-
1
-
-
17844404852
-
Malicious bots threaten network security
-
Geer D. Malicious bots threaten network security. IEEE Computer, 2005, 38(1): 18-20.
-
(2005)
IEEE Computer
, vol.38
, Issue.1
, pp. 18-20
-
-
Geer, D.1
-
3
-
-
80052676245
-
Symantec Internet security threat report: Trends for January 06-June 06. Volume X
-
Symantec Inc.
-
Symantec Inc. Symantec Internet security threat report: Trends for January 06-June 06. Volume X. 2006. http://eval.symantec.com/
-
(2006)
-
-
-
4
-
-
51249108585
-
Symantec Internet security threat report: Trends for July 06-December 06. Volume XI
-
Symantec Inc.
-
Symantec Inc. Symantec Internet security threat report: Trends for July 06-December 06. Volume XI. 2007. http://eval.symantec.com/
-
(2007)
-
-
-
6
-
-
84940591146
-
Towards high level attack scenario graph through honeynet data correlation analysis
-
Piscataway: IEEE Computer Society Press
-
Zhuge JW, Han XH, Chen Y, Ye ZY, Zou W. Towards high level attack scenario graph through honeynet data correlation analysis. In: Proc. of the 7th IEEE Workshop on Information Assurance (IAW 2006). 2006. Piscataway: IEEE Computer Society Press. 2006. 215-222.
-
(2006)
Proc. of the 7th IEEE Workshop on Information Assurance (IAW 2006)
, pp. 215-222
-
-
Zhuge, J.W.1
Han, X.H.2
Chen, Y.3
Ye, Z.Y.4
Zou, W.5
-
7
-
-
39749199168
-
HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle
-
Chinese source
-
Zhuge JW, Han XH, Zhou YL, Song CY, Guo JP, Zou W. HoneyBow: An automated malware collection tool based on the high-interaction honeypot principle. Journal on Communications, 2007, 28(12): 8-13 (in Chinese with English abstract).
-
(2007)
Journal on Communications
, vol.28
, Issue.12
, pp. 8-13
-
-
Zhuge, J.W.1
Han, X.H.2
Zhou, Y.L.3
Song, C.Y.4
Guo, J.P.5
Zou, W.6
-
8
-
-
39749086344
-
An investigation on the botnets activities
-
Chinese source
-
Han XH, Guo JP, Zhou YL, Zhuge JW, Cao DZ, Zou W. An investigation on the botnets activities. Journal on Communications, 2007, 28(12): 167-172. (in Chinese with English abstract).
-
(2007)
Journal on Communications
, vol.28
, Issue.12
, pp. 167-172
-
-
Han, X.H.1
Guo, J.P.2
Zhou, Y.L.3
Zhuge, J.W.4
Cao, D.Z.5
Zou, W.6
-
9
-
-
41949100618
-
Overview of botnet
-
Chinese source
-
Sun YD, Li D. Overview of botnet. Computer Applications, 2006, 26(7): 1628-1630 (in Chinese with English abstract).
-
(2006)
Computer Applications
, vol.26
, Issue.7
, pp. 1628-1630
-
-
Sun, Y.D.1
Li, D.2
-
10
-
-
24644463025
-
Bots and botnet: An overview
-
Puri R. Bots and botnet: An overview. SANS White Paper. 2003. http://www.sans.org/reading_room/whitepapers/malicious/1299.php
-
(2003)
SANS White Paper
-
-
Puri, R.1
-
11
-
-
3042784584
-
Botnets: Big and bigger
-
McCarty B. Botnets: Big and bigger. IEEE Security and Privacy, 2003, 1(4): 87-90.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 87-90
-
-
McCarty, B.1
-
13
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Almeida J.M., Almeida V.A.F. and Barford P. (ed.), Rio de Janeriro: ACM Press
-
Rajab MA, Zarfoss J, Monrose F, Terzis A. A multifaceted approach to understanding the botnet phenomenon. In: Almeida JM, Almeida VAF, Barford P, eds. Proc. of the 6th ACM Internet Measurement Conf. (IMC 2006). Rio de Janeriro: ACM Press, 2006. 41-52.
-
(2006)
Proc. of the 6th ACM Internet Measurement Conf. (IMC 2006)
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
14
-
-
3042742908
-
An analysis of the slapper worm
-
Arce I, Levy E. An analysis of the slapper worm. IEEE Security and Privacy, 2003, 1(1): 82-87.
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
15
-
-
84882582017
-
An inside look at botnets
-
Christodorescu M., Jha S., Maughan D., Song D. and Wang C. (ed.), Springer-Verlag
-
Barford P, Yegneswaran V. An inside look at botnets. In: Christodorescu M, Jha S, Maughan D, Song D, Wang C, eds. Advances in Information Security, Malware Detection, Vol.27. Springer-Verlag, 2007. http://www.springerlink.com/content/w4576m 3186524245/
-
(2007)
Advances in Information Security, Malware Detection, Vol.27
-
-
Barford, P.1
Yegneswaran, V.2
-
16
-
-
20844452458
-
A short visit to the bot zoo
-
Holz T. A short visit to the bot zoo. IEEE Security and Privacy, 2005, 3(3): 76-79.
-
(2005)
IEEE Security and Privacy
, vol.3
, Issue.3
, pp. 76-79
-
-
Holz, T.1
-
17
-
-
58149121721
-
The evolution of malicious IRC bots
-
Canavan J. The evolution of malicious IRC bots. In: Proc. of the 2005 Virus Bulletin Conf. (VB 2005). 2005. http://www.symantec.com/avcenter/reference/ the.evolution.of.malicious.irc.bots.pdf
-
(2005)
Proc. of the 2005 Virus Bulletin Conf. (VB 2005)
-
-
Canavan, J.1
-
18
-
-
8644261522
-
Research and development of Internet worms
-
Chinese source
-
Wen WP, Qing SH, Jiang JC, Wang YJ. Research and development of Internet worms. Journal of Software, 2004, 15(8): 1208-1219 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/15/1208.htm
-
(2004)
Journal of Software
, vol.15
, Issue.8
, pp. 1208-1219
-
-
Wen, W.P.1
Qing, S.H.2
Jiang, J.C.3
Wang, Y.J.4
-
21
-
-
48649106122
-
RFC 2810: Internet relay chat: Architecture
-
RFC 2810, IETF
-
Kalt C. RFC 2810: Internet relay chat: Architecture. RFC 2810, IETF, 2000.
-
(2000)
-
-
Kalt, C.1
-
25
-
-
18744401640
-
Simulation and analysis on the resiliency and efficiency of malnets
-
Monterey: IEEE Computer Society Press
-
Li J, Ehrenkranz T, Kuenning G, Reiher P. Simulation and analysis on the resiliency and efficiency of malnets. In: Proc. of the IEEE Symp. on Measurement, Modeling, and Simulation of Malware (MMSM 2005). Monterey: IEEE Computer Society Press, 2005. 262-269.
-
(2005)
Proc. of the IEEE Symp. on Measurement, Modeling, and Simulation of Malware (MMSM 2005)
, pp. 262-269
-
-
Li, J.1
Ehrenkranz, T.2
Kuenning, G.3
Reiher, P.4
-
28
-
-
14944368398
-
Worm propagation modeling and analysis under dynamic quarantine defense
-
Staniford S. (ed.), New York: ACM Press
-
Zou CC, Gong W, Towsley D. Worm propagation modeling and analysis under dynamic quarantine defense. In: Staniford S, ed. Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003). New York: ACM Press, 2003. 51-60.
-
(2003)
Proc. of the ACM CCS Workshop on Rapid Malcode (WORM 2003)
, pp. 51-60
-
-
Zou, C.C.1
Gong, W.2
Towsley, D.3
-
30
-
-
33646150900
-
On the performance of Internet worm scanning strategies
-
Zou CC, Towsley D, Gong W. On the performance of Internet worm scanning strategies. Elsevier Journal of Performance Evaluation, 2005, 63(7): 700-723.
-
(2005)
Elsevier Journal of Performance Evaluation
, vol.63
, Issue.7
, pp. 700-723
-
-
Zou, C.C.1
Towsley, D.2
Gong, W.3
-
33
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
Vimercati S.D. and Syverson P. (ed.), LNCS 4219, Springer-Verlag
-
Baecher P, Koetter M, Holz T, Dornseif M, Freiling FC. The nepenthes platform: An efficient approach to collect malware. In: Vimercati SD, Syverson P, eds. Proc. of the 9th Int'l Symp. on Recent Advances in Intrusion Detection (RAID). LNCS 4219, Springer-Verlag, 2006. 165-184.
-
(2006)
Proc. of the 9th Int'l Symp. on Recent Advances in Intrusion Detection (RAID)
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.C.5
-
37
-
-
41949114400
-
Anomaly-Based botnet server detection
-
Binkley JR. Anomaly-Based botnet server detection. In: Proc. of the FloCon 2006 Analysis Workshop. 2006. http://www.cert.org/flocon/2006/presentations/botnet0606.pdf
-
(2006)
Proc. of the FloCon 2006 Analysis Workshop
-
-
Binkley, J.R.1
-
43
-
-
34547415753
-
Bots and botnets: Risks, issues and prevention
-
Overton M. Bots and botnets: Risks, issues and prevention. In: Proc. of the 2005 Virus Bulletin Conf. 2005. http://momusings.com/papers/VB2005-Bots_and_Botnets-1.0.2.pdf
-
(2005)
Proc. of the 2005 Virus Bulletin Conf.
-
-
Overton, M.1
|