@article{Castro2002, author = "Castro, M. and Druschel, P. and Ganesh, A. and Rowstron, A. and Wallach, D.S.", title = "Peer-to-peer infrastructure: Secure routing for structured peer-to-peer overlay networks ", journal = "ACM SIGOPS Operating Systems Review", volume = 36, year = 2002, pages = "299 --314"} @inproceedings{Wang2001, author = "Wang, J. and Lu, J. and Chien, A. A.", title = "Tolerating denial-of-service attacks using overlay networks: impact of topology", booktitle = "Proc. of the ACM workshop on Survivable and self-regenerative systems: in association with 10th ACM Conference on Computer and Communications Security", year = 2001, pages = "43--52"} @inproceedings{Akella2004, author = "Akella, A. and Pang, P. and Maggs, B. and Seshan, S. and Shaikh, A.", title = "A comparison of overlay routing and multihoming route control", booktitle = "Proc. of ACM SIGCOMM", year = 2004, pages = "93--106"} @article{Stoica2004, author = "Stoica, I. and Adkins, D. and Zhuang, S. and Shenker, S. and Surana, S.", title = "Internet indirection infrastructure", journal = "IEEE/ACM Trans. on Networking", volume = 12, number = 2, year = 2004, pages = "205--218"} @inproceedings{Lakshminarayanan2004, author = "Lakshminarayanan, A. and Adkins, D. and Perrig, A. and Stoica, I.", title = "BA session: P2P and network algorithms: Brief announcement: towards a secure indirection infrastructure", booktitle = "Proceedings of the 23rd ACM Symposium on Principles of distributed computing", year = 2004} @inproceedings{Handley2004, author = "Handley, M. and Greenhalgh, A.", title = "New architectures: Steps towards a DoS-resistant internet architecture", booktitle = "Proc. of the ACM SIGCOMM workshop on Future directions in network architecture", year = 2004, pages = "49--56"} @inproceedings{Chow2004, author = "Chow, C. E. and Cai, Y. and Wilkinson, D. and Godavari, G.", title = "Secure collective defense system", booktitle = "Proc. of the IEEE GLOBECOM", year = 2004, pages = "2245--2249"} @inproceedings{Chow2004b, author = "Wilkinson, D. and Chow, C. E. and Cai, Y.", title = "Enhanced Secure Dynamic DNS Update with Indirect Route", booktitle = "Proc. of the IEEE Information assurance workshop", year = 2004} @article{Balakrishnan2004, author = "Balakrishnan, H. and Lakshminarayanan, K. and Ratnasamy, S. and Shenker, S. and Stoica, I. and Walfish, M.", title = "A layered naming architecture for the {Internet}", journal = "ACM SIGCOMM Computer Communication Review", volume = 34, number = 4, year = 2004, pages = "343--352"} @inproceedings{Pang2004, author = "Pang, J. and Hendricks, J. and Akella, A. and Prisco, R. D. and Maggs, B. and Seshan, S.", title = "DNS: Availability, usage, and deployment characteristics of the domain name system", booktitle = "Proc. of the 4th ACM SIGCOMM Workshop on Internet measurement", year = 2004, pages = "1--14"} @article{Ning2004, author = "Ning, P. and Cui, Y. and Reeves, D. S. and Xu, D. ", title = "Techniques and tools for analyzing intrusion alerts", journal = "ACM Trans. on Information and System Security", volume = 7, number = 2, year = 2004, pages = "274--318"} @article{Julisch2004, author = "Julisch, K.", title = "Clustering intrusion detection alarms to support root cause analysis", journal = "ACM Trans. on Information and System Security", volume = 6, number = 4, year = 2004, pages = "443--471"} @inproceedings{Sun2004, author = "Sun, B. and Wu, K. and Pooch, U. W.", title = "Secure wireless protocols: Alert aggregation in mobile ad hoc networks", booktitle = "Proc. of the ACM Workshop on Wireless Security", year = 2004, pages = "69--78"} @article{Lee2002, author = "Lee, W.", title = "Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility", journal = "ACM SIGKDD Explorations Newsletter", volume = 4, number = 2, year = 2002, pages = "35--42"} @inproceedings{Vaarandi2003, author = "Vaarandi, R.", title = "A Data Clustering Algorithm for Mining Patterns From Event Logs", booktitle = "Proc. of the IEEE Workshop on {IP} operations and management", year = 2003, pages = "119--126"} @inproceedings{Apos00, author = "Apostolopoulos, G. and Aubespin, D. and Peris, V. and Pradhan, P. and Saha, D.", title = "Design, Implementation and Performance of a Content-Based Switch", booktitle="Proc. of IEEE INFOCOM", year = 2000} @inproceedings{Aver00, author = "Aversa, L. and Bestavros, A.", title = "Load Balancing a Cluster of Web Servers: Using Distributed Packet Rewriting", booktitle= "Proc. of IEEE IPCCC", year = 2000} @inproceedings{Bakr95, author = "Bakre, A. and Badrinath, B. R.", title = "I-TCP: Indirect {TCP} for mobile hosts", booktitle="Proc. 15th Int. Conf. Distributed Computing System (ICDCS)", year = 1995} @inproceedings{Bane96a, author = "Banerjea, A.", title = "Taxonomy of Dispersity Routing Schemes for Fault Tolerant Real-Time Channels", booktitle="Proc. ECMAST", year = 1996} @inproceedings{Bane96b, author = "Banerjea, A.", title = "Simulation Study of the Capacity Effects of Dispersity Routing for Fault Tolerant Real-time Channels", booktitle="Proc. ECMAST", year = 1996} @inproceedings{Best98, author = "Bestavros, A.", title = "Distributed Packet Rewriting and is Application to Scalable Server Architectures", booktitle="Proc. of Int'l Conf. of Networks and Protocols", year = 1998} @inproceedings{Briesemeister03, author = "Briesemerister, L. and Lincoln, P. and Porras, P.", title = "Epidemic profiles and defense of Scale-Free Networks", booktitle="Proc. of ACM WORM", year = 2003} @inproceedings{Byer99, author = "Byers, J.", title = "Accessing Multiple Mirror Sites in Parallel: Using Tornado Codes to Speed Up Downloads", booktitle="Proc. of IEEE INFOCOM", year = 1999} @inproceedings{Cear03, author = "Cearns, A. and Chow, C. E. ", title = "A2D2: Design of an Autonomous Anti-DDoS (A2D2) Network", booktitle="Proc. of IASTED Conf. on Applied Informatic", year = 2003} @inproceedings{Chow95a, author = "Chow, C.E. and Bicknell,J. and Syed, S.", title = "Performance Analysis of Fast Link Restoration Algorithms", booktitle="Proc. of IASTED Conf. on Applied Informatic", year = 1995} @inproceedings{Chow99, author = "Chow, C. E. and Hansmats, A.", title = "Design and Analysis of One Prong Network Restoration Algorithms", booktitle="Proc. of IASTED Conf. on Applied Informatic", year = 1999} @inproceedings{Chow01a, author = "Chow, C. E. and Semwal, I.", title = "Web Load Balancing Through More Accurate Server Report", booktitle="Proc. of 2nd Int'l Conf. of Parallel and Distributed Computing", year = 2001} @inproceedings{Chow01b, author = "Chow, C. E. and Wang, W.", title = "The Design and Implementation of Linux LVS-based Content Switch", booktitle="Proc. of 2nd Int'l Conf. of Parallel and Distributed Computing", year = 2001} @inproceedings{Chow03a, author = "Chow, C. E. and Godavari, G. and Cai, Y.", title = "LSWS: Linux-based Secure Web Switch", booktitle="Proc. of IASTED Conf. on Applied Informatics", year = 2003} @inproceedings{Chow03b, author = "Chow, C. E. and Prakash, C.", title = "Enhance Features and Performance of a Linux-based Content Switch", booktitle="Proc. of IASTED Conf. on Applied Informatic", year = 2003} @inproceedings{Chow04, author = "Chow, C. E. and Fong,P. J. and Godavari, G.", title = "An Exercise in Constructing Secure Mobile {Ad Hoc} Networks", booktitle="Proc. of Int'l Conf. on Advanced Information Networking and Applications", year = 2004} @inproceedings{Cohen99, author = "Cohen99", title = "An Exercise in Constructing Secure Mobile {Ad Hoc} Networks", booktitle="Proc. of 2nd USENIX Symposium on Internet Technologies and Systems (USITS)", year = 1999} @inproceedings{Garetto03, author = "Garetto, M. and Gong, W. and Towsley, D.", title = "Modeling Malware Spreading Dynamics", booktitle="Proc. of IEEE INFOCOM", year = 2003} @inproceedings{Haas02, author = "Haas, Z. J.", title = "Gossip-Based Ad Hoc Routing", booktitle="Proc. of IEEE INFOCOM", year = 2002} @inproceedings{Karl03, author = "Karlof, A. and Wagner, D.", title = "Secure Routing in Sensor Networks: Attacks and Countermeasures", booktitle="Proc. of 1st IEEE Int'l Workshop on Sensor Network Protocols and Applications", year = 2003} @inproceedings{Kris93, author = "Krishnan, R. and Silvester, J. A.", title = "Choice of Allocation Granularity in Multiple path Source Routing Schemes", booktitle="Proc. of IEEE INFOCOM", year = 1993} @inproceedings{Maxe75, author = "Maxemchuk, N. F.", title = "Dispersity Routing", booktitle="Proc. of ICC", year = 1975} @inproceedings{Nasi99, author = "Nasipuri, A. and Das, S.R.", title = "On-demand multiple path routing for mobile ad hoc networks", booktitle="Proc. of 8th Int'l Conf. on Computer Communications and Networks (ICCCN)", year = 1999} @inproceedings{Para03, author = "Paruchuri, V. S. and Durresi,A. and Dash,D. S. and Jain, R.", title = "Optimal Flooding Protocol for Routing in Ad-hoc Networks", booktitle="Proc. of 8th Int'l Conf. on Computer Communications and Network (ICCCN)", year = 2003} @inproceedings{Pear00, author = "Pearlman, M. R. et al.", title = "On the impact of Alternate Path Routing for Load Balancing in Mobile Ad Hoc Networks", booktitle="Proc. of MobiHOC", year = 2000} @inproceedings{RCho01, author = "Chow, R. and Lee, C. and Liu, J.", title = "Traffic Dispersion Strategies for Multimedia Streaming", booktitle="Proc. of 8th IEEE Workshop on Future Trends on Distribute Computing", year = 2001} @inproceedings{Rodr00, author = "Rodr00", title = "Traffic Dispersion Strategies for Multimedia Streaming", booktitle="Proc. of IEEE INFOCOM", year = 2000} @inproceedings{Vutu01 , author = "Vutukury, S. and Garcia-Luna-Aceves, J.J.", title = "MDVA: a distance-vector multipath routing protocol, ", booktitle="Proc. of IEEE INFOCOM", year = 2001} @inproceedings{Wang00, author = "Wang, L. and Zhang, L. and Shu, Y. and Dong, M.", title = "Multipath source routing in wireless {Ad Hoc} networks", booktitle="Proc. of IEEE INFOCOM", year = 2000} @inproceedings{Wong00, author = "Wong, C. K. and Lam, S. S.", title = "Keystone: A Group Key Management Service", booktitle="Proc. of Int'l Conf. on Telecommunication", year = 2000 } @inproceedings{Yava94 , author = "Yavatkar, R. and Bhagawat, N.", title = "Improving End-to-end Performance of {TCP} over Mobile Internetworks", booktitle="Proc. IEEE Workshop on Mobile Computing Systems and Applications", year = 1994} @inproceedings{Dean01, author = "Dean, D. and Franklin, M. and Stubblefield, A.", title = "An Algebraic Approach to {IP} Traceback", booktitle="Proc. 8th Network and Distributed System Security Symp.", year = 2001} @inproceedings{Park01, author = "Park, K. and Lee, H.", title = "On the Effectiveness of Probabilistic Packet Marking for IP Trace-back under Denial of Service Attack", booktitle="Proc. of IEEE INFOCOM", year = 2001} @inproceedings{Lee01, author = "Lee, S. and Gerla, M.", title = "Split multiple path routing with maximally disjoint paths in ad hoc networks", booktitle = "Proc. of ICC", year = 2001} @article{Ayan93, author = "Ayanoglu, E. et al", title = "Diversity Coding for Transparent Self-Healing and Fault-Tolerant Communication Networks", journal = "IEEE Trans. on Communications", volume=41, number=11, year = 1993} @article{Gust97, author = "Gustafsson, E. and Karlsson, G.", title = "A Literature Survey on Traffic Dispersion", journal = "IEEE Network", volume= 11, number= 2, year = 1997, pages="28--36"} @article{Bala95, author = "Balakrishnan, H. and S. Seshan, S. and and Katz, R.", title = "Improving reliable transport and handoff performance in cellular wireless networks", journal = "Wireless Network", volume=1, number=4, year = 1995} @article{Bane97, author = "Banerjea, A.", title = "On the use of Dispersity Routing for Fault Tolerant Real-time Channels", journal = "European Transactions on Telecommunication", volume=8, number=4, year = 1997, pages="393--407"} @article{Brow97, author = "Brown, K. and Singh, S.", title = "{M-TCP: TCP} for mobile cellular networks", journal = "ACM Comput. Commun.", volume=27, number=5, year = 1997, pages="19-43"} @article{Choi03, author = "Choi, W. and Das, S. K.", title = "Design and Performance Analysis of a Proxy-Based Indirect Routing Scheme in {Ad Hoc} Wireless Networks", journal = "Mobile Networks and Applications", volume=8, year = 2003, pages="499-515"} @article{Chow95, author = "Chow, C.E.", title = "Resource Allocation for Multiparty Connections", journal = "Journal of Systems and Software", year = 1995} @article{Liu01, author = "Liu. J. and Singh, S.", title = "ATCP: TCP for Mobile ad hoc Networks", journal = "IEEE J. on Selected Areas on Communications", volume=19, year = 2001, pages="1300--1315"} @article{Maxe93, author = "Maxemchuk, N. F.", title = "Dispersity Routing in High-Speed Networks", journal = "Computer Networks and ISDN Systems", volume=25, year = 1993, pages="645--661"} @article{Perr02, author = "Perrig, A. and Szewczyk,R. and Tygar, J.D. and Victorwen and Culler, D. E.", title = "SPINS: Security Protocols for Sensor Networks", journal = "Wireless Networks", volume=8, year = 2002, pages="521--534"} @article{Tsir01 , author = "Tsirigos, A. and Haas, Z. J.", title = "Multiple path Routing in the Presence of Frequent TopologicalChanges", journal = "IEEE Communication Magzine", year = 2001, pages="132--139"} @article{Zegu00, author = "Zegura, E. W. and Ammar, M. H. Z. and Fei, and Bhattacharjee, S.", title = "Application-layer anycasting: a server selection architecture and use in a replicated web service", journal = "IEEE Trans. on Networking", volume=8, number=4, year = 2000, pages="455--466"} @techreport{Adhya01, author ="Adhya, S. K.", title ="Asymmetric TCP Splice: A Kernel Mechanism to Increase the Flexibility of TCP Splice", institution ="Indian Institute of Technology", year =2001} @techreport{Chen99, author ="Chen, J.", title ="New Approaches to Routing for Large Scale Data Networks", institution ="Ph.D. Dissertation, Rice University", year ="1999"} @techreport{Zapa01, author ="Zapata, M.G.", title ="Secure {Ad Hoc} On-Demand Distance Vector {(SAODV)} Routing.", institution ="http://www.ietf.org/internet-drafts/draft-guerrero-manet-saodv-00.txt, Internet Draft", year ="2001"} @techreport{Carm00, author ="Carman, D. W. and Kruus, P. S. and Matt, B. J.", title ="Constraints and Approaches for Distributed Sensor Network Security", institution ="NAI Labs Technical Report 00-010", year ="2000"} @techreport{Cart97, author ="Carter, R. L. and Crovella, M. E.", title ="Dynamic Server Selection Using Bandwidth Probing in Wide-Area Networks", institution ="TR-96-007, Boston University Computer Science Department", year ="1996"} @misc{Akam, author ="Akamai", title ="A content delivery service provider", note ="http://www.akamai.com/en/html/services/services.html"} @misc{Jabb, author ="Jabber Software Foundation", title ="JabberX, Jabber client", note ="http://jabberx.jabberstudio.org"} @misc{LVS, author ="Linux Virtual Server Project", title ="LVS", note ="http://www.linuxvirtualserver.org/"} @misc{OPEN, author ="OpenSSL project", title ="{OpenSSL}", note ="http://www.openssl.org/"} @book{Perk00, author ="Perkins, C.", title ="{Ad Hoc} Networking", publisher ="Addison-Wesley Pub Co; ISBN: 0201309769; 1st edition", year ="2000"} @book{Albi01, author ="Albitz, P. and Liu, C.", title ="{DNS and BIND}", publisher ="O'Reilly \& Associates, Inc.", year ="2001"} @techreport{Chow03c, author ="Chow E. and Cai, Y.", title ="Algorithms for Selecting Multiple Mirror Sites for Parallel Download", institution ="UCCS CS technical Report, http://cs.uccs.edu/~scold/doc/mspd.doc", year ="2003"} @inproceedings{Jami00, author = "Jamin, S. and Jin, C. and Raz, D. and Shavitt, Y. and Zhang, L.", title = "On the placement of {Internet} instrument", booktitle="Proc. of IEEE INFOCOM, Mar. 2000", year = 2000} @article{Juli03, author = "Klaus Julisch", title = "Clustering Intrusion Detection Alarms to Support Root Cause Analysis", journal = "ACM Trans. on Information and System Security", volume=6, number=4, year = 2003, pages="443--471"} @article{Kris00, author = "Krishnan, P. and Raz, D. and Shavitt, Y.", title = "The cache location problem", journal = "ACM/IEEE Transactions on Networking", volume=8, number=5, year = 2000, pages=""} @inproceedings{Li99, author = "Li, B. and Golin, M. J. and Ialiano, G. F. and Deng, X.", title = "On the optimal placement of web proxies in the {Internet}", booktitle="Proc. of IEEE INFOCOM", year = 1999} @inproceedings{Qiu01, author = "Qiu, Li and Padmanabhan, V. N. and Voelker, G. M.", title = "On the placement of {Web} server replicas", booktitle="Proc. of IEEE INFOCOM", year = 2001} @inproceedings{Rodr00, author = "Rodriguez, P. and Kirpal, A. and Biersack, E. W.", title = "Parallel-Access for Mirror Sites in the Internet", booktitle="Proc. of IEEE INFOCOM", year = 2000} @techreport{Wilk03, author ="David B. Wilkinson", title ="Enhanced Secure {DNS}: A Defense Against {DDoS} Attack", institution ="Master Thesis, UCCS", year ="2003"} @techreport{Yilm01, author ="E. Yilmaz and Y. Manzano", title ="Surveying Formal and Practical Approaches for Optimal Placement of Replicas on the {Web}", institution ="http://websrv.cs.fsu.edu/research/reports/TR-020701.pdf", year ="2001"} @techreport{IDIP, author = "Network Associates Labs, Boeing Phantom Works.", title = "Intrusion Detection and Isolation Protocol, {IDIP}", instruction ="http://zen.ece.ohiou.edu/~inbounds/DOCS/reldocs/IDIP_Application_Layer.doc", year = "2002"} @article{Zhang03, author = "Zhang, Y. and Lee, W. and Huang, Y.", title = "Intrusion Detection Techniques for Mo-bile Wireless Networks", journal = "Wireless Network", volume=9, year =2003, pages="545--556"} @article{Spaf00, author = "Spafford, E. H. and Zamboni, D.", title = "Intrusion detection using autonomous agents", journal = "Computer Networks", volume=34, number=4, year =2000, pages="547--570"} @inproceedings{Porr97, author = "Porras,P. A. and Neumann, P. G.", title = "EMERALD: event monitoring enabling responses to anomalous live disturbances", booktitle="In 1997 National Information Systems Security Conference", year = 1997} @inproceedings{Snap91, author = "Snapp, S. and Brentano, J. and Dias, G.", title = "DIDS (Distributed Intrusion Detection System) motiva-tion, architecture, and an early prototype", booktitle="In Proceedings of the 14th National Computer Security Conference", year = 1991} @inproceedings{Zhu01, author = "Zhu, H. and Tang, H. and Yang, T.", title = "Demand-driven Service Differentiation for Cluster-based Network Servers", booktitle = "Proc. IEEE INFOCOM", year = 2001, pages = "679--688"} @article{Zhou-TPDS04, author = "Zhou, X. and Xu, C.-Z.", title = "Harmonic Proportional Bandwidth Allocation and Scheduling for Service Differentiation on Streaming Servers", journal = "IEEE Trans. on Parallel and Distributed Systems", volume = 15, number = 9, year = 2004, pages = "835--848"} @Inproceedings{Wei:GLOBECOM04, author = "Wei, J. and Xu, C.-Z. and Zhou, X.", title = "A Robust Packet Scheduling algorithm for Proportional Delay Differentiation services", booktitle = "Proc. of IEEE Globecom", year = "2004" } @inproceedings{Zhou-ICWS04, author = "Zhou, X. and Cai, Y. and Godavari, G. K. and Chow, C. E.", title = "An adaptive process allocation strategy for proportional responsiveness differentiation on {Web} servers", booktitle = "Proc. IEEE 2nd Int'l Conf. on Web Services (ICWS)", year = "2004", month = "July" } @inproceedings{Zhou-ICDCS04, author = "Zhou, X. and Wei, J. and Xu, C.-Z.", title = "Modeling and Analysis of {2D} Service Differentiation on {e-Commerce} Servers", booktitle = "Proc. of IEEE 24th Int'l Conf. on Distributed Computing Systems (ICDCS)", year = 2004, month = "{March}", pages = "740--747"} @inproceedings{Zhou-IPDPS04, author = "Zhou, X. and Wei, J. and Xu, C.-Z.", title = "Processing rate allocation for proportional slowdown differentiation on {Internet} Servers", booktitle = "Proc. IEEE 18th Int'l Parallel and Distributed Processing Symp. (IPDPS)", year = 2004, pages = "88--97", month = "{April}"} @article{Abdelzaher02, author = "Abdelzaher, T. F. and Shin, K. G. and Bhatti, N.", title = "Performance Guarantees for {Web} server end-systems: a control-theoretical approach", journal = "IEEE Trans. on Parallel and Distributed Systems", volume = 13, number = 1, year = 2002, pages = "80--96"} @article{Bhatti99, author = "Bhatti, N. and Friedrich, R.", title = "Web server support for tiered services", journal = "IEEE Network", volume = 13, number = 5, year = 1999, pages = "64--71"} @article{Blake98, author = "Blake, S. and Black, D. and Carlson, M. and Davies, E. and Wang Z. and Weiss, W.", title = "An architecture for differentiated services", journal = "IETF RFC 2475", year = 1998} @article{Chandra00a, author = "Chandra, S. and Ellis, C. S. and Vahdat, A.", title = "Application-level Differentiated Multimedia {Web} Services Using Quality Aware Transcoding", journal = "IEEE J. on Selected Areas in Communications", volume = 18, number = 12, year = 2000, pages = "2544--2265"} @article{Chen02a, author = "Chen, X. and Mohapatra, P.", title = "Performance Evaluation of Service Differentiating {Internet} Servers", journal = "IEEE Trans. on Computers", volume = 51, number = 11, year = 2002, pages = "1,368--1,375"} @inproceedings{Lee02, author = "Lee, S. C. M. and Lui, J. C. S. and Yau, D. K. Y.", title = "Admission control and dynamic adaptation for a proportional-delay {DiffServ}-enabled {Web} server", booktitle = "Proc. ACM SIGMETRICS", year = 2002} @article{Leung01, author = "Leung, M. K. H. and Lui, J. C. S. and Yau, D. K. Y.", title = "Adaptive Proportional Delay Differentiated Services: Characterization and Performance Evaluation", journal = "IEEE/ACM Trans. on Networking", volume = 9, number = 6, year = 2001, pages = "908-817"} @inproceedings{Ko03, author = "Ko, B. and Lee, K. and Amiri, K. and Calo, S.", title = "Scalable Service Differentiation in a Shared Storage Cache", booktitle = "Proc. 23rd IEEE Int'l Conf. on Distributed Computing Systems (ICDCS)", year = 2003} @inproceedings{Dovrolis99, author = "Dovrolis, C. and Stiliadis, D. and Ramanathan, P.", title = "Proportional Differentiated Services: Delay Differentiation and Packet Scheduling", booktitle = "Proc. ACM SIGCOMM", year = 1999} @article{Dovrolis02, author = "Dovrolis, C. and Stiliadis, D. and Ramanathan, P.", title = "Proportional Differentiated Services: Delay Differentiation and Packet Scheduling", journal = "IEEE/ACM Trans. on Networking", volume = 10, number = 1, year = 2002, pages = "12-26"} @inproceedings{Stan96, author = "Chen, S. and Cheung, S. and Crawford, R. and Dilger, M.", title = "{GrIDS-a} graph based intrusion detection system for large networks", booktitle="In Proc. of the 19th National Information Systems Security Conference", year = 1996} @article{Ning01, author = "Ning, P. and Jajodia, S. and Wang, S. ", title = "Abstraction-based Intrusion Detection in Distributed Environments", journal = "ACM Trans. on Information and System Security (TISSEC)", volume=4, year = 2001, pages="407--452"}