direkt zum Inhalt springen

direkt zum Hauptnavigationsmenü

Sie sind hier

TU Berlin

Inhalt des Dokuments

Es gibt keine deutsche Übersetzung dieser Webseite.

Robin Sommer's Publications

D

Dreger, Holger and Kreibich, Christian and Paxson, Vern and Sommer, Robin (2005). Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context [4]. Proceedings of the 2nd GI Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA 2005)


Dreger, Holger and Feldmann, Anja and Paxson, Vern and Sommer, Robin (2008). Predicting the Resource Consumption of Network Intrusion Detection Systems [5]. RAID '08: Proceedings of the 11th International Symposium On Recent Advances In Intrusion Detection. Springer-Verlag Berlin Heidelberg, 135–154.


Dreger, Holger and Feldmann, Anja and Mai, Michael and Paxson, Vern and Sommer, Robin (2006). Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection [6]. Proceedings of the 15th Usenix Security Symposium. USENIX Association, 257–272.


Dreger, Holger and Feldmann, Anja and Paxson, Vern and Sommer, Robin (2004). Operational Experiences with High-Volume Network Intrusion Detection [7]. CCS '04: Proceedings of the 11th ACM conference on Computer and communications security. ACM Press, 2–11.


F

Friedland, Gerald and Maier, Gregor and Sommer, Robin and Weaver, Nicholas (2011). Sherlock Holmes' Evil Twin: On The Impact of Global Inference for Online Privacy [8]. New Security Paradigms Workshop (NSPW '11). ACM, 105–114.


K

Kornexl, Stefan and Paxson, Vern and Dreger, Holger and Feldmann, Anja and Sommer, Robin (2005). Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic [9]. IMC '05: Proceedings of the 5th ACM SIGCOMM Internet Measurement Conference. ACM Press, 267–272.


Kreibich, Christian and Sommer, Robin (2005). Policy-Controlled Event Management for Distributed Intrusion Detection [10]. ICDCSW '05: Proceedings of the Fourth International Workshop on Distributed Event-Based Systems (DEBS) (ICDCSW'05). IEEE Computer Society, 385–391.


M

Maier, Gregor and Feldmann, Anja and Paxson, Vern and Sommer, Robin and Vallentin, Matthias (2011). An Assessment of Overt Malicious Activity Manifest in Residential Networks [11]. Proceedings of the eighth Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA '11). Springer, 144–163.


Maier, Gregor and Sommer, Robin and Dreger, Holger and Feldmann, Anja and Paxson, Vern and Schneider, Fabian (2008). Enriching Network Security Analysis with Time Travel [12]. SIGCOMM '08: Proceedings of the 2008 conference on Applications, technologies, architectures, and protocols for computer communications. ACM Press, 183–194.


Maier, Gregor and Feldmann, Anja and Schneider, Fabian and Sommer, Robin and Paxson, Vern and Dreger, Holger (2007). Time Machine [13]. (Poster at Deutsche Telekom Laboratories Off-Site Meeting)


Maier, Gregor and Kornexl, Stefan and Feldmann, Anja and Paxson, Vern and Sommer, Robin and Schneider, Fabian and Ager, Bernhard and Dreger, Holger (2007). Time Machine [14]. (Poster at Deutsche Telekom Laboratories Annual Review Meeting)


R

Rupp, Andy and Dreger, Holger and Feldmann, Anja and Sommer, Robin (2004). Packet Trace Manipulation Framework for Test Labs [15]. IMC '04: Proceedings of the 4th ACM SIGCOMM conference on Internet measurement. ACM Press, 251–256.


S

Sarrar, Nadi and Maier, Gregor and Ager, Bernhard and Sommer, Robin and Uhlig, Steve (2012). Investigating IPv6 Traffic–-What happened at the World IPv6 Day? [16]. Proceedings of Passive and Active Measurements Conference (PAM '12)


Sommer, Robin and Feldmann, Anja (2002). NetFlow: Information Loss or Win? [17]. IMW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment. ACM Press, 173–174.


Sommer, Robin and Feldmann, Anja (2002). NetFlow: information loss or win? [18]. (Technical Report)


Sommer, Robin (2005). Viable Network Intrusion Detection in High-Performance Environments [19]. Technische Universität München, Munich, Germany


Sommer, Robin and Paxson, Vern (2004). Exploiting Independent State for Network Intrusion Detection [20]. (Technischer Bericht (Technical report))


Sommer, Robin and Paxson, Vern (2003). Enhancing byte-level network intrusion detection signatures with context [21]. Proceedings of the 10th ACM conference on Computer and communications security (CCS '03). ACM Press, 262–271.


Sommer, Robin (2004). Bro: An Open Source Network Intrusion Detection System. [22]. Security, E-Learning, E-Services, 17. DFN-Arbeitstagung über Kommunikationsnetze. Gesellschaft für Informatik (GI), 273–288.


Sommer, Robin and Paxson, Vern (2005). Exploiting Independent State For Network Intrusion Detection [23]. Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05). IEEE Computer Society, 59–71.


------ Links: ------

Zusatzinformationen / Extras

Direktzugang:

Schnellnavigation zur Seite über Nummerneingabe

Copyright TU Berlin 2008