-
1
-
-
33750376598
-
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 165-184. Springer, Heidelberg (2006)
-
Baecher, P., Koetter, M., Holz, T., Dornseif, M., Freiling, F.C.: The nepenthes platform: An efficient approach to collect malware. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 165-184. Springer, Heidelberg (2006)
-
-
-
-
2
-
-
21644433634
-
Xen and the art of virtualization
-
Barham, P., Dragovic, B., Fraser, K., Hand, S., Harris, T., Ho, A., Neugebauer, R., Pratt, I., Warfield, A.: Xen and the art of virtualization. In: Proceedings of the 19th ACM Symposium on Operating Systems Principles, pp. 164-177 (2003)
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
4
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: Overview and case study. In: Proceedings of 1st Workshop on Hot Topics in Understanding Botnets (HotBots '07) (2007)
-
(2007)
Proceedings of 1st Workshop on Hot Topics in Understanding Botnets (HotBots '07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
5
-
-
34547437877
-
A study of malware in peer-to-peer networks
-
Kalafut, A., Acharya, A., Gupta, M.: A study of malware in peer-to-peer networks. In: IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, pp. 327-332 (2006)
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference
, pp. 327-332
-
-
Kalafut, A.1
Acharya, A.2
Gupta, M.3
-
6
-
-
33750320499
-
-
Leita, C., Dacier, M., Massicotte, F.: Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, 4219, pp. 185-205. Springer, Heidelberg (2006)
-
Leita, C., Dacier, M., Massicotte, F.: Automatic handling of protocol dependencies and reaction to 0-day attacks with scriptgen based honeypots. In: Zamboni, D., Kruegel, C. (eds.) RAID 2006. LNCS, vol. 4219, pp. 185-205. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
0742276097
-
Inside the slammer worm
-
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., Weaver, N.: Inside the slammer worm. IEEE Security and Privacy 1(4), 33-39 (2003)
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
8
-
-
0141762461
-
-
Moore, D., Shannon, C., claffy, k: Code-red: A case study on the spread and victims of an internet worm. In: MW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 273-284. ACM Press, New York (2002)
-
Moore, D., Shannon, C., claffy, k: Code-red: A case study on the spread and victims of an internet worm. In: MW '02: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurment, pp. 273-284. ACM Press, New York (2002)
-
-
-
-
9
-
-
85077681170
-
A crawler-based study of spyware in the web
-
Moshchuk, A., Bragin, T., Gribble, S.D., Levy, H.M.: A crawler-based study of spyware in the web. In: Proceedings of 13th Network and Distributed System Security Symposium (NDSS'06) (2006)
-
(2006)
Proceedings of 13th Network and Distributed System Security Symposium (NDSS'06)
-
-
Moshchuk, A.1
Bragin, T.2
Gribble, S.D.3
Levy, H.M.4
-
10
-
-
37849040737
-
-
Internet Accessed February 2007 February 2007
-
BBC News. Criminals 'may overwhelm the web'. Internet Accessed February 2007 (February 2007) http://news.bbc.co.uk/1/hi/business/6298641.stm
-
BBC News. Criminals 'may overwhelm the web
-
-
-
11
-
-
37849024600
-
-
Claus, R.F.: Overbeck. Efficient Observation of Botnets. Master's thesis, RWTH Aachen University (May 2007)
-
Claus, R.F.: Overbeck. Efficient Observation of Botnets. Master's thesis, RWTH Aachen University (May 2007)
-
-
-
-
12
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, pp. 41-52 (2006)
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
13
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In: Proceedings of 1st Workshop on Hot Topics in Understanding Botnets (HotBots '07) (2007)
-
(2007)
Proceedings of 1st Workshop on Hot Topics in Understanding Botnets (HotBots '07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
14
-
-
38849103391
-
Measurement and analysis of spyware in a university environment
-
San Francisco, California, United States
-
Saroiu, S., Gribble, S.D., Levy, H.M.: Measurement and analysis of spyware in a university environment. In: Proceedings of Networked Systems Design and Implementation (NSDI'04), San Francisco, California, United States (2004)
-
(2004)
Proceedings of Networked Systems Design and Implementation (NSDI'04)
-
-
Saroiu, S.1
Gribble, S.D.2
Levy, H.M.3
-
15
-
-
34547405407
-
Malware prevalence in the kazaa file-sharing network
-
Shin, S., Jung, J., Balakrishnan, H.: Malware prevalence in the kazaa file-sharing network. In: IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, pp. 333-338 (2006)
-
(2006)
IMC '06: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference
, pp. 333-338
-
-
Shin, S.1
Jung, J.2
Balakrishnan, H.3
-
16
-
-
26844548971
-
-
The Honeynet Project, March
-
The Honeynet Project. Know Your Enemy: Tracking Botnets (March 2005) http://www.honeynet.org/papers/bots/
-
(2005)
Know Your Enemy: Tracking Botnets
-
-
-
17
-
-
37849013539
-
Attack of the zombie computers is growing threat. Internet
-
January
-
New York Times. Attack of the zombie computers is growing threat. Internet (January 2007) http://www.nytimes.com/2007/01/07/technology/07net.html
-
(2007)
New York Times
-
-
-
18
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Wang, Y.-M., Beck, D., Jiang, X., Roussev, R., Verbowski, C., Chen, S., King, S.T.: Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In: Proceedings of 13th Network and Distributed System Security Symposium (NDSS'06) (2006)
-
(2006)
Proceedings of 13th Network and Distributed System Security Symposium (NDSS'06)
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.T.7
-
19
-
-
37849017725
-
-
McAfee Whitepaper. Adware and spyware: Unraveling the financial web. Internet: Accessed February 2007 (August 2006) http://www.mcafee.com/us/ local_content/white_papers/threat-center/wp_adware.pdf
-
McAfee Whitepaper. Adware and spyware: Unraveling the financial web. Internet: Accessed February 2007 (August 2006) http://www.mcafee.com/us/ local_content/white_papers/threat-center/wp_adware.pdf
-
-
-
-
20
-
-
34047110218
-
CWSandbox: Towards automated dynamic binary analysis
-
Willems, C., Holz, T., Freiling, F.: CWSandbox: Towards automated dynamic binary analysis. IEEE Security and Privacy 5(2) (2007)
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
21
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
ACM Press, New York
-
Yegneswaran, V., Barford, P., Ullrich, J.: Internet intrusions: Global characteristics and prevalence. In: SIGMETRICS '03: Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, pp. 138-147. ACM Press, New York (2003)
-
(2003)
SIGMETRICS '03: Proceedings of the 2003 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems
, pp. 138-147
-
-
Yegneswaran, V.1
Barford, P.2
Ullrich, J.3
|