类 型
11 篇文献
 
Accelerating Network Trac Analytics Using Query-Driven Visualization  
Realizing operational analytics solutions where large and com- plex data must be analyzed in a time-critical fashion entails inte- grating many different types of technology. This paper focuses on an ......
8次引用 0 0
NVisionIP: netflow visualizations of system state for security situational awareness  
The number of attacks against large computer systems is currently growing at a rapid pace. Despite the best efforts of security analysts, large organizations are having trouble keeping on top of the c......
Visualisation, VIS, 2008 International Conference  2004
95次引用 0 0
On Web Browsing Privacy in Anonymized NetFlows  
Anonymization of network traces is widely viewed as a necessary condition for releasing such data for research purposes. For obvious privacy reasons, an important goal of trace anonymization is to sup......
USENIX Security Symposium  2007
23次引用 0 0
Network scan detection with LQS: a lightweight, quick and stateful algorithm  
Network scanning reveals valuable information of accessible hosts over the Internet and their offered network services, which allows significant narrowing of potential targets to attack. Addressing an......
Computer and Communications Security  2011
0次引用 0 0
Detecting scans at the ISP level  
Unlimited distribution subject to the copyright. This report was prepared for the......
4次引用 0 0
PlanetFlow: maintaining accountability for network services  
PlanetFlow is a network auditing service that maintains comprehensive, permanent accountability for all traffic generated by PlanetLab services, in accordance with common Internet practice and the ter......
Operating Systems Review  2006
18次引用 0 0
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors  
Abstract. A user who wants to use a service forbidden by their site’s usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited traffic on TCP po......
European Symposium on Research in Computer Security  2006
29次引用 0 0
Collection and Exploration of Large Data Monitoring Sets Using Bitmap Databases  
Abstract. Collecting and exploring monitoring data is becoming increasingly challenging as networks become larger and faster. Solutions based on both SQL-databases and specialized binary formats do no......
0次引用 0 0
NAF: The NetSA Aggregated Flow Tool Suite  
In this paper we present a new suite of tools - NAF (for NetSA Aggregated Flow) - that accepts network flow data in multiple different formats and flexibly processes it into time-series aggregates rep......
USENIX Systems Administration Conference  2006
0次引用 0 0
Co-ordinated Port Scans: A Model, A Detector and An Evaluation Methodology  
8次引用 0 0

1/2 第一页 上一页 1 2 下一页
Feedback
Feedback
Feedback
我想反馈:
排行榜