Now showing items 1-8 of 8

    • Characteristics of Network Delays in Wide Area File Transfers 

      Barford, Paul; Donoho, David; Flesia, Ana; Yegneswaran, Vinod (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • A Framework for Malicious Workload Generation 

      Sommers, Joel; Yegneswaran, Vinod; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2004)
      Malicious traffic from self-propagating worms and denial-of-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats demands appropriate tools to conduct ...
    • Global Intrusion Detection in the DOMINO Overlay System 

      Yegneswaran, Vinod; Barford, Paul; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2003)
      Sharing data between widely distributed intrusion detection systems offers the possibility of significant improvements in speed and accuracy over systems operating in isolation. In this paper, we describe and evaluate ...
    • Honeygames: A Game Theoretic Approach to Defending Network Monitors 

      Cai, Jin-Yi; Yegneswaran, Vinod; Alfeld, Chris; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2006)
      A honeynet is a portion of routed but otherwise unused address space that is instrumented for network traffic monitoring. Over the past several years, honeynets have proven to be an invaluable tool for understanding the ...
    • Internet Intrusions: Global Characteristics and Prevalence 

      Yegneswaran, Vinod; Barford, Paul; Ullrich, Johannes (University of Wisconsin-Madison Department of Computer Sciences, 2002)
    • Internet Sieve: An Architecture for Generating Resilient Signatures 

      Yegneswaran, Vinod; Giffin, Jonathon; Barford, Paul; Jha, Somesh (University of Wisconsin-Madison Department of Computer Sciences, 2004)
      We present iSieve, a modular architecture for identifying intrusion profiles in packet trace data and automatically constructing resilient signatures for the profiles. The first component of the architecture organizes and ...
    • On the Design and Use of Internet Sinks for Network Abuse Monitoring 

      Yegneswaran, Vinod; Barford, Paul; Plonka, Dave (University of Wisconsin-Madison Department of Computer Sciences, 2004)
      Network abuse monitoring (eg., for intrusions and denial of service attacks) is an important component in security architecture. Monitoring unused IP addresses offers opportunities to significantly improve perspective on ...
    • Toward Comprehensive Traffic Generation for Online IDS Evaluation 

      Sommers, Joel; Yegneswaran, Vinod; Barford, Paul (University of Wisconsin-Madison Department of Computer Sciences, 2005)
      We describe a traffic generation framework for conducting online evaluations of network intrusion detection systems over a wide range of realistic conditions. The framework integrates both benign and malicious traffic, ...