ConfiDNS: leveraging scale and history to detect compromise

  • Authors:
  • Lindsey Poole;Vivek S. Pai

  • Affiliations:
  • Princeton University;Princeton University

  • Venue:
  • ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
  • Year:
  • 2008

Quantified Score

Hi-index 0.00

Visualization

Abstract

Analyzing the behavior of running programs has a wide variety of compelling applications, from intrusion detection and prevention to bug discovery. Unfortunately, the high runtime overheads imposed by complex analysis techniques makes their deployment ...