-
1
-
-
34248359555
-
A distributed host-based worm detection system
-
New York, NY, USA, ACM
-
CHEETANCHERI, S. G., AGOSTA, J. M., DASH, D. H., LEVITT, K. N., ROWE, J., AND SCHOOLER, E. M. A distributed host-based worm detection system. In Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense (LSAD’06) (New York, NY, USA, 2006), ACM, pp. 107–113.
-
(2006)
Proceedings of the 2006 SIGCOMM Workshop on Large-Scale Attack Defense (LSAD’06)
, pp. 107-113
-
-
Cheetancheri, S.G.1
Agosta, J.M.2
Dash, D.H.3
Levitt, K.N.4
Rowe, J.5
Schooler, E.M.6
-
2
-
-
51949119334
-
Botnet detection and response: The network is the infection, 2005
-
DAGON, D. Botnet detection and response: The network is the infection, 2005. OARC Workshop presentation.
-
OARC Workshop Presentation
-
-
Dagon, D.1
-
3
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
GRIZZARD, J., SHARMA, V., NUNNERY, C., KANG, B., AND DAGON, D. Peer-to-peer botnets: Overview and case study. In Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets (HotBots’07) (2007).
-
(2007)
Proceedings of the First USENIX Workshop on Hot Topics in Understanding Botnets (HotBots’07)
-
-
Grizzard, J.1
Sharma, V.2
Nunnery, C.3
Kang, B.4
Dagon, D.5
-
4
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
GU, G., PERDISCI, R., ZHANG, J., AND LEE, W. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium (Security’08) (2008).
-
(2008)
Proceedings of the 17th USENIX Security Symposium (Security’08)
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
5
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Berkeley, CA, USA, USENIX Association
-
HOLZ, T., STEINER, M., DAHL, F., BIERSACK, E., AND FREILING, F. Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08) (Berkeley, CA, USA, 2008), USENIX Association.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
6
-
-
79951627934
-
-
HYUN, Y., HUFFAKER, B., ANDERSEN, D., ABEN, E., LUCKIE, M., K CLAFFY, AND SHANNON, C. The IPv4 Routed /24 AS Links Dataset – 2008-01-02. http://www.caida.org/data/active/ipv4_routed_topology_aslinks_dataset.xml.
-
The IPv4 Routed /24 AS Links Dataset – 2008-01-02
-
-
Hyun, Y.1
Huffaker, B.2
Andersen, D.3
Aben, E.4
Luckie, M.5
Claffy, K.6
Shannon, C.7
-
7
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (TDGs)
-
New York, NY, USA, ACM
-
ILIOFOTOU, M., PAPPU, P., FALOUTSOS, M., MITZENMACHER, M., SINGH, S., AND VARGHESE, G. Network monitoring using traffic dispersion graphs (TDGs). In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (IMC’07) (New York, NY, USA, 2007), ACM, pp. 315–320.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (IMC’07)
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
8
-
-
77951264808
-
Graption: Automated detection of P2P applications using traffic dispersion graphs (TDGs)
-
Department of Computer Science and Engineering, University of California, Riverside, June
-
ILIOFOTOU, M., PAPPU, P., FALOUTSOS, M., MITZENMACHER, M., VARGHESE, G., AND KIM, H. Graption: Automated detection of P2P applications using traffic dispersion graphs (TDGs). Tech. Rep. UCR-CS-2008-06080, Department of Computer Science and Engineering, University of California, Riverside, June 2008.
-
(2008)
Tech. Rep. UCR-CS-2008-06080
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Varghese, G.5
Kim, H.6
-
9
-
-
33745778859
-
T-Man: Gossip-based overlay topology management
-
Engineering Self-Organising Systems: Third International Workshop (ESOA 2005), Revised Selected Papers, S. A. Brueckner, G. Di Marzo Serugendo, D. Hales, and F. Zambonelli, Eds.,. of Springer-Verlag
-
JELASITY, M., AND BABAOGLU, O. T-Man: Gossip-based overlay topology management. In Engineering Self-Organising Systems: Third International Workshop (ESOA 2005), Revised Selected Papers (2006), S. A. Brueckner, G. Di Marzo Serugendo, D. Hales, and F. Zambonelli, Eds., vol. 3910 of Lecture Notes in Computer Science, Springer-Verlag, pp. 1–15.
-
(2006)
Lecture Notes in Computer Science
, vol.3910
, pp. 1-15
-
-
Jelasity, M.1
Babaoglu, O.2
-
10
-
-
34548273006
-
Gossip-based peer sampling
-
Aug
-
JELASITY, M., VOULGARIS, S., GUERRAOUI, R., KERMARREC, A.-M., AND VAN STEEN, M. Gossip-based peer sampling. ACM Transactions on Computer Systems 25, 3 (Aug. 2007), 8.
-
(2007)
ACM Transactions on Computer Systems
, vol.25
, Issue.3
, pp. 8
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.-M.4
van Steen, M.5
-
11
-
-
0003935111
-
The traveling salesman problem: A case study in local optimization
-
E. H. L. Aarts and J. K. Lenstra, Eds. John Wiley and Sons
-
JOHNSON, D. S., AND MCGEOCH, L. A. The traveling salesman problem: A case study in local optimization. In Local Search in Combinatorial Optimization, E. H. L. Aarts and J. K. Lenstra, Eds. John Wiley and Sons, 1997, pp. 215–310.
-
(1997)
Local Search in Combinatorial Optimization
, pp. 215-310
-
-
Johnson, D.S.1
McGeoch, L.A.2
-
12
-
-
85084096724
-
The heisenbot uncertainty problem: Challenges in separating bots from chaff
-
Berkeley, CA, USA, USENIX Association
-
KANICH, C., LEVCHENKO, K., ENRIGHT, B., VOELKER, G. M., AND SAVAGE, S. The heisenbot uncertainty problem: Challenges in separating bots from chaff. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08) (Berkeley, CA, USA, 2008), USENIX Association.
-
(2008)
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET’08)
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
14
-
-
0343441557
-
Navigation in a small world
-
KLEINBERG, J. Navigation in a small world. Nature 406 (2000), 845.
-
(2000)
Nature
, vol.406
, pp. 845
-
-
Kleinberg, J.1
-
15
-
-
34548853976
-
The wireless epidemic
-
News and Views
-
KLEINBERG, J. The wireless epidemic. Nature 449 (2007), 287–288. News and Views.
-
(2007)
Nature
, vol.449
, pp. 287-288
-
-
Kleinberg, J.1
-
16
-
-
77951157906
-
A survey and comparison of peer-to-peer overlay network schemes
-
LUA, E. K., CROWCROFT, J., PIAS, M., SHARMA, R., AND LIM, S. A survey and comparison of peer-to-peer overlay network schemes. IEEE Communications Surveys and Tutorials 7, 2 (2005), 72–93.
-
(2005)
IEEE Communications Surveys and Tutorials
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
17
-
-
33750327080
-
The internet AS-level topology: Three data sources and one definitive metric
-
MAHADEVAN, P., KRIOUKOV, D., FOMENKOV, M., DIMITROPOULOS, X., K C CLAFFY, AND VAHDAT, A. The Internet AS-level topology: three data sources and one definitive metric. SIGCOMM Comput. Commun. Rev. 36, 1 (2006), 17–26.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.1
, pp. 17-26
-
-
Mahadevan, P.1
Krioukov, D.2
Fomenkov, M.3
Dimitropoulos, X.4
Claffy, K.C.5
Vahdat, A.6
-
20
-
-
27644464791
-
Network awareness and failure resilience in self-organising overlay networks
-
Florence, Italy
-
MASSOULIÉ, L., KERMARREC, A.-M., AND GANESH, A. J. Network awareness and failure resilience in self-organising overlay networks. In Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003) (Florence, Italy, 2003), pp. 47–55.
-
(2003)
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003)
, pp. 47-55
-
-
Massoulié, L.1
Kermarrec, A.-M.2
Ganesh, A.J.3
-
22
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
NGUYEN, T. T. T., AND ARMITAGE, G. A survey of techniques for Internet traffic classification using machine learning. IEEE Communications Surveys and Tutorials 10, 4 (2008), 56–76.
-
(2008)
IEEE Communications Surveys and Tutorials
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.T.T.1
Armitage, G.2
-
24
-
-
0036187056
-
Mapping the gnutella network
-
RIPEANU, M., IAMNITCHI, A., AND FOSTER, I. Mapping the gnutella network. IEEE Internet Computing 6, 1 (2002), 50–57.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 50-57
-
-
Ripeanu, M.1
Iamnitchi, A.2
Foster, I.3
-
25
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, CA, ACM, ACM Press
-
STOICA, I., MORRIS, R., KARGER, D., KAASHOEK, M. F., AND BALAKRISHNAN, H. Chord: A scalable peer-to-peer lookup service for Internet applications. In Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM) (San Diego, CA, 2001), ACM, ACM Press, pp. 149–160.
-
(2001)
Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM)
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
26
-
-
84882753373
-
Botnet detection based on network behavior
-
W. Lee, C. Wang, and D. Dagon, Eds.,. of Advances in Information Security. Springer
-
STRAYER, W. T., LAPSELY, D., WALSH, R., AND LIVADAS, C. Botnet detection based on network behavior. In Botnet Detection: Countering the Largest Security Threat, W. Lee, C. Wang, and D. Dagon, Eds., vol. 36 of Advances in Information Security. Springer, 2008, pp. 1–24.
-
(2008)
Botnet Detection: Countering the Largest Security Threat
, vol.36
, pp. 1-24
-
-
Strayer, W.T.1
Lapsely, D.2
Walsh, R.3
Livadas, C.4
-
27
-
-
14844288427
-
Worms vs. Perimeters: The case for hard-LANs
-
Washington, DC, USA, IEEE Computer Society
-
WEAVER, N., ELLIS, D., STANIFORD, S., AND PAXSON, V. Worms vs. perimeters: the case for hard-LANs. In Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (HOTI’04) (Washington, DC, USA, 2004), IEEE Computer Society, pp. 70–76.
-
(2004)
Proceedings of the 12th Annual IEEE Symposium on High Performance Interconnects (HOTI’04)
, pp. 70-76
-
-
Weaver, N.1
Ellis, D.2
Staniford, S.3
Paxson, V.4
|