Worm Origin Identification Using Random Moonwalks (2005)

by Yinglian Xie , Vyas Sekar , David A. Maltz , Michael K. Reiter , Hui Zhang
Venue:In IEEE Symposium on Security and Privacy
Citations:35 - 11 self

Active Bibliography

16 Toward a Framework for Internet Forensic Analysis – Vyas Sekar, Yinglian Xie, David A. Maltz, Michael K. Reiter, Hui Zhang - 2004
Traffic Analysis for Network Security using Learning Theory and Streaming Algorithms – Shobha Venkataraman - 2008
1 Is Host-Based Anomaly Detection + Temporal Correlation = Worm Causality? – Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang - 2007
On The Use of Context in Network Intrusion Detection Systems by – Jayanth Kumar Kannan, Jayanthkumar Kannan, Jayanthkumar Kannan
11 A Multi-Resolution Approach for Worm Detection and Containment – Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang - 2006
Shadow Honeypots – Kostas G. Anagnostakis, Stelios Sidiroglou, Periklis Akritidis, Michalis Polychronakis, Angelos D. Keromytis, Evangelos P. Markatos - 2009
70 Detecting targeted attacks using shadow honeypots – K. G. Anagnostakis, S. Sidiroglou, P. Akritidis, K. Xinidis, E. Markatos, A. D. Keromytis - 2005
244 Vigilante: End-to-End Containment of Internet Worm Epidemics – Manuel Costa, Jon Crowcroft, Miguel Castro, Antony Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham - 2008
ALGORITHMS FOR LARGE-SCALE INTERNET MEASUREMENTS – Derek Anthony Leonard, Anthony Leonard, A. L. Narasimha Reddy, Head Of Department, Valerie E. Taylor - 2010
22 Tracing traffic through intermediate hosts that repacketize flows – Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, Peng Ning - 2007
11 De-anonymizing the Internet Using Unreliable IDs – Yinglian Xie, Fang Yu, Martín Abadi, Silicon Valley
v Replay-based Worm Detection System – Tae Won Cho, Tae Won Cho, Tae Won Cho, Tae Won Cho, Supervisor Harrick, M. Vin - 2005
A Scalable Hybrid Network Monitoring Architecture for Measuring, Characterizing, and Tracking Internet Threat Dynamics – Michael Donald Bailey, Michael Donald Bailey, Farnam Jahanian - 2006
Jayanthkumar Kannan, Lakshminarayanan Subramanian, – Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica Scott, Scott Shenker, Y Katz, Jayanthkumar Kannan, Lakshminarayanan Subramanian, Ion Stoica, Scott Shenker, Y Katz
8 Co-ordinated Port Scans: A Model, A Detector and An Evaluation Methodology – Carrie Gates - 2006
46 Change-Point Monitoring for Detection of DoS Attacks – Haining Wang, Danlu Zhang, Kang G. Shin - 2004
Structural Traffic Analysis for Network Security Monitoring – Christian Peter Kreibich, Hughes Hall
Stepping Stone Detection (SSD): Towards to Provide Future SSD-based Research – Mohd Nizam Omar, Rahmat Budiarto
3 A Survey of Connection-Chains Detection Techniques – Ahmad Almulhem, Issa Traore