-
3
-
-
0038483826
-
Emergence of scaling in random networks
-
A.-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286(509), 1999.
-
(1999)
Science
, vol.286
, Issue.509
-
-
Barabási, A.-L.1
Albert, R.2
-
5
-
-
0034721164
-
Error and attack tolerance of complex networks
-
R. Albert, H. Jeong, and A.-L. Barabási. Error and attack tolerance of complex networks. Nature, 406:378-382, 2000.
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.-L.3
-
9
-
-
1642434224
-
Using sensor networks and data fusion for early detection of active worms
-
V. Berk, R. Gray, and G. Bakos. Using sensor networks and data fusion for early detection of active worms. In Proceedings of the SPIE AeroSense, 2003.
-
(2003)
Proceedings of the SPIE AeroSense
-
-
Berk, V.1
Gray, R.2
Bakos, G.3
-
14
-
-
84883150360
-
-
is the infection, 2005
-
D. Dagon. The network is the infection. http://www.caida.org/projects/ oarc/200507/slides/oarc0507-D\agon.pdf, 2005.
-
The network
-
-
Dagon, D.1
-
15
-
-
48649097305
-
Worm population control through periodic response
-
Technical report, Georgia Institute of Technology, June
-
D. Dagon, A. Takar, G. Gu, X. Qin, and W. Lee. Worm population control through periodic response. Technical report, Georgia Institute of Technology, June 2004.
-
(2004)
-
-
Dagon, D.1
Takar, A.2
Gu, G.3
Qin, X.4
Lee, W.5
-
17
-
-
33845592623
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
Technical Report ISSN-0935-3232, RWTH Aachen, April
-
F. C. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. Technical Report ISSN-0935-3232, RWTH Aachen, April 2005.
-
(2005)
-
-
Freiling, F.C.1
Holz, T.2
Wicherski, G.3
-
19
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
20
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In 16th USENIX Security Symposium (Security' 07), 2007.
-
(2007)
16th USENIX Security Symposium (Security' 07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
21
-
-
21644482790
-
Worm detection, early warning and response based on local victim information
-
G. Gu, M. Sharif, X. Qin, D. Dagon, W. Lee, and G. Riley. Worm detection, early warning and response based on local victim information. In 20th Annual Computer Security Applications Conference (ACSAC), 2004.
-
(2004)
20th Annual Computer Security Applications Conference (ACSAC)
-
-
Gu, G.1
Sharif, M.2
Qin, X.3
Dagon, D.4
Lee, W.5
Riley, G.6
-
22
-
-
38149054453
-
Using snort to detect rogue IRC bot programs
-
Technical report, October
-
C. Hanna. Using snort to detect rogue IRC bot programs. Technical report, October 2004.
-
(2004)
-
-
Hanna, C.1
-
24
-
-
48649105414
-
-
at home in the united states: Growing but slowing, 2005
-
J. Horrigan. Broadband adoption at home in the united states: Growing but slowing. http://web.si.umich.edu/tprc/papers/2005/501/TPRC\%20Horrigan\ %20Broadband.2005b.pdf, 2005.
-
Broadband adoption
-
-
Horrigan, J.1
-
26
-
-
34547307344
-
Virtual playgrounds for worm behavior investigation
-
Purdue University, February, 24
-
X. Jiang, D. Xu, H. J. Wang, and E. H. Spafford. Virtual playgrounds for worm behavior investigation. Technical Report CERIAS Technical Report (2005-24), Purdue University, February 2005.
-
(2005)
Technical Report CERIAS Technical Report
-
-
Jiang, X.1
Xu, D.2
Wang, H.J.3
Spafford, E.H.4
-
32
-
-
48649095253
-
-
LURHQ
-
LURHQ. Zindos worm analysis. http://www.lurhq.com/zindos.html, 2004.
-
(2004)
Zindos worm analysis
-
-
-
33
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
New York, NY, USA, ACM Press
-
Q. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and replication in unstructured peer-to-peer networks. In ICS '02: Proceedings of the 16th international conference on Super-computing, pages 84-95, New York, NY, USA, 2002. ACM Press.
-
(2002)
ICS '02: Proceedings of the 16th international conference on Super-computing
, pp. 84-95
-
-
Lv, Q.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
34
-
-
48649086255
-
-
MaxMind LLC. Maxmind - ip geolocation and online fraud prevention. http://www.maxmind.com/, 2007.
-
MaxMind LLC. Maxmind - ip geolocation and online fraud prevention. http://www.maxmind.com/, 2007.
-
-
-
-
35
-
-
47949132450
-
Taxonomy of botnet threats. Technical report, Trend Micro White Paper
-
November
-
T. Micro. Taxonomy of botnet threats. Technical report, Trend Micro White Paper, November 2006.
-
(2006)
-
-
Micro, T.1
-
36
-
-
0002687371
-
The small world problem
-
S. Milgram. The small world problem. Psychology Today, 2(60), 1967.
-
(1967)
Psychology Today
, vol.2
, Issue.60
-
-
Milgram, S.1
-
38
-
-
0742276097
-
Inside the slammer worm
-
July
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. Inside the slammer worm. IEEE Magazine on Security and Privacy, 1(4), July 2003.
-
(2003)
IEEE Magazine on Security and Privacy
, vol.1
, Issue.4
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
40
-
-
48649088885
-
The topology of covert conflict
-
Technical Report UCAM-CL-TR-637, University of Cambridge, July
-
S. Nagarja and R. Anderson. The topology of covert conflict. Technical Report UCAM-CL-TR-637, University of Cambridge, July 2005.
-
(2005)
-
-
Nagarja, S.1
Anderson, R.2
-
41
-
-
48649084321
-
Botnet tracking: Tools, techniques, and lessons learned
-
J. Nazario. Botnet tracking: Tools, techniques, and lessons learned. In Black Hat, 2007.
-
(2007)
Black Hat
-
-
Nazario, J.1
-
42
-
-
0035420732
-
Random graphs with arbitrary degree distributions and their applications
-
E64026118
-
M. Newman, S. Strogatz, and D. Watts. Random graphs with arbitrary degree distributions and their applications. Phys. Rev., E64(026118), 2001.
-
(2001)
Phys. Rev
-
-
Newman, M.1
Strogatz, S.2
Watts, D.3
-
43
-
-
48649093954
-
-
Nielsen NetRatings. Average web usage. http://www.nielsen-netratings.com/ reports.jsp?section=pub_reports&report=usage&period=weekly, 2007.
-
(2007)
Nielsen NetRatings. Average web usage
-
-
-
45
-
-
15744366692
-
Search and replication in unstructured peer-to-peer networks
-
L. Qin, C. Pei, E. Cohen, L. Kai, and S. Scott. Search and replication in unstructured peer-to-peer networks. In 16th ACM International Conference on Supercomputing, 2002.
-
(2002)
16th ACM International Conference on Supercomputing
-
-
Qin, L.1
Pei, C.2
Cohen, E.3
Kai, L.4
Scott, S.5
-
46
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of the 6th ACM SIGCOMM on Internet Measurement (IMC), pages 41-52, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM on Internet Measurement (IMC)
, pp. 41-52
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
47
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging. In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
48
-
-
0034775826
-
A scalable content-addressable network
-
August
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM), pages 161-172, August 2001.
-
(2001)
Proceedings of the ACM Conference of the Special Interest Group on Data Communication (SIGCOMM)
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
49
-
-
0036187056
-
Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design
-
M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the gnutella network: Properties of large-scale peer-to-peer systems and implications for system design. IEEE Internet Computing Journal, 6(1), 2002.
-
(2002)
IEEE Internet Computing Journal
, vol.6
, Issue.1
-
-
Ripeanu, M.1
Foster, I.2
Iamnitchi, A.3
-
52
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, California, August
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM '01 Conference, San Diego, California, August 2001.
-
(2001)
Proceedings of the ACM SIGCOMM '01 Conference
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
53
-
-
44649101679
-
Attack of the 50 foot botnet
-
Technical report, Department of Computer Science, University of Calgary, August
-
R. Vogt and J. Aycock. Attack of the 50 foot botnet. Technical report, Department of Computer Science, University of Calgary, August 2006.
-
(2006)
-
-
Vogt, R.1
Aycock, J.2
-
58
-
-
48649104978
-
-
Y. Xie, H.-A. Kim, D. R. O'Hallaron, M. K. Reiter, and H. Zhang. Seurat: A pointillist approach to network security, 2004.
-
(2004)
Seurat: A pointillist approach to network security
-
-
Xie, Y.1
Kim, H.-A.2
O'Hallaron, D.R.3
Reiter, M.K.4
Zhang, H.5
-
61
-
-
8644236108
-
Routing worm: A fast, selective attack worm based on ip address information
-
Technical Report TR-03-CSE-06, Umass ECE Dept, November
-
C. Zou, D. Towsley, W. Gong, and S. Cai. Routing worm: A fast, selective attack worm based on ip address information. Technical Report TR-03-CSE-06, Umass ECE Dept., November 2003.
-
(2003)
-
-
Zou, C.1
Towsley, D.2
Gong, W.3
Cai, S.4
|