J. Piet, A. Sharma, V. Paxson, and D. Wagner, Network Detection of Interactive SSH Impostors Using Deep Learning, Proc. USENIX Security, August 2023.
M. Tschantz, S. Afroz, S. Sajid, S. Qazi, M. Javed, and V. Paxson, A Bestiary of Blocking: The Motivations and Modes behind Website Unavailability, Proc. USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2018.
S. Bano, P. Richter, M. Javed, S. Sundaresan, Z. Durumeric, S. J. Murdoch, R. Mortier, and V. Paxson, Scanning the Internet for Liveness, Computer Communication Review 48(2), April 2018. Awarded the IRTF Applied Networking Research Prize.
F. Li and V. Paxson, A Large-Scale Empirical Study of Security Patches, USENIX ;login: 43(1), Spring 2018.
P. Pearce, R. Ensafi, F. Li, N. Feamster, and V. Paxson, Toward Continual Measurement of Global Network-Level Censorship, Security and Privacy 16(1), January/February 2018.
A. Murdock, F. Li, P. Bramsen, Z. Durumeric and V. Paxson, Target Generation for Internet-wide IPv6 Scanning, Proc. ACM IMC, November 2017.
K. Levchenko, A. Dhamdhere, B. Huffaker, k claffy, M. Allman and V. Paxson, PacketLab: A Universal Measurement Endpoint Interface, Proc. ACM IMC, November 2017.
K. Thomas et al., Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials, Proc. ACM CCS, October 2017.
F. Li and V. Paxson, A Large-Scale Empirical Study of Security Patches, Proc. ACM CCS, October 2017.
G. Durrett, J. Kummerfeld, T. Berg-Kirkpatrick, R. S. Portnoff, S. Afroz, D. McCoy, K. Levchenko and V. Paxson, Identifying Products in Online Cybercrime Marketplaces: A Dataset for Fine-grained Domain Adaptation, Proc. Conference on Empirical Methods in Natural Language Processing (EMNLP), September 2017.
G. Ho, A. Sharma, M. Javed, V. Paxson and D. Wagner, Detecting Credential Spearphishing Attacks in Enterprise Settings, Proc. USENIX Security Symposium, August 2017. Awarded the Internet Defense Prize. Awarded Distinguished Paper.
P. Pearce, B. Jones, F. Li, R. Ensafi, N. Feamster, N. Weaver and V. Paxson, Global Measurement of DNS Manipulation, Proc. USENIX Security Symposium, August 2017.
R. Singh, R. Nithyanand, S. Afroz, P. Pearce, M. Tschantz, P. Gill and V. Paxson, Characterizing the Nature and Dynamics of Tor Exit Blocking, Proc. USENIX Security Symposium, August 2017.
P. Pearce, R. Ensafi, F. Li, N. Feamster and V. Paxson, Augur: Internet-Wide Detection of Connectivity Disruptions, Proc. IEEE Symposium on Security and Privacy, May 2017.
R. S. Portnoff, S. Afroz, G. Durrett, J. Kummerfeld, T. Berg-Kirkpatrick, D. McCoy, K. Levchenko and V. Paxson, Tools for Automated Analysis of Cybercriminal Markets, Proc. WWW, April 2017.
Z. Durumeric, Z. Ma, D. Springall, R. Barnes, N. Sullivan, E. Bursztein, M. Bailey, J. A. Halderman and V. Paxson, The Security Impact of HTTPS Interception, Proc. NDSS, February 2017.
W. R. Marczak and V. Paxson, Social Engineering Attacks on Government Opponents: Target Perspectives, Proceedings on Privacy Enhancing Technologies, (2):152-164, 2017. Awarded the Andreas Pfitzmann PETS 2017 Best Student Paper Award.
M. Sargent, J. Kristoff, V. Paxson and M. Allman, On the Potential Abuse of IGMP, Computer Communication Review 47(1), January 2017.
M. Ikram, N. Vallina-Rodriguez, S. Seneviratne, M. Ali Kaafar, and V. Paxson, An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps, Proc. ACM IMC, November 2016.
J. Chen, N. Weaver, J. Jiang, T. Wan, H. Duan, and V. Paxson, Host of Troubles: Multiple Host Ambiguities in HTTP Implementations, Proc. ACM CCS, October 2016.
S. Hao, A. Kantchelian, B. Miller, V. Paxson, and N. Feamster, PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration, Proc. ACM CCS, October 2016.
F. Li, Z. Durumeric, J. Czyz, M. Karami, M. Bailey, D. McCoy, S. Savage, and V. Paxson, You've Got Vulnerability: Exploring Effective Vulnerability Notifications, Proc. USENIX Security Symposium, August 2016.
S. Jain, M. Javed, and V. Paxson, Towards Mining Latent Client Identifiers from Network Traffic, Proc. PETS, July 2016.
M. Tschanz, S. Afroz, D. Fifield, and V. Paxson, SoK: Towards Grounding Censorship Circumvention in Empiricism, Proc. IEEE Symposium on Security and Privacy, May 2016.
S. Sundaresan, D. McCoy, S. Afroz, and V. Paxson, Profiling Underground Merchants Based on Network Behavior, Proc. APWG eCrime, May 2016.
F. Li, G. Ho, E. Kuan, Y. Niu, L. Ballard, K. Thomas, E. Bursztein, and V. Paxson, Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension, Proc. WWW, April 2016.
M. Vallentin, V. Paxson, and R. Sommer, VAST: A Unified Platform for Interactive Network Forensics, Proc. NSDI, March 2016.
B. Jones, N. Feamster, V. Paxson, N. Weaver, and M. Allman, Detecting DNS Root Manipulation, Proc. Passive & Active Measurement: PAM-2016.
S. Khattak, D. Fifield, S. Afroz, M. Javed, S. Sundaresan, V. Paxson, S. J. Murdoch, and D. McCoy, Do You See What I See? Differential Treatment of Anonymous Users, Proc. NDSS, February 2016.
J. Chen, J. Jiang, X. Zheng, H. Duan, J. Liang, K. Li, T. Wan, and V. Paxson, Forwarding-Loop Attacks in Content Delivery Networks, Proc. NDSS, February 2016. Winner of Distinguished Paper.
R. Ensafi, D. Fifield, P. Winter, N. Feamster, N. Weaver, and V. Paxson, Examining How the Great Firewall Discovers Hidden Circumvention Servers, Proc. ACM IMC, October 2015. Awarded the IRTF Applied Networking Research Prize.
F. Li, R. Shin, and V. Paxson, Exploring Privacy Preservation in Outsourced K-Nearest Neighbors with Multiple Data Owners, Proc. ACM Cloud Computing Security Workshop, October 2015. Technical Report No. UCB/EECS-2015-177 with more detail, UC Berkeley, July 2015.
N. Vallina-Rodriguez, S. Sundaresan, C. Kreibich, and V. Paxson, Header Enrichment or ISP Enrichment? Emerging Privacy Threats in Mobile Networks, Proc. SIGCOMM HotMiddlebox Workshop, August 2015.
B. Jones, R. Ensafi, N. Feamster, V. Paxson, and N. Weaver, Ethical Concerns for Censorship Measurement, Proc. SIGCOMM Workshop on Ethics in Networked Systems Research, August 2015.
W. R. Marczak, N. Weaver, J. Dalek, R. Ensafi, D. Fifield, S. McKune, A. Rey, J. Scott-Railton, R. Deibert, and V. Paxson, An Analysis of China's "Great Cannon", Proc. USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2015. This is a (not heavily) revised version of our CitizenLab report of April 2015.
D. Fifield, C. Lan, R. Hynes, P. Wegmann, and V. Paxson, Blocking-resistant communication through domain fronting, Proc. Privacy Enhancing Technologies Symposium (PETS), June 2015.
S. Afroz, D. Fifield, M. Tschantz, V. Paxson, and J. D. Tygar, Censorship Arms Race: Research vs. Practice, Proc. Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs), June 2015.
K. Thomas et al., Ad Injection at Scale: Assessing Deceptive Advertisement Modifications, Proc. IEEE Symposium on Security and Privacy, May 2015. Awarded Distinguished Practical Paper.
R. Rasti, M. Murthy, N. Weaver, and V. Paxson, Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks, Proc. IEEE Symposium on Security and Privacy, May 2015.
N. Vallina-Rodriguez, S. Sundaresan, C. Kreibich, N. Weaver, and V. Paxson, Beyond the Radio: Illuminating the Higher Layers of Mobile Networks, Proc. ACM MOBISYS, May 2015.
W. R. Marczak, N. Weaver, J. Dalek, R. Ensafi, D. Fifield, S. McKune, A. Rey, J. Scott-Railton, R. Deibert, and V. Paxson, China's Great Cannon, CitizenLab report, April 2015.
P. Richter, M. Allman, R. Bush, and V. Paxson, A Primer on IPv4 Scarcity, Computer Communication Review, April 2015.
Z. Durumeric, F. Li, J. Kasten, J. Amann, J. Beekman, M. Payer, N. Weaver, D. Adrian, V. Paxson, M. Bailey, and J. Halderman, The Matter of Heartbleed, Proc. ACM IMC, November 2014. Winner of Best Paper.
S. Khattak, M. Javed, S. Khayam, Z. Uzmi, and V. Paxson, A Look at the Consequences of Internet Censorship Through an ISP Lens, Proc. ACM IMC, November 2014.
R. Sommer, M. Vallentin, L. De Carli, and V. Paxson, HILTI: An Abstract Execution Environment for Deep, Stateful Network Traffic Analysis, Proc. ACM IMC, November 2014.
P. Pearce, V. Dave, C. Grier, K. Levchenko, S. Guha, D. McCoy, V. Paxson, S. Savage, and G. Voelker, Characterizing Large-Scale Click Fraud in ZeroAccess, Proc. ACM CCS, November 2014.
K. Thomas, F. Li, C. Grier, and V. Paxson, Consequences of Connectivity: Characterizing Account Hijacking on Twitter, Proc. ACM CCS, November 2014.
W. R. Marczak, J. Scott-Railton, M. Marquis-Boire and V. Paxson, When Governments Hack Opponents: A Look at Actors and Technology, Proc. USENIX Security Symposium, August 2014. (Arabic translation, courtesy Bahrain Mirror.)
A. Kapravelos, C. Grier, N. Chachra, C. Kruegel, G. Vigna and V. Paxson, Hulk: Eliciting Malicious Behavior in Browser Extensions, Proc. USENIX Security Symposium, August 2014.
R. Rasti, M. Murthy and V. Paxson, Temporal Lensing and its Application in Pulsing Denial of Service Attacks, Technical Report No. UCB/EECS-2014-129, UC Berkeley, May 2014.
N. Weaver, C. Kreibich, M. Dam, and V. Paxson, Here Be Web Proxies, Proc. Passive & Active Measurement: PAM-2014. March 2014.
M. Javed and V. Paxson, Detecting Stealthy, Distributed SSH Brute-Forcing, Proc. ACM CCS, November 2013.
S. Hao, M Thomas, V. Paxson, N. Feamster, C. Kreibich, C. Grier, and S. Hollenbeck, Understanding the Domain Registration Behavior of Spammers, Proc. ACM IMC, October 2013.
K. Thomas, D. McCoy, C. Grier, A. Kolcz, and V. Paxson, Trafficking Fraudulent Accounts: The Role of the Underground Market in Twitter Spam and Abuse, Proc. USENIX Security Symposium, August 2013.
V. Paxson et al., Practical Comprehensive Bounds on Surreptitious Communication Over DNS, Proc. USENIX Security Symposium, August 2013.
S. Khattak, M. Javed, P. D. Anderson, and V. Paxson, Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion, Proc. USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2013.
C. Grier et al., Manufacturing Compromise: The Emergence of Exploit-as-a-Service, Proc. ACM CCS, October 2012.
L. Martignoni, P. Poosankam, M. Zaharia, J. Han, S. McCamant, D. Song, V. Paxson, A. Perrig, S. Shenker, and I. Stoica, Cloud Terminal: Secure Access to Sensitive Applications from Untrusted Systems, Proc. USENIX Annual Technical Conference, June 2012.
C. Rossow, C. J. Dietrich, C. Kreibich, C. Grier, V. Paxson, N. Pohlmann, H. Bos, and M. van Steen, Prudent Practices for Designing Malware Experiments: Status Quo and Outlook, Proc. IEEE Symposium on Security and Privacy, May 2012.
K. Thomas, C. Grier, and V. Paxson, Adapting Social Spam Infrastructure for Political Censorship, Proc. USENIX LEET, April 2012.
H. Duan, N. Weaver, Z. Zhao, M. Hu, J. Liang, J. Jiang, K. Li, and V. Paxson, Hold-On: Protecting Against On-Path DNS Poisoning, Securing and Trusting Internet Names, SATIN 2012.
T. Halvorson, J. Szurdi, G. Maier, M. Felegyhazi, C. Kreibich, N. Weaver, K. Levchenko, and V. Paxson, The BIZ Top-Level Domain: Ten Years Later, Proc. Passive & Active Measurement: PAM-2012.
M. Zaharia, S. Katti, C. Grier, V. Paxson, S. Shenker, I. Stoica and D. Song, Hypervisors as a Foothold for Personal Computer Security: An Agenda for the Research Community, Technical Report No. UCB/EECS-2012-12, UC Berkeley, January 2012.
K. Thomas, C. Grier, V. Paxson and D. Song, Suspended Accounts in Retrospect: An Analysis of Twitter Spam, Proc. ACM IMC, November 2011.
J. Caballero, C. Grier, C. Kreibich and V. Paxson, Measuring Pay-per-Install: The Commoditization of Malware Distribution, Proc. USENIX Security Symposium, August 2011. Winner of Outstanding Paper.
C. Kanich, N. Weaver, D. McCoy, T. Halvorson, C. Kreibich, K. Levchenko, V. Paxson, G. Voelker and S. Savage, Show Me the Money: Characterizing Spam-advertised Revenue, Proc. USENIX Security Symposium, August 2011.
N. Weaver, C. Kreibich and V. Paxson, Redirecting DNS for Ads and Profit, Proc. USENIX Workshop on Free and Open Communications on the Internet (FOCI), August 2011.
C. Kreibich, N. Weaver, G. Maier, B. Nechaev and V. Paxson, Experiences from Netalyzr with Engaging Users in End-System Measurement, ACM SIGCOMM Workshop on Measurements Up the Stack (W-MUST), August 2011.
B. Miller, P. Pearce, and C. Grier, C. Kreibich and V. Paxson, What's Clicking What? Techniques and Innovations of Today's Clickbots, Proc. Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2011.
G. Maier, A. Feldmann, V. Paxson, R. Sommer, and M. Vallentin, An Assessment of Overt Malicious Activity Manifest in Residential Networks, Proc. Eighth Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2011.
V. Paxson, M. Allman, H.K. Chu, and M. Sargent, Computing TCP's Retransmission Timer, RFC 6298, Proposed Standard, June 2011. This is an update of RFC 2988.
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Felegyhazi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. Voelker and S. Savage, Click Trajectories: End-to-End Analysis of the Spam Value Chain, Proc. IEEE Symposium on Security and Privacy, May 2011. Awarded Test of Time.
K. Thomas, C. Grier, J. Ma, V. Paxson and D. Song, Design and Evaluation of a Real-Time URL Spam Filtering Service, Proc. IEEE Symposium on Security and Privacy, May 2011.
N. Weaver, C. Kreibich, B. Nechaev and V. Paxson, Implications of Netalyzr's DNS Measurements, Proc. Workshop on Securing and Trusting Internet Names (SATIN), April 2011.
Z. Li, A. Goyal, Y. Chen and V. Paxson, Towards Situational Awareness of Large-scale Botnet Probing Events, IEEE Transactions on Information Forensics & Security, 6(1), March 2011. An earlier version of this paper appeared in Proc. ASIACCS, Mar. 2009.
C. M. Zhang and V. Paxson, Detecting and Analyzing Automated Activity on Twitter, Proc. Passive & Active Measurement: PAM-2011.
C. Muthukrishnan, V. Paxson, M. Allman and A. Akella, Using Strongly Typed Networking to Architect for Tussle, Proc. HotNets, October 2010.
C. Grier, K. Thomas, V. Paxson and M. Zhang, @spam: The Underground on 140 Characters or Less, Proc. ACM CCS, October 2010.
R. Sommer and V. Paxson, Outside the Closed World: On Using Machine Learning For Network Intrusion Detection, Proc. IEEE Symposium on Security and Privacy, May 2010. Awarded Test of Time.
C. Y. Cho, J. Caballero, C. Grier, V. Paxson and D. Song, Insights from the Inside: A View of Botnet Management from Infiltration, Proc. USENIX LEET, April 2010.
M. Felegyhazi, C. Kreibich and V. Paxson, On the Potential of Proactive Domain Blacklisting, Proc. USENIX LEET, April 2010.
B. Nechaev, M. Allman, V. Paxson and A. Gurtov, A Preliminary Analysis of TCP Performance in an Enterprise Network, Proc. USENIX Internet Network Management Workshop/Workshop on Research on Enterprise Networking, April 2010.
T. Callahan, M. Allman and V. Paxson, A Longitudinal View of HTTP Traffic, Proc. Passive & Active Measurement: PAM-2010, April 2010.
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver and S. Savage, Botnet Judo: Fighting Spam with Itself, Proc. NDSS, February 2010.
B. Nechaev, V. Paxson, M. Allman and A. Gurtov, On Calibrating Enterprise Switch Measurements, Proc. ACM IMC, November 2009.
P. Mittal, V. Paxson, R. Sommer and M. Winterrowd, Securing Mediated Trace Access Using Black-box Permutation Analysis, Proc. HOTNETS, October 2009.
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, S. Savage, Spamalytics: An Empirical Analysis of Spam Marketing Conversion, Communications of the ACM, 52(9), pp. 99-107, September 2009.
M. Allman, V. Paxson and E. Blanton, TCP Congestion Control, RFC 5681, Draft Standard, September 2009.
R. Sommer, V. Paxson, and N. Weaver, An architecture for exploiting multi-core processors to parallelize network intrusion prevention, Concurrency and Computation: Practice and Experience, Special Issue: Multi-core Supported Network and System Security, 21(10), pp. 1255-1279, May 2009.
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage, Spamcraft: An Inside Look At Spam Campaign Orchestration, Proc. USENIX LEET, April 2009.
N. Weaver, R. Sommer and V. Paxson, Detecting Forged TCP Reset Packets, Proc. NDSS, February 2009.
Z. Li, A. Goyal, Y. Chen and V. Paxson, Automating Analysis of Large-Scale Botnet Probing Events, Proc. ASIACCS, March 2009.
H. Dreger, A. Feldmann, V. Paxson and R. Sommer, Predicting the Resource Consumption of Network Intrusion Detection Systems, Proc. RAID, September 2008.
G. Maier, R. Sommer, H. Dreger, A. Feldmann, V. Paxson and F. Schneider, Enriching Network Security Analysis with Time Travel, Proc. ACM SIGCOMM, August 2008.
J. Jung, R. Milito, and V. Paxson, On the Adaptive Real-Time Detection of Fast-Propagating Network Worms, Journal in Computer Virology, Vol.4, No.3, August 2008. An earlier version of this paper appeared in Proc. Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, July 2007.
M. Allman, C. Kreibich, V. Paxson, R. Sommer and N. Weaver, Principles for Developing Comprehensive Network Visibility (HTML, PDF), USENIX Workshop on Hot Topics in Security, July 2008.
L. Juan, C. Kreibich, C-H. Lin, and V. Paxson, A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract), Proc. Fifth GI International Conference on Detection of Intrusions and Malware & Vulnerability Assessment, July 2008. (Longer version).
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage, On the Spam Campaign Trail (HTML, PDF), First USENIX Workshop on Large-scale Exploits and Emergent Threats (LEET '08), 2008.
M. Vutukuru, H. Balakrishnan and V. Paxson, Efficient and Robust TCP Stream Normalization, Proc. IEEE Symposium on Security and Privacy, May 2008.
M. Allman and V. Paxson, A Reactive Measurement Framework, Proc. Passive and Active Measurement Conference, April 2008.
J. Franklin, V. Paxson, A. Perrig, and S. Savage, An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants, Proc. ACM CCS, October 2007.
J. Gonzalez, V. Paxson, and N. Weaver, Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention, Proc. ACM CCS, October 2007.
M. Allman, V. Paxson, and J. Terrell, A Brief History of Scanning, Proc. ACM IMC, October 2007.
M. Allman and V. Paxson, Issues and Etiquette Concerning Use of Shared Measurement Data, Proc. ACM IMC, October 2007.
M. Vallentin, R. Sommer, J. Lee, C. Leres, V. Paxson, and B. Tierney, The NIDS Cluster: Scalable, Stateful Network Intrusion Detection on Commodity Hardware, Proc. RAID 2007.
M. Allman, C. Kreibich, V. Paxson, R. Sommer and N. Weaver, The Strengths of Weaker Identities: Opportunistic Personas, Proc. USENIX Hot Security, August 2007.
J. Jung, R. Milito, and V. Paxson, On the Adaptive Real-Time Detection of Fast-Propagating Network Worms, Proc. Fourth GI International Conference on Detection of Intrusions & Malware, and Vulnerability Assessment, July 2007.
V. Paxson, R. Sommer, and N. Weaver, An Architecture for Exploiting Multi-Core Processors to Parallelize Network Intrusion Prevention, Proc. IEEE Sarnoff Symposium, May 2007.
N. Weaver, V. Paxson, and J. Gonzalez, The Shunt: An FPGA-Based Accelerator for Network Intrusion Prevention, Proc. FPGA '07, February 2007.
M. Allman, E. Blanton, V. Paxson and S. Shenker, Fighting Coordinated Attackers with Cross-Organizational Information Sharing, Proc. HOTNETS 2006.
A. Parker et al., Network System Challenges in Selective Sharing and Verification for Personal, Social, and Urban-Scale Sensing Applications, Proc. HOTNETS 2006.
J. Jung, R. Milito and V. Paxson, On the Adaptive Real-Time Detection of Fast-Propagating Network Worms, MIT Technical Report MIT-CSAIL-TR-2006-074, November 2006.
R. Pang, V. Paxson, R. Sommer and L. Peterson, binpac: A yacc for Writing Application Protocol Parsers, Proc. ACM IMC, October 2006.
J. Kannan, J. Jung, V. Paxson and C. Koksal, Semi-Automated Discovery of Application Session Structure, Proc. ACM IMC, October 2006.
W. Cui, V. Paxson and N. Weaver, GQ: Realizing a System to Catch Worms in a Quarter Million Places, ICSI Technical Report TR-06-004, September 2006.
V. Paxson, K. Asanovic, S. Dharmapurikar, J. Lockwood, R. Pang, R. Sommer and N. Weaver, Rethinking Hardware Support for Network Analysis and Intrusion Prevention, Proc. USENIX Hot Security, August 2006.
H. Dreger, A. Feldmann, M. Mai, V. Paxson and R. Sommer, Dynamic Application-Layer Protocol Analysis for Network Intrusion Detection, Proc. USENIX Security Symposium, August 2006. (PDF)
N. Duffield, F. Lo Presti, V. Paxson and D. Towsley, Network Loss Tomography Using Striped Unicast Probes, IEEE/ACM Transactions on Networking, Vol.14, No.4, pp. 697-710, August 2006.
J. Gonzalez and V. Paxson, Enhancing Network Intrusion Detection With Integrated Sampling and Filtering, Proc. RAID 2006.
S. Floyd, V. Paxson and A. Falk, IAB Thoughts on the Role of the Internet Research Task Force (IRTF), RFC 4440, March 2006.
W. Cui, V. Paxson, N. Weaver and R. Katz, Protocol-Independent Adaptive Replay of Application Dialog, Proc. NDSS, February 2006.
R. Pang, M. Allman, V. Paxson and J. Lee, The Devil and Packet Trace Anonymization, Computer Communication Review, 36(1), January 2006.
V. Yegneswaran, P. Barford and V. Paxson, Using Honeynets for Internet Situational Awareness, Proc. HOTNETS 2005.
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson and B. Tierney, A First Look at Modern Enterprise Traffic, Proc. ACM IMC, October 2005. (PDF)
R. Sommer and V. Paxson, Exploiting Independent State For Network Intrusion Detection, Proc. ACSAC 2005.
A. Kumar, V. Paxson and N. Weaver, Exploiting Underlying Structure for Detailed Reconstruction of an Internet Scale Event, Proc. ACM IMC, October 2005.
S. Kornexl, V. Paxson, H. Dreger, A. Feldmann and R. Sommer, Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic, Proc. ACM IMC, October 2005. (PDF)
S. Dharmapurikar and V. Paxson, Robust TCP Stream Reassembly in the Presence of Adversaries, Proc. USENIX Security Symposium 2005. (PDF)
M. Allman, E. Blanton and V. Paxson, An Architecture for Developing Behavioral History, Proc. Steps to Reducing Unwanted Traffic on the Internet (SRUTI) 2005.
H. Dreger, C. Kreibich, V. Paxson and R. Sommer, Enhancing the Accuracy of Network-based Intrusion Detection with Host-based Context, Proc. Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA) 2005.
J. Hellerstein, V. Paxson, L. Peterson, T. Roscoe, S. Shenker and D. Wetherall, The Network Oracle, Bulletin of the IEEE Computer Society Technical Committee on Data Engineering, 28(1), March 2005.
R. Pang, V. Yegneswaran, P. Barford, V. Paxson and L. Peterson, Characteristics of Internet Background Radiation, Proc. ACM IMC, October 2004. Awarded Test of Time.
R. Sommer and V. Paxson, Exploiting Independent State For Network Intrusion Detection, Technical Report TUM-I0420, Technische Universität München, November 2004. (Postscript)
N. Weaver, I. Hamadeh, G. Kesidis and V. Paxson, Preliminary Results Using ScaleDown to Explore Worm Dynamics, Proc. ACM CCS WORM, October 2004.
S. Staniford, D. Moore, V. Paxson and N. Weaver, The Top Speed of Flash Worms, Proc. ACM CCS WORM, October 2004.
H. Dreger, A. Feldmann, V. Paxson, and R. Sommer, Operational Experiences with High-Volume Network Intrusion Detection, Proc. ACM CCS, October 2004.
N. Weaver, D. Ellis, S. Staniford and V. Paxson, Worms vs. Perimeters: The Case for Hard-LANs, Proc. Hot Interconnects 12, August 2004.
N. Weaver, S. Staniford and V. Paxson, Very Fast Containment of Scanning Worms, Proc. USENIX Security Symposium, August 2004.
N. Weaver and V. Paxson, A Worst-Case Worm, Proc. Third Annual Workshop on Economics and Information Security (WEIS04), May 2004.
J. Jung, V. Paxson, A. Berger, and H. Balakrishnan, Fast Portscan Detection Using Sequential Hypothesis Testing, Proc. IEEE Symposium on Security and Privacy, May 2004.
R. Pang and V. Paxson, A High-level Programming Environment for Packet Trace Anonymization and Transformation, Proc. ACM SIGCOMM 2003, August 2003.
N. Weaver, V. Paxson, S. Staniford and R. Cunningham, A Taxonomy of Computer Worms, Proc. ACM CCS Workshop on Rapid Malcode, October 2003.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, Inside the Slammer Worm, Security and Privacy, July/August 2003.
N. Weaver, V. Paxson, S. Staniford and R. Cunningham, Large Scale Malicious Code: A Research Agenda. DARPA-sponsored report, 2003.
U. Shankar and V. Paxson, Active Mapping: Resisting NIDS Evasion Without Altering Traffic, Proc. IEEE Symposium on Security and Privacy, May 2003.
J. Gonzalez and V. Paxson, pktd: A Packet Capture and Injection Daemon, Proc. Passive & Active Measurement: PAM-2003.
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford and N. Weaver, The Spread of the Sapphire/Slammer Worm, technical report, February 2003.
Computer Science and Telecommunications Board, National Research Council, The Internet Under Crisis Conditions: Learning from September 11, National Academy Press, Washington, D.C., 2002.
E. Kohler, J. Li, V. Paxson and S. Shenker, Observed Structure of Addresses in IP Traffic, Proc. ACM SIGCOMM Internet Measurement Workshop, November 2002.
Y. Zhang, L. Breslau, V. Paxson and S. Shenker, On the Characteristics and Origins of Internet Flow Rates, Proc. ACM SIGCOMM, August 2002.
R. Mahajan, S. Bellovin, S. Floyd, J. Ioannidis, V. Paxson and S. Shenker. Controlling High Bandwidth Aggregates in the Network, Computer Communication Review 32(3), July 2002. (Extended version; Slashdot note; Web page on ACC and Pushback.)
W. Willinger, R. Govindan, S. Jamin, V. Paxson and S. Shenker, Scaling phenomena in the Internet: Critically examining criticality, Proceedings of Natl. Acad. Sci. USA, Vol. 99, Suppl. 1, 2573-2580, February 19, 2002.
D. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford, Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay, Proc. RAID 2002.
R. Govindan and V. Paxson, Estimating Router ICMP Generation Delays, Proceedings of Passive & Active Measurement: PAM-2002.
W. Willinger, V. Paxson, R. H. Riedi and M. S. Taqqu, Long-range dependence and data network traffic. Long-range Dependence: Theory and Applications, P. Doukhan, G. Oppenheim and M. S. Taqqu, eds., Birkhauser, 2002.
S. Floyd and V. Paxson, Difficulties in Simulating the Internet. (PDF) IEEE/ACM Transactions on Networking, Vol.9, No.4, pp. 392-403, August 2001. An earlier version appeared in Proceedings of the 1997 Winter Simulation Conference, December 1997.
M. Handley, C. Kreibich and V. Paxson, Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics (HTML). (compressed Postscript) (PDF) Proc. USENIX Security Symposium 2001.
V. Paxson, An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks (HTML). (compressed Postscript) (PDF) Computer Communication Review 31(3), July 2001.
Computer Science and Telecommunications Board, National Research Council, Looking Over the Fence at Networks: A Neighbor's View of Networking Research, National Academy Press, Washington, D.C., 2001.
N. Duffield, F. Lo Presti, V. Paxson, and D. Towsley, Inferring link loss using striped unicast probes, Proc. IEEE INFOCOM, April 2001.
Y. Zhang and V. Paxson, Detecting Backdoors, Proc. 9th USENIX Security Symposium, August 2000. (HTML)
Y. Zhang and V. Paxson, Detecting Stepping Stones, Proc. 9th USENIX Security Symposium, August 2000. (HTML)
R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson, Stream Control Transmission Protocol, RFC 2960, Proposed Standard, October 2000.
Y. Zhang, V. Paxson, and S. Shenker, The Stationarity of Internet Path Properties: Routing, Loss, and Throughput, ACIRI Technical Report, May 2000.
X. Xiao, A. Hannan, V. Paxson, and E. Crabbe, TCP Processing of the IPv4 Precedence Field, RFC 2873, Proposed Standard, June 2000.
V. Paxson, A. Adams, and M. Mathis, Experiences with NIMI, Proceedings of Passive & Active Measurement: PAM-2000.
S. Bradner and V. Paxson, IANA Allocation Guidelines For Values In the Internet Protocol and Related Headers, RFC 2780, Best Current Practice, March 2000.
A. Adams, T. Bu, R. Caceres, N. Duffield, T. Friedman, J. Horowitz, F. Lo Presti, S. B. Moon, V. Paxson, and D. Towsley, The Use of End-to-end Multicast Measurements for Characterizing Internal Network Behavior, IEEE Communications, 38(5), May 2000.
M. Allman and V. Paxson, On Estimating End-to-End Network Path Properties, ACM SIGCOMM '99, September 1999, Cambridge, MA.
V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time, Computer Networks, 31(23-24), pp. 2435-2463, 14 Dec. 1999. HTML This paper is a revision of paper that previously appeared in Proc. 7th USENIX Security Symposium , January 1998.
J. Mahdavi and V. Paxson, IPPM Metrics for Measuring Connectivity. RFC 2678, Proposed Standard, September 1999. Previously issued as RFC 2498, Experimental, January 1999.
M. Allman, V. Paxson and W. Stevens, TCP Congestion Control, RFC 2581, Proposed Standard, April 1999.
P. Francis, S. Jamin, V. Paxson, L. Zhang, D. Gryniewicz, and Y. Jin, An architecture for a global Internet host distance estimation service, Proc. IEEE INFOCOM, March 1999.
V. Paxson, M. Allman, S. Dawson, W. Fenner, J. Griner, I. Heavens, K. Lahey, J. Semke, and B. Volz, Known TCP Implementation Problems, RFC 2525, Informational, March 1999.
V. Paxson, G. Almes, J. Mahdavi, and M. Mathis, Framework for IP Performance Metrics. RFC 2330, Informational, May 1998.
V. Paxson, Bro: A System for Detecting Network Intruders in Real-Time. Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, January 1998. Winner of Best Paper, and subsequently awarded Test of Time. This version of the paper differs from that in the printed Proceedings in that an error in the performance analysis, which overstated the load on the FDDI ring by a factor of two, has been corrected.
V. Paxson, On Calibrating Measurements of Packet Transit Times. Proceedings of SIGMETRICS '98, June 1998.
V. Paxson, J. Mahdavi, A. Adams, and M. Mathis, An Architecture for Large-Scale Internet Measurement. IEEE Communications, Vol.36, No.8, pp 48-54, August 1998.
W. Willinger, and V. Paxson, Where Mathematics meets the Internet, Notices of the American Mathematical Society, Vol.45, No.8, pp. 961-970, August 1998.
W. Willinger, V. Paxson, and M.S. Taqqu, Self-similarity and Heavy Tails: Structural Modeling of Network Traffic. In A Practical Guide to Heavy Tails: Statistical Techniques and Applications, Adler, R., Feldman, R., and Taqqu, M.S., editors, Birkhauser, 1998.
A. Adams, J. Mahdavi, M. Mathis, and V. Paxson, Creating a Scalable Architecture for Internet Measurement. Proc. INET '98.
V. Paxson, End-to-End Internet Packet Dynamics, ACM SIGCOMM '97, September 1997, Cannes, France.
V. Paxson, Automated Packet Trace Analysis of TCP Implementations, ACM SIGCOMM '97, September 1997, Cannes, France.
V. Paxson, Measurements and Analysis of End-to-End Internet Dynamics, (1.8 MB gzip compressed, ~400 pages), Ph.D. dissertation, 1997. README.
V. Paxson, Fast, Approximate Synthesis of Fractional Gaussian Noise for Generating Self-Similar Network Traffic . Computer Communications Review, V. 27 N. 5, October 1997, pp. 5-18. This paper is a minor revision of Fast Approximation of Self-Similar Network Traffic , an April 1995 technical report. Abstract.
V. Paxson, and S. Floyd, Why We Don't Know How To Simulate The Internet, Proceedings of the 1997 Winter Simulation Conference, December 1997.
W. Willinger, and V. Paxson, Discussion of ``Heavy Tail Modeling and Teletraffic Data'' by S.R. Resnick, Annals of Statistics, Vol.25, No.5, pp. 1805-1869, 1997. Abstract of Prof. Resnick's paper, On-line version of Prof. Resnick's paper.
V. Paxson and S. Floyd, Wide-Area Traffic: The Failure of Poisson Modeling, IEEE/ACM Transactions on Networking, Vol. 3 No. 3, pp. 226-244, June 1995. Abstract. (Original Postscript.) An earlier version of this paper appeared in SIGCOMM 94, pp. 257-268, August 1994.
V. Paxson, Growth Trends in Wide-Area TCP Connections. IEEE Network, Vol. 8 No. 4, pp. 8-17, July 1994. Abstract.
V. Paxson, and C. Saltmarsh, Glish: A User-Level Software Bus for Loosely-Coupled Distributed Systems. Proceedings of the 1993 Winter USENIX Technical Conference (San Diego, CA, Jan. 1993), USENIX. Abstract.
Return to [Vern Paxson].