-
4
-
-
0009016272
-
An evening with Berferd in which a cracker is lured, endured, and studied
-
January 20 January 24, San Francisco, California, pages Berkeley, CA, USA, Winter 1992
-
B. Cheswick. An evening with Berferd in which a cracker is lured, endured, and studied. In Proceedings of the Winter 1992 USENIX Conference: January 20 - January 24, 1992, San Francisco, California, pages 163-174, Berkeley, CA, USA, Winter 1992.
-
(1992)
Proceedings of the Winter 1992 USENIX Conference
, pp. 163-174
-
-
Cheswick, B.1
-
7
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
ACM Press, October
-
E. Cooke, M. Bailey, Z. M. Mao, D. Watson, and F. Jahanian. Toward understanding distributed blackhole placement. In Proc of ACM CCS Workshop on Rapid Malcode, pages 54-64. ACM Press, October 2004.
-
(2004)
Proc of ACM CCS Workshop on Rapid Malcode
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Mao, Z. M.3
Watson, D.4
Jahanian, F.5
-
9
-
-
0029716418
-
A sense of self for Unix processes
-
Oakland, CA, May
-
S. Forrest, S. A. Hofmeyr, A. Somayaji, and T. A. Longstaff. A sense of self for Unix processes. In Proceedings of the IEEE Symposium on Research in Security and Privacy, pages 120-128, Oakland, CA, May 1996.
-
(1996)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S. A.2
Somayaji, A.3
Longstaff, T. A.4
-
10
-
-
0005018009
-
-
C. S. Inc
-
C. S. Inc. Netflow services and applications. 2002. http://www.cisco.com/warp/public/cc/pd/iosw/ioft/neflct/tech/napps_wp.htm.
-
(2002)
Netflow services and applications
-
-
-
11
-
-
28444495656
-
Network telescopes: Observing small or distant security events
-
Invited talk, San Francisco, CA, Aug. 5-9 Unpublished
-
D. Moore. Network telescopes: Observing small or distant security events. In 11th USENIX Security Symposium, Invited talk, San Francisco, CA, Aug. 5-9 2002. Unpublished.
-
(2002)
11th USENIX Security Symposium
-
-
Moore, D.1
-
12
-
-
0742276097
-
Inside the Slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the Slammer worm. IEEE Security & Privacy, 1(4):33-39, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
14
-
-
85084161486
-
Inferring Internet denial-of-service activity
-
Washington, D.C., Aug. 13-17
-
D. Moore, G. M. Voelker, and S. Savage. Inferring Internet denial-of-service activity. In Proceedings of the Tenth USENIX Security Symposium, pages 9-22, Washington, D.C., Aug. 13-17 2001.
-
(2001)
Proceedings of the Tenth USENIX Security Symposium
, pp. 9-22
-
-
Moore, D.1
Voelker, G. M.2
Savage, S.3
-
17
-
-
74849104047
-
-
June
-
R. Pang, V. Yegneswaran, P. Barford, V. Paxson, and L. Peterson. Characteristics of internet background radiation. http://www.cs.princeton.edu/nsg/papers/telescope.pdf, June 2004.
-
(2004)
Characteristics of internet background radiation
-
-
Pang, R.1
Yegneswaran, V.2
Barford, P.3
Paxson, V.4
Peterson, L.5
-
19
-
-
14944377862
-
Honeyd - A virtual honeypot daemon
-
Hamburg, Germany, Feb
-
N. Provos. Honeyd - A virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, Feb. 2003.
-
(2003)
10th DFN-CERT Workshop
-
-
Provos, N.1
-
23
-
-
0041534274
-
A snapshot of global Internet worm activity
-
Arbor Network Technical Report, June
-
D. Song, R. Malan, and R. Stone. A snapshot of global Internet worm activity. Arbor Network Technical Report, June 2002.
-
(2002)
-
-
Song, D.1
Malan, R.2
Stone, R.3
-
28
-
-
85180417990
-
-
[full-disclosure] [fwd: [th-research] bagle remote uninstall]. January
-
J. Stewart. [full-disclosure] [fwd: [th-research] bagle remote uninstall]. http://lists.netsys.com/pipermail/full-disclosure/2004-January/015970.html, January 2004.
-
(2004)
-
-
Stewart, J.1
-
30
-
-
85180408403
-
-
Symantec
-
Symantec. Security Response - W32.Beagle.A. http://securityresponse.symantec.com/avcenter/venc/data/w32.beagle.a@mm.html, 2004.
-
(2004)
Security Response - W32.Beagle.A
-
-
-
31
-
-
85180413888
-
-
I. Trend Micro
-
I. Trend Micro. WORM AGOBOT.GEN - Description and solution. http://www.trendmicro.com/vinfo/virusencyclo/default5.asp?VName=WORM_AGOBOT. GEN, 2003.
-
(2003)
WORM AGOBOT.GEN - Description and solution
-
-
-
33
-
-
12244311689
-
A Taxonomy of Computer Worms
-
ACM Press, October
-
N. Weaver, V. Paxson, S. Staniford, and R. Cunningham. A Taxonomy of Computer Worms. In Proc of ACM CCS Workshop on Rapid Malcode, pages 11-18. ACM Press, October 2003.
-
(2003)
Proc of ACM CCS Workshop on Rapid Malcode
, pp. 11-18
-
-
Weaver, N.1
Paxson, V.2
Staniford, S.3
Cunningham, R.4
-
34
-
-
85137546697
-
Global intrusion detection in the DOMINO overlay system
-
San Diego, CA, February
-
V. Yegneswaran, P. Barford, and S. Jha. Global intrusion detection in the DOMINO overlay system. In Proceedings of Network and Distributed System Security Symposium (NDSS'04), San Diego, CA, February 2004.
-
(2004)
Proceedings of Network and Distributed System Security Symposium (NDSS'04)
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
|