Anderson, D., Frivold, T., Valdes, A.: Next-generation intrusion detection expert system (NIDES): A summary. Technical Report SRI-CSL-95-07, Computer Science Laboratory, SRI International, Menlo Park, California (May 1995)
Google Scholar
Berk, V.H., Gray, R.S., Bakos, G.: Using sensor networks and data fusion for early detection of active worms. In: Proceedings of the SPIE AeroSense (2003)
Google Scholar
Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: Proceedings of the IEEE INFOCOM 2003 (March 2003)
Google Scholar
Cheung, S., Lindqvist, U., Fong, M.W.: Modeling multistep cyber attacks for scenario recognition. In: Proceedings of the Third DARPA Information Survivability Conference and Exposition (DISCEX III), Washington, D.C. (April 2003)
Google Scholar
Cuppens, F., Miège, A.: Alert correlation in a cooperative intrusion detection framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002, pp. 202–215 (2002)
Google Scholar
Corey, J.: Advanced honey pot identification and exploitation. (fake) Phrack, No. 63 (2004)
Google Scholar
Debar, H., Wespi, A.: The intrusion-detection console correlation mechanism. In: 4th International Symposium on Recent Advances in Intrusion Detection (RAID) (October 2001)
Google Scholar
Goldman, R.P., Heimerdinger, W., Harp, S.A.: Information modleing for intrusion report aggregation. In: DARPA Information Survivability Conference and Exposition (DISCEX II) (June 2001)
Google Scholar
Gu, G., Sharif, M., Qin, X., Dagon, D., Lee, W., Riley, G.: Worm detection, early warning and response based on local victim information. Submitted for review (2004)
Google Scholar
Hosmer, D.W., Lemeshow, S.: Applied Logistic Regression. Wiley-Interscience, Hoboken (2000)
MATH
CrossRef
Google Scholar
Immunix Inc. Stackguard,
http://www.immunix.org/stackguard.html
(2003)
SANS Institute,
http://www.sans.org
Jung, J., Paxson, V., Berger, A.W., Balakrishnan, H.: Fast portscan detection using sequential hypothesis testing. In: 2004 IEEE Symposium on Security and Privacy (2004)
Google Scholar
Jiang, X., Xu, D.: Collapsar: A vm-based architecture for network attack detention center,
http://www.cs.purdue.edu/homes/jiangx/collapsar/
(2004)
Kalman, R.E.: A new approach to linear filtering and prediction problems. Transaction of the ASME–Journal of Basic Engineering (March 1960)
Google Scholar
Kephart, J.O., Chess, D.M., White, S.R.: Computers and epidemiology (1993)
Google Scholar
Kortchinsky, K.: Vmware fingerprinting counter measures. The French Honeynet Project (2004)
Google Scholar
Kreibich, C.: Honeycomb automated ids signature creation using honeypots,
http://www.cl.cam.ac.uk/cpk25/honeycomb/
(2003)
Kephart, J.O., White, S.R.: Measuring and modeling computer virus prevalence. In: Proceedings of IEEE Symposium on Security and Privacy (1993)
Google Scholar
Lemon, J.: Kqueue: A generic and scalable event notification facility, pp. 141–154 (2001)
Google Scholar
Levine, J., LaBella, R., Owen, H., Contis, D., Culver, B.: The use of honeynets to detect exploited systems across large enterprise networks. In: Proceedings of the 2003 IEEE Workshop on Information Assurance (2003)
Google Scholar
LURHQ. Msblast case study,
http://www.lurhq.com/blaster.html
(2003)
LURHQ. Witty worm analysis,
http://www.lurhq.com/witty.html
(2004)
Mukherjee, B., Heberlein, L.T., Levitt, K.N.: Network intrusion detection. IEEE Network (May/June 1994)
Google Scholar
Morin, B., Mé, L., Debar, H., Ducassé, M.: M2d2: A formal data model for ids alert correlation. In: Proceedings of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID) (October 2002)
Google Scholar
Moore, D.: Code-red: A case study on the spread and victims of an internet worm,
http://www.icir.org/vern/imw-2002/imw2002-papers/209.ps.gz
(2002)
Moore, D.: Network telescopes: Observing small or distant security events,
http://www.caida.org/outreach/presentations/2002/usenix_sec/
(2002)
Moore, D., Shannon, C., Voelker, G.M., Savage, S.: Internet quarantine: Requirements for containing self-propagating code. In: Proceedings of the IEEE INFOCOM (March 2003)
Google Scholar
Ning, P., Cui, Y., Reeves, D.S.: Constructing attack scenarios through correlation of intrusion alerts. In: 9th ACM Conference on Computer and Communications Security (November 2002)
Google Scholar
Parekh, J.J.: Columbia ids worminator project,
http://worminator.cs.columbia.edu/
(2004)
Porras, P.A., Neumann, P.G.: EMERALD: Event monitoring enabling responses to anomalous live disturbances. In: National Information Systems Security Conference, Baltimore MD (October 1997)
Google Scholar
Provos, N.: A virtual honeypot framework,
http://www.citi.umich.edu/techreports/reports/citi-tr-03-1.pdf
(2003)
Qin, X., Dagon, D., Gu, G., Lee, W., Warfield, M., Allor, P.: Technical report
Google Scholar
Qin, X., Lee, W.: Statistical causality analysis of infosec alert data. In: Proceedings of the 6th International Symposium on Recent Advances in Intrusion Detection (RAID 2003), Pittsburgh, PA (September 2003)
Google Scholar
Qu, D., Vetter, B., Wang, F., Wu, S.F.: Statistical-based intrusion detection for OSPF routing protocol. In: Proceedings of the 6th IEEE International Conference on Network Protocols, Austin, TX (October 1998)
Google Scholar
Seifried, K.: Honeypotting with vmware - basics (2002)
Google Scholar
Skoudis, E.: Counter Hack. Prentice Hall PTR, Upper Saddle River, NJ (2002)
Google Scholar
Spitzner, L.: Honeypots: Tracking Hackers. Addison-Wesley, Reading (2003)
Google Scholar
Staniford, S., Paxson, V., Weaver, N.: How to Own the Internet in Your Spare Time. In: Proceedings of 2002 Usenix Security Symposium (2002)
Google Scholar
Staniford, S.: Code red analysis pages: July infestation analysis,
http://www.silicondefense.com/cr/july.html
(2001)
Inc. VMWare. Gsx server 3,
http://www.vmware.com/products/server
(2004)
Valdes, A., Skinner, K.: Probabilistic alert correlation. In: Proceedings of the 4th International Symposium on Recent Advances in Intrusion Detection (RAID (October 2001)
Google Scholar
Williamson, M.M.: Throttling viruses: Restricting propagation to defeat malicious mobile code. Technical report (2002), HPL-2002-172
Google Scholar
Williamson, M.M., Léveillé, J.: An epidemiological model of virus spread and cleanup. Technical report (2003), HPL-2003-30
Google Scholar
Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: 2003 ACM Workshop on Rapid Malcode (WORM 2003), ACM SIGSAC (October 2003)
Google Scholar
Wu, J., Vangala, S., Gao, L., Kwiat, K.: An efficient architecture and algorithm for detecting worms with various scan techniques. In: Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS 2004) (February 2004) (to appear)
Google Scholar
Yegneswaran, V., Barford, P., Jha, S.: Global intrusion detection in the domino overlay system. In: Proceedings of NDSS (2004)
Google Scholar
Zou, C.C., Gao, L., Gong, W., Towsley, D.: Monitoring and early warning for internet worms. In: Proceedings of 10th ACM Conference on Computer and Communications Security (CCS 2003) (October 2003)
Google Scholar
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: Proceedings of 9th ACM Conference on Computer and Communications Security (CCS 2002) (October 2002)
Google Scholar