Nemea: Framework for stream-wise analysis of network traffic, Tech. rep., CESNET, a.l.e, 2013. ,
An analysis of correlations of intrusion alerts in an NREN, 2014 IEEE 19th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD), pp.305-309, 2014. ,
DOI : 10.1109/CAMAD.2014.7033255
Surveying Port Scans and Their Detection Methodologies, The Computer Journal, vol.54, issue.10, p.35, 2011. ,
DOI : 10.1093/comjnl/bxr035
Vertical Scan Detector README, https://github.com/ CESNET/Nemea-Detectors/tree ,
Analysis of a "/0" stealth scan from a botnet, Proceedings of the 2012 ACM conference on Internet measurement conference, IMC '12, pp.1-14, 2012. ,
DOI : 10.1145/2398776.2398778
Fast portscan detection using sequential hypothesis testing, IEEE Symposium on Security and Privacy, 2004. Proceedings. 2004, pp.211-225, 2004. ,
DOI : 10.1109/SECPRI.2004.1301325
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning, Insecure, 2009. ,
Valgrind, ACM SIGPLAN Notices, vol.42, issue.6, pp.89-100, 2007. ,
DOI : 10.1145/1273442.1250746
URL : https://doi.org/10.1016/s1571-0661(04)81042-9
Bro: a system for detecting network intruders in real-time, Computer Networks, vol.31, issue.23-24, pp.31-2435, 1999. ,
DOI : 10.1016/S1389-1286(99)00112-7
How Dangerous Is Internet Scanning?, Lecture Notes in Computer Science, vol.9053, pp.158-172, 2015. ,
DOI : 10.1007/978-3-319-17172-2_11
URL : https://hal.archives-ouvertes.fr/hal-01411192
Snort: Lightweight intrusion detection for networks, pp.229-238, 1999. ,
Connectionless Port Scan Detection on the Backbone, 2006 IEEE International Performance Computing and Communications Conference, p.10, 2006. ,
DOI : 10.1109/.2006.1629454
URL : http://ipmon.sprintlabs.com/publications/uploads/malware2006-taps.pdf