Observing Internet Worm and Virus Attacks with a Small Network Telescope

[1]  Jeffrey M. Hausdorff,et al.  Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .

[2]  Walter Willinger,et al.  On the self-similar nature of Ethernet traffic , 1993, SIGCOMM '93.

[3]  William H. Press,et al.  Numerical Recipes in C, 2nd Edition , 1992 .

[4]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[5]  Stefan Savage,et al.  Network Telescopes: Technical Report , 2004 .

[6]  H. Stanley,et al.  Quantification of scaling exponents and crossover phenomena in nonstationary heartbeat time series. , 1995, Chaos.

[7]  C. Peng,et al.  Mosaic organization of DNA nucleotides. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[8]  David M. Nicol,et al.  Multiscale Modeling and Simulation of Worm Effects on the Internet Routing Infrastructure , 2003, Computer Performance Evaluation / TOOLS.

[9]  D. Haar,et al.  Statistical Physics , 1971, Nature.

[10]  D. T. Kaplan,et al.  A comparison of estimators for noise , 1998 .

[11]  Vinod Yegneswaran,et al.  Characteristics of internet background radiation , 2004, IMC '04.

[12]  Sándor Molnár,et al.  On the propagation of long-range dependence in the Internet , 2000, SIGCOMM.

[13]  William H. Press,et al.  Numerical recipes in C (2nd ed.): the art of scientific computing , 1992 .

[14]  Vinod Yegneswaran,et al.  On the Design and Use of Internet Sinks for Network Abuse Monitoring , 2004, RAID.

[15]  The SASSER Event: History and Implications , 2004 .

[16]  Maya Paczuski,et al.  Correlated dynamics in human printing behavior , 2004, ArXiv.

[17]  William H. Press,et al.  Numerical recipes in C , 2002 .

[18]  Peter G. Harrison,et al.  Measurement and modelling of self-similar traffic in computer networks , 2004 .

[19]  S. Havlin,et al.  Detecting long-range correlations with detrended fluctuation analysis , 2001, cond-mat/0102214.

[20]  Hyogon Kim,et al.  Real-time visualization of network attacks on high-speed links , 2004, IEEE Network.

[21]  Van-Hau Pham,et al.  Understanding threats: a prerequisite to enhance survivability of computing systems , 2008, Int. J. Crit. Infrastructures.