-
1
-
-
48349138996
-
Understanding passive and active service discovery
-
BARTLETT, G., HEIDEMANN, J., AND PAPADOPOULOS, C. Understanding passive and active service discovery. In Proc. 7th ACM Internet Measurement Conference (2007), pp. 55-60.
-
(2007)
Proc. 7th ACM Internet Measurement Conference
, pp. 55-60
-
-
BARTLETT, G.1
HEIDEMANN, J.2
PAPADOPOULOS, C.3
-
2
-
-
85094670992
-
-
Caida cflowd. http://www.caida.org/tools/measurement/cflowd/, 2010.
-
(2010)
Caida cflowd
-
-
-
3
-
-
77649329798
-
Netpy: Advanced Network Traffic Monitoring
-
CIRNECI, A., BOBOC, S., LEORDEANU, C., CRISTEA, V., AND ESTAN, C. Netpy: Advanced Network Traffic Monitoring. In Proc. Int Conf. on Intelligent Networking and Collaborative Systems (INCOS'09) (2009), pp. 253-254.
-
(2009)
Proc. Int Conf. on Intelligent Networking and Collaborative Systems (INCOS'09)
, pp. 253-254
-
-
CIRNECI, A.1
BOBOC, S.2
LEORDEANU, C.3
CRISTEA, V.4
ESTAN, C.5
-
4
-
-
43949095595
-
-
CLAISE, B., QUITTEK, J., BRYANT, S., AITKEN, P., MEYER, J., TRAMMELL, B., BOSCHI, E., WENGER, S., CHANDRA, U., WESTERLUND, M., ET AL. RFC 5101 Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information, 2008.
-
(2008)
RFC 5101 Specification of the IP Flow Information Export (IPFIX) Protocol for the Exchange of IP Traffic Flow Information
-
-
CLAISE, B.1
QUITTEK, J.2
BRYANT, S.3
AITKEN, P.4
MEYER, J.5
TRAMMELL, B.6
BOSCHI, E.7
WENGER, S.8
CHANDRA, U.9
WESTERLUND, M.10
-
5
-
-
34548778120
-
Visual discovery in computer network defense
-
D'AMICO, A., GOODALL, J., TESONE, D., AND KOPYLEC, J. Visual discovery in computer network defense. IEEE Computer Graphics and Applications 27, 5 (2007), 20-27.
-
(2007)
IEEE Computer Graphics and Applications
, vol.27
, Issue.5
, pp. 20-27
-
-
D'AMICO, A.1
GOODALL, J.2
TESONE, D.3
KOPYLEC, J.4
-
6
-
-
35348815604
-
Identifying and discriminating between web and peer-to-peer traffic in the network core
-
ACM
-
ERMAN, J., MAHANTI, A., ARLITT, M., AND WILLIAMSON, C. Identifying and discriminating between web and peer-to-peer traffic in the network core. In Proceedings of the 16th international conference on World Wide Web (2007), ACM, p. 892.
-
(2007)
Proceedings of the 16th international conference on World Wide Web
, pp. 892
-
-
ERMAN, J.1
MAHANTI, A.2
ARLITT, M.3
WILLIAMSON, C.4
-
7
-
-
56449095222
-
Large-scale network monitoring for visual analysis of attacks
-
Springer
-
FISCHER, F., MANSMANN, F., KEIM, D., PIETZKO, S., AND WALDVOGEL, M. Large-scale network monitoring for visual analysis of attacks. In Proc. Workshop on Visualization for Computer Security (VizSEC) (2008), Springer, p. 111.
-
(2008)
Proc. Workshop on Visualization for Computer Security (VizSEC)
, pp. 111
-
-
FISCHER, F.1
MANSMANN, F.2
KEIM, D.3
PIETZKO, S.4
WALDVOGEL, M.5
-
8
-
-
77953296690
-
More NetFlow tools: For performance and security
-
GATES, C., COLLINS, M., DUGGAN, M., KOMPANEK, A., AND THOMAS, M. More NetFlow tools: For performance and security. In Proc. 18th USENIX Large Installation System Administration Conf. (LISA) (2004), pp. 121-132.
-
(2004)
Proc. 18th USENIX Large Installation System Administration Conf. (LISA)
, pp. 121-132
-
-
GATES, C.1
COLLINS, M.2
DUGGAN, M.3
KOMPANEK, A.4
THOMAS, M.5
-
9
-
-
77949409069
-
OverFlow: An Overview Visualization for Network Analysis
-
GLANFIELD, J., BROOKS, S., TAYLOR, T., PATERSON, D., SMITH, C., GATES, C., AND MCHUGH, J. OverFlow: An Overview Visualization for Network Analysis. In Proc. 6th Int. Workshop on Visualization for Cyber Security (VizSec) (2009), pp. 11-19.
-
(2009)
Proc. 6th Int. Workshop on Visualization for Cyber Security (VizSec)
, pp. 11-19
-
-
GLANFIELD, J.1
BROOKS, S.2
TAYLOR, T.3
PATERSON, D.4
SMITH, C.5
GATES, C.6
MCHUGH, J.7
-
10
-
-
84877343478
-
Watch your Flows with NfSen and NFDUMP
-
HAAG, P. Watch your Flows with NfSen and NFDUMP. In 50th RIPE Meeting (2005).
-
(2005)
50th RIPE Meeting
-
-
HAAG, P.1
-
13
-
-
33847303101
-
BLINC: multilevel traffic classification in the dark
-
KARAGIANNIS, T., PAPAGIANNAKI, K., AND FALOUTSOS, M. BLINC: multilevel traffic classification in the dark. In Proc. ACM SIGCOMM Conference (2005), pp. 229-240.
-
(2005)
Proc. ACM SIGCOMM Conference
, pp. 229-240
-
-
KARAGIANNIS, T.1
PAPAGIANNAKI, K.2
FALOUTSOS, M.3
-
14
-
-
70350771144
-
Internet traffic classification demystified: myths, caveats, and the best practices
-
ACM
-
KIM, H., CLAFFY, K., FOMENKOV, M., BARMAN, D., FALOUTSOS, M., AND LEE, K. Internet traffic classification demystified: myths, caveats, and the best practices. In Proceedings of the 2008 ACM CoNEXT conference (2008), ACM, pp. 1-12.
-
(2008)
Proceedings of the 2008 ACM CoNEXT conference
, pp. 1-12
-
-
KIM, H.1
CLAFFY, K.2
FOMENKOV, M.3
BARMAN, D.4
FALOUTSOS, M.5
LEE, K.6
-
15
-
-
33749527089
-
Closing-the-loop in NVisionIP: Integrating discovery and search in security visualizations
-
LAKKARAJU, K., BEARAVOLU, R., SLAGELL, A., YURCIK, W., AND NORTH, S. Closing-the-loop in NVisionIP: Integrating discovery and search in security visualizations. In Proc. IEEE Workshop on Visualization for Computer Security (VizSEC) (2005).
-
(2005)
Proc. IEEE Workshop on Visualization for Computer Security (VizSEC)
-
-
LAKKARAJU, K.1
BEARAVOLU, R.2
SLAGELL, A.3
YURCIK, W.4
NORTH, S.5
-
16
-
-
20444484611
-
NVisionIP: netflow visualizations of system state for security situational awareness
-
LAKKARAJU, K., YURCIK, W., AND LEE, A. NVisionIP: netflow visualizations of system state for security situational awareness. In Proc. ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC) (2004), pp. 65-72.
-
(2004)
Proc. ACM Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC)
, pp. 65-72
-
-
LAKKARAJU, K.1
YURCIK, W.2
LEE, A.3
-
17
-
-
85094645749
-
Pointers and Software, NetFlow
-
Tech. rep., SWITCH
-
LEINEN, S. FloMA: Pointers and Software, NetFlow. Tech. rep., SWITCH, 2010.
-
(2010)
-
-
LEINEN, S.1
Flo, MA2
-
18
-
-
85094634084
-
-
Nfdump
-
Nfdump. http://nfdump.sourceforge.net, 2010.
-
(2010)
-
-
-
19
-
-
85094680384
-
-
Nfsen
-
Nfsen. http://nfsen.sourceforge.net, 2010.
-
(2010)
-
-
-
20
-
-
85094669110
-
-
Nmap
-
Nmap. http://www.nmap.org, 2010.
-
(2010)
-
-
-
23
-
-
85094640054
-
-
Pads
-
Pads. http://passive.sourceforge.net, 2010.
-
(2010)
-
-
-
24
-
-
85094642725
-
-
Pbnj
-
Pbnj. http://pbnj.sourceforge.net, 2010.
-
(2010)
-
-
-
27
-
-
84941149577
-
The OSU flow-tools package and CISCO NetFlow logs
-
ROMIG, S., FULLMER, M., AND LUMAN, R. The OSU flow-tools package and CISCO NetFlow logs. In Proc. 14th USENIX Large Installation System Administration Conf, (LISA) (2000), pp. 291-304.
-
(2000)
Proc. 14th USENIX Large Installation System Administration Conf, (LISA)
, pp. 291-304
-
-
ROMIG, S.1
FULLMER, M.2
LUMAN, R.3
-
31
-
-
66249140932
-
FloVis: Flow Visualization System
-
TAYLOR, T., PATERSON, D., GLANFIELD, J., GATES, C., BROOKS, S., AND MCHUGH, J. FloVis: Flow Visualization System. In Proc. Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH) (2009), pp. 186-198.
-
(2009)
Proc. Cybersecurity Applications and Technologies Conference for Homeland Security (CATCH)
, pp. 186-198
-
-
TAYLOR, T.1
PATERSON, D.2
GLANFIELD, J.3
GATES, C.4
BROOKS, S.5
MCHUGH, J.6
-
33
-
-
74849112056
-
Applied parallel coordinates for logs and network traffic attack analysis
-
TRICAUD, S., AND SAADÉ, P. Applied parallel coordinates for logs and network traffic attack analysis. Journal in computer virology 6, 1 (2010), 1-29.
-
(2010)
Journal in computer virology
, vol.6
, Issue.1
, pp. 1-29
-
-
TRICAUD, S.1
SAADÉ, P.2
-
35
-
-
34247248337
-
Experience using active and passive mapping for network situational awareness
-
WEBSTER, S., LIPPMANN, R., AND ZISSMAN, M. Experience using active and passive mapping for network situational awareness. In Proc. 5th IEEE Int. Symp. on Network Computing and Applications (NCA) (2006), pp. 19-26.
-
(2006)
Proc. 5th IEEE Int. Symp. on Network Computing and Applications (NCA)
, pp. 19-26
-
-
WEBSTER, S.1
LIPPMANN, R.2
ZISSMAN, M.3
-
36
-
-
85094652427
-
-
Yaf
-
Yaf. http://tools.netsa.cert.org/yaf/, 2010.
-
(2010)
-
-
|