Faculty Publications - Vern Paxson

Books

Book chapters or sections

  • G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin, "An assessment of overt malicious activity manifest in residential networks," in Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2011, pp. 144--163.
  • B. Miller, P. Pearce, C. Grier, C. Kreibich, and V. Paxson, "What’s clicking what? techniques and innovations of today’s clickbots," in Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2011, pp. 164--183.
  • P. Barford, Y. Chen, A. Goyal, Z. Li, V. Paxson, and V. Yegneswaran, "Employing Honeynets for network situational awareness," in Cyber situational awareness, Springer, 2010, pp. 71--102.
  • H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, "Predicting the resource consumption of network intrusion detection systems," in Recent Advances in Intrusion Detection: Proc. 11th Intl. Symp. (RAID 2008), R. Lippmann, E. Kirda, and A. Trachtenberg, Eds., Lecture Notes in Computer Science, Vol. 5230, Berlin, Germany: Springer-Verlag, 2008, pp. 135-154.
  • L. Juan, C. Kreibich, C. H. Lin, and V. Paxson, "A tool for offline and live testing of evasion resilience in network intrusion detection systems (Extended Abstract)," in Detection of Intrusions and Malware, and Vulnerability Assessment: Proc. 5th Intl. Conf. (DIMVA 2008), D. Zamboni, Ed., Lecture Notes in Computer Science, Vol. 5137, Berlin, Germany: Springer-Verlag, 2008, pp. 267-278.
  • M. Allman and V. Paxson, "A reactive measurement framework," in Passive and Active Network Measurement: Proc. 9th Intl. Conf. (PAM 2008), M. Claypool and S. Uhlig, Eds., Lecture Notes in Computer Science, Vol. 4979, Berlin, Germany: Springer-Verlag, 2008, pp. 92-101.
  • M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney, "The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware," in Proc. 10th Intl. Symp. on Recent Advances in Intrusion Detection (RAID 2007), C. Kruegel, R. Lippmann, and A. Clark, Eds., Lecture Notes in Computer Science, Vol. 4637, Berlin, Germany: Springer-Verlag, 2007, pp. 107-126.
  • J. Jung, R. A. Milito, and V. Paxson, "On the adaptive real-time detection of fast-propagating network worms," in Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA 2007): Proc. 4th GI Intl. Conf., B. M. Hammerli and R. Sommer, Eds., Lecture Notes in Computer Science, Vol. 4579, Berlin, Germany: Springer-Verlag, 2007, pp. 175-192.
  • J. M. Gonzalez and V. Paxson, "Enhancing network intrusion detection with integrated sampling and filtering," in Recent Advances in Intrusion Detection: Proc. 9th Intl. Symp. (Raid 2006), D. Zamboni and C. Kruegel, Eds., Lecture Notes in Computer Science, Vol. 4219, Berlin, Germany: Springer-Verlag, 2006, pp. 272-289.
  • H. Dreger, C. Kreibich, V. Paxson, and R. Sommer, "Enhancing the accuracy of network-based intrusion detection with host-based context," in Intrusion and Malware Detection and Vulnerability Assessment: Proc. 2nd Intl. Conf. (DIMVA 2005), K. Julisch and C. Kruegel, Eds., Lecture Notes in Computer Science, Vol. 3548, Berlin, Germany: Springer-Verlag, 2005, pp. 206-221.
  • W. Willinger, V. Paxson, R. H. Riedi, and M. S. Taqqu, "Long-range dependence and data network traffic," in Theory and Applications of Long-Range Dependence, P. Doukhan, G. Oppenheim, and M. S. Taqqu, Eds., Boston, MA: Birkhauser, 2002, pp. 373-408.
  • D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Recent Advances in Intrusion Detection (RAID 2002): Proc. 5th Intl. Symp., A. Wespi, G. Vigna, and L. Deri, Eds., Lecture Notes in Computer Science, Vol. 2516, Berlin, Germany: Springer-Verlag, 2002, pp. 17-35.
  • W. Willinger, V. Paxson, and M. S. Taqqu, "Self-similarity and heavy tails: Structural modeling of network traffic," in A Practical Guide to Heavy Tails: Statistical Techniques and Applications, R. J. Adler, R. E. Feldman, and M. S. Taqqu, Eds., Boston, MA: Birkhauser, 1998, pp. 27-54.

Articles in journals or magazines

Articles in conference proceedings

Conference proceedings (edited)

Technical Documentation

Technical Reports

Unpublished articles

Software

  • V. Paxson, "A program for testing IEEE binary-decimal conversion," 1991.

Patents

Talks or presentations

Ph.D. Theses

Miscellaneous