-
1
-
-
0036871268
-
Internet infrastructure security: A taxonomy
-
A. Chakrabarti and G. Manimaran, "Internet infrastructure security: a taxonomy," IEEE Network, Vol. 16, 2002, pp. 13-21.
-
(2002)
IEEE Network
, vol.16
, pp. 13-21
-
-
Chakrabarti, A.1
Manimaran, G.2
-
2
-
-
0034270431
-
Defending yourself: The role of intrusion detection systems
-
J. McHugh, A. Christie, and J. Alien, "Defending yourself: the role of intrusion detection systems," IEEE Software, 2000, pp. 42-46.
-
(2000)
IEEE Software
, pp. 42-46
-
-
McHugh, J.1
Christie, A.2
Alien, J.3
-
3
-
-
1542350966
-
Fast content-based packet handling for intrusion detection
-
M. Fisk and G. Varghese, "Fast content-based packet handling for intrusion detection," UCSD Technical Report CS2001-0670, 2001.
-
(2001)
UCSD Technical Report
, vol.CS2001-0670
-
-
Fisk, M.1
Varghese, G.2
-
4
-
-
84964497101
-
Towards faster string matching for intrusion detection or exceeding the speed of snort
-
C. J. Coit, S. Staniford, and J. McAlerney, "Towards faster string matching for intrusion detection or exceeding the speed of snort," in Proceedings of DARPA Information Survivability Conference and Exposition, Vol. 1, 2001, pp. 124-130.
-
(2001)
Proceedings of DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 124-130
-
-
Coit, C.J.1
Staniford, S.2
McAlerney, J.3
-
6
-
-
0025505472
-
A case study of Ethernet anomalies in a distributed computing environment
-
R. A. Maxion and F. E. Feather, "A case study of Ethernet anomalies in a distributed computing environment," IEEE Transactions on Reliability, Vol. 39, 1990, pp. 433-443.
-
(1990)
IEEE Transactions on Reliability
, vol.39
, pp. 433-443
-
-
Maxion, R.A.1
Feather, F.E.2
-
7
-
-
0031351694
-
Proactive network fault detection
-
C. S. Hood and C. Ji, "Proactive network fault detection," in Proceedings of INFOCOM '97, Vol. 3, 1997, pp. 1147-1155.
-
(1997)
Proceedings of INFOCOM '97
, vol.3
, pp. 1147-1155
-
-
Hood, C.S.1
Ji, C.2
-
10
-
-
0242414940
-
Intrusion and misuse detection in large-scale systems
-
R. F. Erbacher, K. L. Walker, and D. A. Frincke, "Intrusion and misuse detection in large-scale systems," IEEE Computer Graphics and Applications, Vol. 22, 2002, pp. 38-47.
-
(2002)
IEEE Computer Graphics and Applications
, vol.22
, pp. 38-47
-
-
Erbacher, R.F.1
Walker, K.L.2
Frincke, D.A.3
-
11
-
-
51149105210
-
Proactive detection of distributed denial of service attacks using MIB traffic variables - A feasibility study
-
J. B. D. Cabrera et al., "Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study," in Proceedings of 2001 IEEE/IFIP Integrated Network Management, 2001, pp. 609-622.
-
(2001)
Proceedings of 2001 IEEE/IFIP Integrated Network Management
, pp. 609-622
-
-
Cabrera, J.B.D.1
-
12
-
-
0031337396
-
Beyond thresholds: An alternative method for extracting information from network measurements
-
C. S. Hood and C. Ji, "Beyond thresholds: an alternative method for extracting information from network measurements," in Proceedings of 1997 IEEE Global Telecommunications Conference, Vol. 1, 1997, pp. 487-491.
-
(1997)
Proceedings of 1997 IEEE Global Telecommunications Conference
, vol.1
, pp. 487-491
-
-
Hood, C.S.1
Ji, C.2
-
15
-
-
9944264317
-
Statistical detection for network flooding attacks
-
C. S. Chao, Y. S. Chen, and A. C. Liu, "Statistical detection for network flooding attacks," in Proceedings of the 2003 National Computer Symposium, 2003, pp. 1264-1273.
-
(2003)
Proceedings of the 2003 National Computer Symposium
, pp. 1264-1273
-
-
Chao, C.S.1
Chen, Y.S.2
Liu, A.C.3
-
16
-
-
84952321838
-
Monitoring networks using ntop
-
L. Deri, R. Carbone, and S. Suin, "Monitoring networks using ntop," in Proceedings of 2001 IEEE/IFIP Integrated Network Management, 2001, pp. 199-212.
-
(2001)
Proceedings of 2001 IEEE/IFIP Integrated Network Management
, pp. 199-212
-
-
Deri, L.1
Carbone, R.2
Suin, S.3
-
17
-
-
0003958799
-
Internet traffic tends to poisson and independent as the load increases
-
J. Cao et al., "Internet traffic tends to poisson and independent as the load increases," Bell Labs Technical Report, 2001.
-
(2001)
Bell Labs Technical Report
-
-
Cao, J.1
|