Next: About this document ...
Up: Role Classification of Hosts
Previous: Summary
- 1
-
BECKER, R. A., EICK, S. G., AND WILKS, A. R.
Visualizing network data.
IEEE Transactions on Visualization and Computer Graphics 1, 1
(1995), 16-28.
- 2
-
CERT COORDINATION CENTER.
CERT Advisory CA-2001-19: Code Red Worm Exploiting Buffer Overflow
In IIS Indexing Service DLL, July 2001.
- 3
-
CERT COORDINATION CENTER.
CERT Advisory CA-2001-26: Nimda Worm.
https://www.cert.org/advisories/CA-2001-26.html, September 2001.
- 4
-
CHESWICK, B., AND BELLOVIN, S. M.
Firewalls and Internet Security: Repelling the Wily Hacker.
Addison Wesley, 1994.
- 5
-
CHESWICK, B., BURCH, H., AND BRANIGAN, S.
Mapping and visualizing the Internet.
In Proceedings of the 2000 USENIX Annual Technical
Conference (San Diego, CA, June 2000).
- 6
-
CISCO SYSTEMS.
Cisco IOS NetFlow.
https://cisco.com/warp/public/732/netflow.
- 7
-
CISCO SYSTEMS.
Dynamic VLANs.
https://cisco.com/univercd/cc/td/doc/product/lan/cat5000/rel_5_2/config/vmps.htm.
- 8
-
COMPUTER ASSOCIATES INTERNATIONAL.
Unicenter.
https://cai.com/unicenter.
- 9
-
CORMEN, T. H., LEISERSON, C. E., AND RIVEST, R. L.
Introduction to Algorithms.
The MIT Press and McGraw-Hill, 1990.
- 10
-
DENNING, D. E.
An intrusion-detection model.
IEEE Transactions on Software Engineering 13, 2 (Feb. 1987),
222-232.
- 11
-
EICK, S. G., AND WILLS, G. J.
Navigating large networks with hierarchies.
In Proceedings of the IEEE Conference in Visualization
(25-29 1993), pp. 204-210.
- 12
-
HALKIDI, M., BATISTAKIS, Y., AND VAZIRGIANNIS, M.
On clustering validation techniques.
Journal of Intelligent Information Systems 17, 2-3 (2001),
107-145.
- 13
-
HARRISON, H. E., MITCHELL, M. C., AND SHADDOCK, M. E.
Pong: A flexible network services monitoring system.
In Proceedings of the USENIX 8th System Administration
Conference (LISA VIII) (San Diego, CA, Sept. 1994).
- 14
-
HARTIGAN, J.
Clustering Algorithms.
John Wiley, 1988.
- 15
-
HEWLETT-PACKARD COMPANY.
OpenView.
https://openview.hp.com.
- 16
-
HUBERT, L., AND ARABIE, P.
Comparing Partitions.
Journal of Classification 2 (1985), 193-218.
- 17
-
INTERNATIONAL BUSINESS MACHINES.
Tivoli Software.
https://tivoli.com.
- 18
-
JACOBSON, V., LERES, C., AND MCCANNE, S.
tcpdump.
https://www-nrg.ee.lbl.gov, 1991.
- 19
-
JAIN, A. K., MURTY, M. N., AND FLYNN, P. J.
Data clustering: a review.
ACM Computing Surveys 31, 3 (1999), 264-323.
- 20
-
KEYS, K., MOORE, D., KOGA, R., LAGACHE, E., TESCH, M., AND CLAFFY, K.
The architecture of CoralReef: an Internet traffic monitoring
software suite.
In PAM2001 Workshop on Passive and Active Measurements (Apr.
2001), CAIDA.
https://www.caida.org/tools/measurement/coralreef/.
- 21
-
KOHLER, E., MORRIS, R., CHEN, B., JANNOTTI, J., AND KAASHOEK, M. F.
The Click modular router.
ACM Transactions on Computer Systems 18, 3 (August 2000),
263-297.
- 22
-
MUKHERJEE, B., HEBERLEIN, L., AND LEVITT, K.
Network intrusion detection.
IEEE Network 8, 3 (May-June 1994), 26-41.
- 23
-
PATARIN, S., AND MAKPANGOU, M.
Pandora: a flexible network monitoring platform.
In Proceedings of the 2000 USENIX Annual Technical
Conference (San Diego, CA, June 2000).
- 24
-
PLONKA, D.
Flowscan: A network traffic flow reporting and visualization tool.
In Proceedings of the USENIX 14th System Administration
Conference (LISA XIV) (New Orleans, LA, December 2000).
- 25
-
SIPSER, M.
Introduction to the Theory of Computation.
PWS Publishing Company, 1997.
- 26
-
SNOEREN, A. C., AND BALAKRISHNAN, H.
An End-to-End Approach to Host Mobility.
In Proceedings of the ACM Conference on Mobile Computing and
Networking (Boston, MA, 2000).
- 27
-
TARJAN, R.
Data Structures and Network Algorithms.
Society for Industrial and Applied Mathematics, 1983.
- 28
-
WALDBUSSER, S.
Remote Network Monitoring Management Information Base Version 2.
Network Working Group RFC 2021, Jan. 1997.
Godfrey Tan
2003-04-01