Check out the new USENIX Web site. next up previous
Next: About this document ... Up: Role Classification of Hosts Previous: Summary

Bibliography

1
BECKER, R. A., EICK, S. G., AND WILKS, A. R.
Visualizing network data.
IEEE Transactions on Visualization and Computer Graphics 1, 1 (1995), 16-28.

2
CERT COORDINATION CENTER.
CERT Advisory CA-2001-19: Code Red Worm Exploiting Buffer Overflow In IIS Indexing Service DLL, July 2001.

3
CERT COORDINATION CENTER.
CERT Advisory CA-2001-26: Nimda Worm.
https://www.cert.org/advisories/CA-2001-26.html, September 2001.

4
CHESWICK, B., AND BELLOVIN, S. M.
Firewalls and Internet Security: Repelling the Wily Hacker.
Addison Wesley, 1994.

5
CHESWICK, B., BURCH, H., AND BRANIGAN, S.
Mapping and visualizing the Internet.
In Proceedings of the 2000 USENIX Annual Technical Conference (San Diego, CA, June 2000).

6
CISCO SYSTEMS.
Cisco IOS NetFlow.
https://cisco.com/warp/public/732/netflow.

7
CISCO SYSTEMS.
Dynamic VLANs.
https://cisco.com/univercd/cc/td/doc/product/lan/cat5000/rel_5_2/config/vmps.htm.

8
COMPUTER ASSOCIATES INTERNATIONAL.
Unicenter.
https://cai.com/unicenter.

9
CORMEN, T. H., LEISERSON, C. E., AND RIVEST, R. L.
Introduction to Algorithms.
The MIT Press and McGraw-Hill, 1990.

10
DENNING, D. E.
An intrusion-detection model.
IEEE Transactions on Software Engineering 13, 2 (Feb. 1987), 222-232.

11
EICK, S. G., AND WILLS, G. J.
Navigating large networks with hierarchies.
In Proceedings of the IEEE Conference in Visualization (25-29  1993), pp. 204-210.

12
HALKIDI, M., BATISTAKIS, Y., AND VAZIRGIANNIS, M.
On clustering validation techniques.
Journal of Intelligent Information Systems 17, 2-3 (2001), 107-145.

13
HARRISON, H. E., MITCHELL, M. C., AND SHADDOCK, M. E.
Pong: A flexible network services monitoring system.
In Proceedings of the USENIX 8th System Administration Conference (LISA VIII) (San Diego, CA, Sept. 1994).

14
HARTIGAN, J.
Clustering Algorithms.
John Wiley, 1988.

15
HEWLETT-PACKARD COMPANY.
OpenView.
https://openview.hp.com.

16
HUBERT, L., AND ARABIE, P.
Comparing Partitions.
Journal of Classification 2 (1985), 193-218.

17
INTERNATIONAL BUSINESS MACHINES.
Tivoli Software.
https://tivoli.com.

18
JACOBSON, V., LERES, C., AND MCCANNE, S.
tcpdump.
https://www-nrg.ee.lbl.gov, 1991.

19
JAIN, A. K., MURTY, M. N., AND FLYNN, P. J.
Data clustering: a review.
ACM Computing Surveys 31, 3 (1999), 264-323.

20
KEYS, K., MOORE, D., KOGA, R., LAGACHE, E., TESCH, M., AND CLAFFY, K.
The architecture of CoralReef: an Internet traffic monitoring software suite.
In PAM2001 Workshop on Passive and Active Measurements (Apr. 2001), CAIDA.
https://www.caida.org/tools/measurement/coralreef/.

21
KOHLER, E., MORRIS, R., CHEN, B., JANNOTTI, J., AND KAASHOEK, M. F.
The Click modular router.
ACM Transactions on Computer Systems 18, 3 (August 2000), 263-297.

22
MUKHERJEE, B., HEBERLEIN, L., AND LEVITT, K.
Network intrusion detection.
IEEE Network 8, 3 (May-June 1994), 26-41.

23
PATARIN, S., AND MAKPANGOU, M.
Pandora: a flexible network monitoring platform.
In Proceedings of the 2000 USENIX Annual Technical Conference (San Diego, CA, June 2000).

24
PLONKA, D.
Flowscan: A network traffic flow reporting and visualization tool.
In Proceedings of the USENIX 14th System Administration Conference (LISA XIV) (New Orleans, LA, December 2000).

25
SIPSER, M.
Introduction to the Theory of Computation.
PWS Publishing Company, 1997.

26
SNOEREN, A. C., AND BALAKRISHNAN, H.
An End-to-End Approach to Host Mobility.
In Proceedings of the ACM Conference on Mobile Computing and Networking (Boston, MA, 2000).

27
TARJAN, R.
Data Structures and Network Algorithms.
Society for Industrial and Applied Mathematics, 1983.

28
WALDBUSSER, S.
Remote Network Monitoring Management Information Base Version 2.
Network Working Group RFC 2021, Jan. 1997.



Godfrey Tan 2003-04-01