

Finest Source-Based Refinery of Spam in Networks
Abstract
Keywords
References
Reuters, “The cost of ‘code red’: $1.2 billion,” USA Today, Aug. 2001, http://usatoday.com/tech/news/2001-08-01-code-red-costs.htm.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, “Inside the slammer worm,” IEEE Security & Privacy Magazine, vol. 1, pp. 33–39, July-Aug. 2003.
D. Moore, C. Shannon, and K. Claffy, “Code-red: a case study on the spread and victims of an internet worm,” in Proc. of ACM SIGCOMM Workshop on Internet measurement, Marseille, France, 2002, pp. 273– 284.
Cisco, “Network security features on the Cisco integrated services routers,” data sheet, 2005, http://www.cisco.com/application/pdf/en/us/guest/products/ps5854/ c1650/cdccont 0900aecd80169b0a.pdf.
G. R. Cantieni, G. Iannaccone, C. Barakat, C. Diot, and P. Thiran, “Reformulating the monitor placement problem: Optimal network-wide sampling,” February 2005. [Online]. Available: citeseer.ist.psu.edu/753975.html
K. Suh, Y. Guo, J. Kurose, and D. Towsley, “Locating network monitors: complexity, heuristics, and coverage,” in Proc. of 24th IEEE Infocom, Miami, FL, USA, March 2005.
M. Kodialam and T. V. Lakshman, “Detecting network intrusions via sampling: A game theoretic approach,” in Proc. of 22nd IEEE Infocom, vol. 3, San Fransisco, CA, USA, April 2003, pp. 1880–1889.
K. Luther, R. Bye, T. Alpcan, A. M¨uller, and S¸ . Albayrak, “A cooperative AIS framework for intrusion detection,” in Proc. of IEEE Int. Conf. on Communications (ICC-2007), Glasgow, Scotland, June 2007.
U. Brandes, “A faster algorithm for betweenness centrality,” Journal of Mathematical Sociology, vol. 25, no. 2, pp. 163–177, 2001.
“Understanding ACL on Catalyst 6500 series switches,” Cisco Systems, San Jose, CA, 2003 [Online]. Available: http://www.cisco.com/en/US/products/hw/switches/s708/products_white_paper09186a00800c9470.shtml
“Protecting your core: Infrastructure protection access control lists,” Cisco Systems, San Jose, CA, 2008 [Online]. Available: http://www.cisco.com/en/US/tech/tk648/k361/technologies_white_paper09186a00801a1a55.shtml
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.