-
1
-
-
51949099879
-
-
http://en.wikipedia.org/wiki/Botnet.
-
-
-
-
2
-
-
51949090238
-
-
Botnet scams are exploding. http://www.contentagenda.com/articleXml/ LN760999245.html?industryid=45177.
-
Botnet scams are exploding
-
-
-
3
-
-
51949088897
-
-
Trend micro botnet identification service
-
Trend micro botnet identification service. http://us.trendmicro.com/us/ products/enterprise/botnet-identification-service/.
-
-
-
-
4
-
-
51949105151
-
-
T. H. P. R. Alliance. Know your enemy: Fastflux service networks an ever changing enemy. http://www.honeynet.org/papers/ff/fast-flux.html, 2007.
-
T. H. P. R. Alliance. Know your enemy: Fastflux service networks an ever changing enemy. http://www.honeynet.org/papers/ff/fast-flux.html, 2007.
-
-
-
-
11
-
-
84891429894
-
Modeling botnet propagation using time zones
-
D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS, 2006.
-
(2006)
NDSS
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
12
-
-
85093842196
-
-
N. Daswani, M. Stoppelman, the Google Click Quality, and S. Teams. The anatomy of clickbot.a. In First workshop on hot topics in understanding botnets, 2007.
-
N. Daswani, M. Stoppelman, the Google Click Quality, and S. Teams. The anatomy of clickbot.a. In First workshop on hot topics in understanding botnets, 2007.
-
-
-
-
15
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In First Workshop on Hot Topics in Understanding Botnets, 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
16
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
17
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In 16th USENIX Security Symposium, 2007.
-
(2007)
16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
18
-
-
85175133385
-
Botsniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In NDSS, 2008.
-
(2008)
NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
19
-
-
85084097128
-
Measurement and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling. Measurement and mitigation of peer-to-peer-based botnets: A case study on storm worm. In LEET, 2008.
-
(2008)
LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.W.4
Freiling, F.5
-
21
-
-
51949113131
-
Blackenergy ddos bot analysis
-
Technical report, Arbor Networks, Oct 2007
-
J. Nazario. Blackenergy ddos bot analysis. Technical report, Arbor Networks, Oct 2007.
-
-
-
Nazario, J.1
-
22
-
-
51949110405
-
Botnet tracking: Tools, techniques, and lesson learned
-
Technical report, Arbor Networks, 2007
-
J. Nazario. Botnet tracking: Tools, techniques, and lesson learned. Technical report, Arbor Networks, 2007.
-
-
-
Nazario, J.1
-
23
-
-
51949110227
-
-
H. Project and R. Alliance. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/bots/, 2005.
-
H. Project and R. Alliance. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/bots/, 2005.
-
-
-
-
24
-
-
34547399387
-
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In IMC, 2006.
-
A multifaceted approach to understanding the botnet phenomenon
, vol.1097
, pp. 2006
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
25
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In First Workshop on Hot Topics in Understanding Botnets, 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
26
-
-
33847737144
-
Understanding the network?-level behavior of spammers
-
A. Ramachandran and N. Feamster. Understanding the network?-level behavior of spammers. In Sigcomm, 2006.
-
(2006)
Sigcomm
-
-
Ramachandran, A.1
Feamster, N.2
-
28
-
-
51949113522
-
-
R. Vogt, J. Aycock, M. J. Jacobson, and Jr. Army of botnets. In NDSS, 2007.
-
R. Vogt, J. Aycock, M. J. Jacobson, and Jr. Army of botnets. In NDSS, 2007.
-
-
-
|