-
2
-
-
85080601921
-
-
Darpa ids evaluation data set. http://www.ll.mit.edu/mission/communications/cyber/CSTcorpora/ideval/data/.
-
Darpa Ids Evaluation Data Set
-
-
-
3
-
-
85080491443
-
-
Dshield.org. http://www.dshield.org/.
-
-
-
-
5
-
-
85080575336
-
-
ISC Research Feed. https://isc.sans.edu/researchfeed. html.
-
-
-
-
8
-
-
85084161642
-
Challenges in experimenting with botnet detection systems
-
Adam J Aviv and Andreas Haeberlen. Challenges in experimenting with botnet detection systems. In USENIX 4th CSET Workshop, 2011.
-
(2011)
USENIX 4th CSET Workshop
-
-
Aviv, A.J.1
Haeberlen, A.2
-
9
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
Springer
-
Paul Baecher, Markus Koetter, Thorsten Holz, Maximillian Dornseif, and Felix Freiling. The nepenthes platform: An efficient approach to collect malware. In RAID’06, pages 165–184. Springer, 2006.
-
(2006)
RAID’06
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
10
-
-
24344436426
-
The blaster worm: Then and now
-
Michael Bailey, Evan Cooke, Farnam Jahanian, David Watson, and Jose Nazario. The blaster worm: Then and now. Security & Privacy, IEEE, 3(4):26–31, 2005.
-
(2005)
Security & Privacy, IEEE
, vol.3
, Issue.4
, pp. 26-31
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Watson, D.4
Nazario, J.5
-
11
-
-
84857332705
-
Cross-domain collaborative anomaly detection: So far yet so close
-
Springer
-
Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, and Salvatore J Stolfo. Cross-domain collaborative anomaly detection: so far yet so close. In RAID’11, pages 142–160. Springer, 2011.
-
(2011)
RAID’11
, pp. 142-160
-
-
Boggs, N.1
Hiremagalore, S.2
Stavrou, A.3
Stolfo, S.J.4
-
12
-
-
77955220391
-
Playing devil’s advocate: Inferring sensitive information from anonymized network traces
-
Scott Coull, Charles Wright, Fabian Monrose, Michael Collins, Michael K Reiter, et al. Playing devil’s advocate: Inferring sensitive information from anonymized network traces. In NDSS’07, pages 35–47, 2007.
-
(2007)
NDSS’07
, pp. 35-47
-
-
Coull, S.1
Wright, C.2
Monrose, F.3
Collins, M.4
Reiter, M.K.5
-
14
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee, et al. Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proceedings of the 17th conference on Security symposium, pages 139–154, 2008.
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
18
-
-
0042474173
-
Internet quarantine: Requirements for containing self-propagating code
-
IEEE
-
David Moore, Colleen Shannon, Geoffrey M Voelker, and Stefan Savage. Internet quarantine: Requirements for containing self-propagating code. In INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, volume 3, pages 1901–1910. IEEE, 2003.
-
(2003)
INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies
, vol.3
, pp. 1901-1910
-
-
Moore, D.1
Shannon, C.2
Voelker, G.M.3
Savage, S.4
-
19
-
-
85059753615
-
BotGrep: Finding p2p bots with structured graph analysis
-
USENIX Association
-
Shishir Nagaraja, Prateek Mittal, Chi-Yao Hong, Matthew Caesar, and Nikita Borisov. Botgrep: finding p2p bots with structured graph analysis. In Proceedings of the 19th USENIX conference on Security, pages 7–7. USENIX Association, 2010.
-
(2010)
Proceedings of the 19th USENIX Conference on Security
, pp. 7
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
20
-
-
33847256529
-
The devil and packet trace anonymization
-
Ruoming Pang, Mark Allman, Vern Paxson, and Jason Lee. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review, 36(1):29–38, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
21
-
-
0033295259
-
BrO: A system for detecting network intruders in real-time
-
Vern Paxson. Bro: a system for detecting network intruders in real-time. Computer networks, 31(23):2435–2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23
, pp. 2435-2463
-
-
Paxson, V.1
-
22
-
-
14944377862
-
Honeyd-a virtual honeypot daemon
-
Hamburg, Germany
-
Niels Provos. Honeyd-a virtual honeypot daemon. In 10th DFN-CERT Workshop, Hamburg, Germany, volume 2, 2003.
-
(2003)
10th DFN-CERT Workshop
, vol.2
-
-
Provos, N.1
-
24
-
-
78650720508
-
The need for simulation in evaluating anomaly detectors
-
Haakon Ringberg, Matthew Roughan, and Jennifer Rexford. The need for simulation in evaluating anomaly detectors. ACM SIGCOMM Computer Communication Review, 38(1):55–59, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.38
, Issue.1
, pp. 55-59
-
-
Ringberg, H.1
Roughan, M.2
Rexford, J.3
-
25
-
-
84878363750
-
Prudent practices for designing malware experiments: Status quo and outlook
-
IEEE
-
Christian Rossow, Christian J Dietrich, Chris Grier, Christian Kreibich, Vern Paxson, Norbert Pohlmann, Herbert Bos, and Maarten van Steen. Prudent practices for designing malware experiments: Status quo and outlook. In Security and Privacy (SP), 2012 IEEE Symposium on, pages 65–79. IEEE, 2012.
-
(2012)
Security and Privacy (SP), 2012 IEEE Symposium on
, pp. 65-79
-
-
Rossow, C.1
Dietrich, C.J.2
Grier, C.3
Kreibich, C.4
Paxson, V.5
Pohlmann, N.6
Bos, H.7
van Steen, M.8
-
26
-
-
4344627335
-
The spread of the witty worm
-
Colleen Shannon and David Moore. The spread of the witty worm. Security & Privacy, IEEE, 2(4):46–50, 2004.
-
(2004)
Security & Privacy, IEEE
, vol.2
, Issue.4
, pp. 46-50
-
-
Shannon, C.1
Moore, D.2
-
29
-
-
33746144908
-
TMIX: A tool for generating realistic TCP application workloads in ns-2
-
Michele C Weigle, Prashanth Adurthi, Félix Hernández-Campos, Kevin Jeffay, and F Donelson Smith. Tmix: a tool for generating realistic tcp application workloads in ns-2. ACM SIGCOMM Computer Communication Review, 36(3):65–76, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.3
, pp. 65-76
-
-
Weigle, M.C.1
Adurthi, P.2
Hernández-Campos, F.3
Jeffay, K.4
Donelson Smith, F.5
-
30
-
-
85137546697
-
Global intrusion detection in the domino overlay system
-
San Diego, CA, 2004
-
Vinod Yegneswaran, Paul Barford, and Somesh Jha. Global intrusion detection in the domino overlay system. In Proceedings of NDSS, volume 2004. San Diego, CA, 2004.
-
(2004)
Proceedings of NDSS
-
-
Yegneswaran, V.1
Barford, P.2
Jha, S.3
-
31
-
-
85077707798
-
Highly predictive blacklisting
-
Jian Zhang, Phillip Porras, and Johannes Ullrich. Highly predictive blacklisting. In USENIX Security, volume 8, pages 107–122, 2008.
-
(2008)
USENIX Security
, vol.8
, pp. 107-122
-
-
Zhang, J.1
Porras, P.2
Ullrich, J.3
|