References
- J. P. Martin-Flatin, G. Jakobson, and L. Lewis, "Event correlation in integrated management: Lessons learned and outlook," J. Netw. Syst. Manage., vol. 15, no. 4, pp. 481–502, 2007. https://doi.org/10.1007/s10922-007-9078-5
- K. McCloghrie, D. Perkins, and J. Schoenwaelder, "Structure of management information version 2 (SMIv2)," RFC 2587, Apr. 1999.
- "Information technology-open systems interconnection-structure of management information: Guidelines for the definition of managed objects," ISO/IEC 10165-4:1992 / ITU-T X.722, 1992.
- R. Danyliw, J.Meijer, and Y. Demchenko, "The incident object description exchange format," RFC 5070, Dec. 2007.
- C. Shannon and D. Moore. (2004, Mar.). The CAIDA dataset on the witty worm. Cisco Systems, Limelight Networks, the US Department of Homeland Security, the National Science Foundation, DARPA, Digital Envoy, and CAIDA Members. [Online]. Available: http://www.caida.org/data/passive/witty worm dataset.xml
- C. Shannon, D. Moore, and E. Aben. (2007, Jan.–Nov.). The CAIDA backscatter-2007 dataset. [Online]. Avilable: http://www.caida.org/data /passive/backscatter 2007 dataset.xml
- CAIDA. [Online]. Available: http://www.caida.org/home
- The darknet project. [Online]. Available: http://www.team-cymru.org/Ser vices/darknets.html
- C. C. Zou,W. Gong, and D. Towsley, "Code red worm propagation modeling and analysis," in Proc. the 9th ACM Conf. Comput. Commun. Security, 2002, pp. 138–147.
- C. C. Zou. (2004).Witty worm propagation modeling. [Online]. Available: http://tennis.ecs.umass.edu/ czou/research/wittyModel.html
- J. Kim, S. Radhakrishnan, and S. K. Dhall, "Measurement and analysis of worm propagation on Internet network topology," in Proc. ICCCN, 2004, pp. 495–500.
- C. Shannon and D. Moore, "The spread of the witty worm," IEEE Secuity and Privacy, vol. 2, no. 4, pp. 46–50, 2004. https://doi.org/10.1109/MSP.2004.59
- N. Weaver and D. Ellis, "Reflections on witty: Analyzing the attacker," login:, vol. 29, no. 3, pp. 34–37, 2004.
- C. C. Zou, D. Towsley, and W. Gong, "On the performance of internet worm scanning strategies," Perform. Eval., vol. 63, no. 7, pp. 700–723, 2006. https://doi.org/10.1016/j.peva.2005.07.032
- M. A. Rajab, F. Monrose, and A. Terzis, "On the effectiveness of distributed worm monitoring," in Proc. SSYM, Berkeley, CA, USA, 2005, pp. 15.
- S. Wei and J. Mirkovic, "Correcting congestion-based error in network telescope's observations of worm dynamics," in Proc. IMC, New York, NY, USA, 2008, pp. 125–130.
- D. Moore, G. M. Voelker, and S. Savage, "Inferring Internet denial-ofservice activity," in Proc. the 10th Usenix Security Symp., 2001, pp. 9–22.
- Day in the life of the Internet. [Online]. Available: http://www.caida.org/ projects/ditl
- M. Bailey, E. Cooke, F. Jahanian, J. Nazario, and D. Watson, "The Internet motion sensor: A distributed blackhole monitoring system," in Proc. NDSS, Feb. 2005.
- Y. Shinoda, K. Ikai, and M. Itoh, "Vulnerabilities of passive internet threat monitors," in Proc. SSYM, Berkeley, CA, USA, 2005, pp. 14.
- MAPS RBL. [Online]. Available: http://www.mail-abuse.com
- RBL.JP. [Online]. Available: http://www.rbl.jp/index-e.php
- Internet scan data acquisition system (ISDAS). [Online]. Available: http://www.jpcert.or.jp/isdas
- SANS Internet storm center. [Online]. Available: http://isc.sans.org
- Snort. [Online]. Available: http://www.snort.org
- XSL transformations (XSLT). [Online]. Available: http://www.w3.org/ TR/1999/REC-xslt-19991116
- "XML signature syntax and processing (second edition)," W3C Recommendation, 2008.
- "XML encryption syntax and processing," W3C Recommendation, 2002.
- "Web services description language (WSDL) version 2.0 part 1: Core language," W3C Recommendation, 2007.
- UDDI Version 3.0.2. (2004). [Online]. Available: http://uddi.org/pubs/ uddi v3.htm
- "SOAP version 1.2 part 1: Messaging framework (second edition)," W3C Recommendation, 2007.
- M. Wahl, T. Howes, and S. Kille, "Lightweight directory access protocol (v3)," RFC 2251, Dec 1997.
- CpMonitor. [Online]. Available: http://www.cysols.com/products/cpmon itor/index.html
- V. Guralnik and J. Srivastava, "Event detection from time series data," in Proc. KDD, New York, NY, USA, 1999, pp. 33–42.
- G. Medioni, I. Cohen, F. Bremond, S. Hongeng, and R. Nevatia, "Event detection and analysis from video streams," IEEE Trans. Pattern Anal. Machine Intell., vol. 23, no. 8, pp. 873–889, 2001. https://doi.org/10.1109/34.946990
- J. Case, M. Fedor, M. Schoffstall, and J. Davin, "Simple network management protocol (SNMP)," RFC 1157, May 1990.
- A. Lakhina, M. Crovella, and C. Diot, "Mining anomalies using traffic feature distributions," in Proc. ACM SIGCOMM, Philadelphia, Aug. 2005.
- Viplu´s Razor. [Online]. Available: http://razor.sourceforge.net
- DShield. [Online]. Available: http://www.dshield.org
- D. F. Ferraiolo and D. R. Kuhn, "Role-based access controls," in Proc. the 15th National Comput. Security Conf., 1992, pp. 554–563.
- E. Bertino, P. A. Bonatti, and E. Ferrari, "TRBAC: A temporal role-based access control model," ACM Trans. Inf. Syst. Secur., vol. 4, no. 3, pp. 191– 233, 2001. https://doi.org/10.1145/501978.501979