Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 224,979,790 papers from all fields of science
Search
Sign In
Create Free Account
DShield
DShield is a community-based collaborative firewall log correlation system. It receives logs from volunteers worldwide and uses them to analyze…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
2 relations
Code Red (computer worm)
Internet Storm Center
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Robust Algorithm for Predicting Attacks Using Collaborative Security Logs
Mir
,
Ezapour
,
en
,
G. .
,
Uey
,
Zeng
2018
Corpus ID: 51841576
As networks become ubiquitous in our daily lives, users rely more on networks for exchanging data and communication. However…
Expand
2016
2016
Enhancement of KaPoW Plugin to Defend Against DDoS Attacks
Farah Samir Barakat
,
A. Kotb
2016
Corpus ID: 28223489
DDoS attack is one of the hardest attacks to detect and mitigate in the computer world. This paper introduces two quantitative…
Expand
2016
2016
Private and Scalable Highly Predictive Blacklisting
Luca Melis
,
Apostolos Pyrgelis
,
Emiliano De Cristofaro
2016
Corpus ID: 18836272
Collaborative approaches to network defense are increasingly used to predict and speed up detection of attacks. In this paper, we…
Expand
2015
2015
Building and Measuring Privacy-Preserving Predictive Blacklists
Luca Melis
,
Apostolos Pyrgelis
,
Emiliano De Cristofaro
arXiv.org
2015
Corpus ID: 15472401
(Withdrawn) Collaborative security initiatives are increasingly often advocated to improve timeliness and effectiveness of threat…
Expand
2014
2014
Filtering of Malicious Traffic Based on Optimal Source
Pikkili Mahendra
,
K. R. Rao
2014
Corpus ID: 53443986
We have considered the problem of blocking malicious traffic on the Internet via optimal source-based filtering. In particular…
Expand
2009
2009
Technical Report : Predicting future attacks Data analysis of Dshield data set
2009
Corpus ID: 41930410
In this report we analyzed 6 months of Dshield logs from May 2008 to October 2008 [1]. The goal of this analysis is to gain…
Expand
Highly Cited
2009
Highly Cited
2009
Automating analysis of large-scale botnet probing events
Zhichun Li
,
Anup Goyal
,
Yan Chen
,
V. Paxson
ACM Asia Conference on Computer and…
2009
Corpus ID: 13828376
Botnets dominate today's attack landscape. In this work we investigate ways to analyze collections of malicious probing traffic…
Expand
2008
2008
Filtering sources of unwanted traffic
F. Soldo
,
Karim El Defrawy
,
A. Markopoulou
,
B. Krishnamurthy
,
Jacobus E. van der Merwe
Information Theory and Applications Workshop
2008
Corpus ID: 12149550
There is a large and increasing amount of unwanted traffic on the Internet today, including phishing, spam, and distributed…
Expand
2008
2008
Filtering Sources of Unwanted Traffic Based on Blacklists
F. Soldo
,
Karim M. El Defrawy
,
A. Markopoulou
,
B. Krishnamurthy
,
K. V. Merwe
2008
Corpus ID: 18232457
There is a large and increasing amount of unwanted traffic on the Internet today, including phishing, spam, and distributed…
Expand
2003
2003
National Cyber Defense : A Design for Securing our Future
Nathan April
2003
Corpus ID: 16420046
This paper represents the base design for a national cyber defense system upon which can be largely expanded to suit the needs of…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE