메뉴 건너뛰기




Volumn , Issue , 2007, Pages 93-104

Using uncleanliness to predict future botnet addresses

Author keywords

Blacklists; Botnets; Reputation management

Indexed keywords

(PL) PROPERTIES; BOTNETS; DATA-SETS; INTERNET MEASUREMENTS; PHISHING;

EID: 42149173109     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1298306.1298319     Document Type: Conference Paper
Times cited : (106)

References (24)
  • 1
    • 42149135845 scopus 로고    scopus 로고
    • th, 2007.
    • th, 2007.
  • 6
    • 42149166487 scopus 로고    scopus 로고
    • C. Gates, J. McNutt, J. Kadane, and M. Kellner. Detecting scans at the ISP level. Technical Report CMU/SEI-2006-TR-005, Software Engineering Institute, 2006.
    • C. Gates, J. McNutt, J. Kadane, and M. Kellner. Detecting scans at the ISP level. Technical Report CMU/SEI-2006-TR-005, Software Engineering Institute, 2006.
  • 16
    • 3042826619 scopus 로고    scopus 로고
    • The making of a spam zombie army: Dissecting the sobig worms
    • E. Levy. The making of a spam zombie army: Dissecting the sobig worms. IEEE Security and Privacy, 1(4), 2003.
    • (2003) IEEE Security and Privacy , vol.1 , Issue.4
    • Levy, E.1
  • 17
    • 17644414542 scopus 로고    scopus 로고
    • Locality: A new paradigm for thinking about normal behavior and outsider threat
    • Ascona, Switzerland, August 18-21
    • John McHugh and Carrie Gates. Locality: A new paradigm for thinking about normal behavior and outsider threat. In Proceedings of the 2003 New Security Paradigms Workshop, Ascona, Switzerland, 2003. August 18-21, 2003.
    • (2003) Proceedings of the 2003 New Security Paradigms Workshop
    • McHugh, J.1    Gates, C.2
  • 19
    • 26844469335 scopus 로고    scopus 로고
    • Protection mechanisms against phishing attacks
    • Proceedings of the second annual conference on Trust, Privacy and Security in Digital Business, of, August
    • K. Plößl, H. Federrath, and T. Nowey. Protection mechanisms against phishing attacks. In Proceedings of the second annual conference on Trust, Privacy and Security in Digital Business, volume 3592 of Lecture Notes in Computer Science, August 2005.
    • (2005) Lecture Notes in Computer Science , vol.3592
    • Plößl, K.1    Federrath, H.2    Nowey, T.3
  • 20
    • 42149099768 scopus 로고    scopus 로고
    • th, 2007.
    • th, 2007.
  • 23
    • 42149194821 scopus 로고    scopus 로고
    • Bleeding Edge Threats. Bleeding snort ruleset. Available at http://www.bleedingsnort.com/index. php/about-bleeding-edge-threats/ all-bleeding-edge-threats-signatures/, Fetched on January 29th, 2007.
    • Bleeding Edge Threats. Bleeding snort ruleset. Available at http://www.bleedingsnort.com/index. php/about-bleeding-edge-threats/ all-bleeding-edge-threats-signatures/, Fetched on January 29th, 2007.
  • 24
    • 42149111251 scopus 로고    scopus 로고
    • Agencies feel botnets' light footprint
    • January
    • P. Walt. Agencies feel botnets' light footprint. Government Computer News, January 2007.
    • (2007) Government Computer News
    • Walt, P.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.