16
-
32
-
-
77954334703
-
Delegating network security with more information
-
J. Naous, R. Stutsman, D. Mazieres, N. McKeown, and N. Zeldovich, "Delegating network security with more information," in Proceedings of the 1st ACM workshop on Research on enterprise networking. ACM, 2009, pp. 19-26
-
(2009)
Proceedings of the 1st ACM Workshop on Research on Enterprise Networking. ACM
, pp. 19-26
-
-
Naous, J.1
Stutsman, R.2
Mazieres, D.3
McKeown, N.4
Zeldovich, N.5
-
34
-
-
84869463993
-
Using trustworthy host-based information in the network
-
ser. STC '12. New York, NY, USA: ACM
-
B. Parno, Z. Zhou, and A. Perrig, "Using trustworthy host-based information in the network," in Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, ser. STC '12. New York, NY, USA: ACM, 2012, pp. 33-44
-
(2012)
Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing
, pp. 33-44
-
-
Parno, B.1
Zhou, Z.2
Perrig, A.3
-
36
-
-
84893626159
-
SDN security: A survey
-
Nov
-
S. Scott-Hayward, G. O'Callaghan, and S. Sezer, "Sdn security: A survey," in Future Networks and Services (SDN4FNS), 2013 IEEE SDN for, Nov 2013, pp. 1-7
-
(2013)
Future Networks and Services (SDN4FNS), 2013 IEEE SDN for
, pp. 1-7
-
-
Scott-Hayward, S.1
O'Callaghan, G.2
Sezer, S.3
-
37
-
-
84888111404
-
Hyperflow: A distributed control plane for openflow
-
ser. INM/WREN'10. Berkeley, CA, USA: USENIX Association
-
A. Tootoonchian and Y. Ganjali, "Hyperflow: A distributed control plane for openflow," in Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking, ser. INM/WREN'10. Berkeley, CA, USA: USENIX Association, 2010, pp. 3-3. [Online]. Available: http://dl.acm.org/citation.cfm?id=1863133.1863136
-
(2010)
Proceedings of the 2010 Internet Network Management Conference on Research on Enterprise Networking
, pp. 3
-
-
Tootoonchian, A.1
Ganjali, Y.2
-
38
-
-
84983323412
-
Guidelines on securing public web servers
-
September
-
M. Tracy, W. Jansen, K. Scarfone, and T. Winogard, "Guidelines on securing public web servers," NIST Special Publication 800-44, Version 2, p. 142, September 2007
-
(2007)
NIST Special Publication 800-44, Version 2
, pp. 142
-
-
Tracy, M.1
Jansen, W.2
Scarfone, K.3
Winogard, T.4
-
39
-
-
84959493580
-
-
Twisted Framework Developers, "Python twisted framework," https:// twistedmatrix.com
-
Python Twisted Framework
-
-
-
40
-
-
84920454240
-
Scotch: Elastically scaling up SDN control-plane using vswitch based overlay
-
A. Wang, Y. Guo, F. Hao, T. Lakshman, and S. Chen, "Scotch: Elastically scaling up SDN control-plane using vswitch based overlay," in ACM International on Conference on Emerging Networking Experiments and Technologies. ACM, 2014, pp. 403-414
-
(2014)
ACM International on Conference on Emerging Networking Experiments and Technologies. ACM
, pp. 403-414
-
-
Wang, A.1
Guo, Y.2
Hao, F.3
Lakshman, T.4
Chen, S.5
-
41
-
-
84864242247
-
User intentionbased traffic dependence analysis for anomaly detection
-
H. Zhang, W. Banick, D. Yao, and N. Ramakrishnan, "User intentionbased traffic dependence analysis for anomaly detection," in Security and Privacy Workshops (SPW), 2012 IEEE Symposium on. IEEE, 2012, pp. 104-112
-
(2012)
Security and Privacy Workshops (SPW), 2012 IEEE Symposium On. IEEE
, pp. 104-112
-
-
Zhang, H.1
Banick, W.2
Yao, D.3
Ramakrishnan, N.4
|