메뉴 건너뛰기




Volumn , Issue , 2008, Pages 376-385

Evaluating email's feasibility for botnet command and control

Author keywords

[No Author keywords available]

Indexed keywords

BOTNETS; COMMAND AND CONTROL; DEPENDABLE SYSTEMS; E-MAIL COMMUNICATIONS; INTERNATIONAL CONFERENCES; MITIGATION STRATEGIES; SECURITY SOLUTIONS; SPAM E-MAILS;

EID: 53349109623     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2008.4630106     Document Type: Conference Paper
Times cited : (29)

References (22)
  • 1
    • 53349117595 scopus 로고    scopus 로고
    • FreePOPs. http://www.freepops.org/en/.
    • FreePOPs
  • 8
    • 53349108279 scopus 로고    scopus 로고
    • Plausible deniability using automated linguistic stegonagraphy
    • London, UK, Oct
    • M. Chapman and G. I. Davida. Plausible deniability using automated linguistic stegonagraphy. In Conference on Infrastructure Security, London, UK, Oct. 2002.
    • (2002) Conference on Infrastructure Security
    • Chapman, M.1    Davida, G.I.2
  • 10
    • 77950569747 scopus 로고    scopus 로고
    • BINDER: An extrusion-based break-in detector for personal computers
    • Anaheim, CA, Apr
    • W. Cui, R. H. Katz, and W. Tan. BINDER: An extrusion-based break-in detector for personal computers. In USENIX Annual Technical Conference, Anaheim, CA, Apr. 2005.
    • (2005) USENIX Annual Technical Conference
    • Cui, W.1    Katz, R.H.2    Tan, W.3
  • 12
    • 53349121912 scopus 로고    scopus 로고
    • B. Eckman. http://lists.sans.org/pipermail/unisog/2006-April/026261.html.
    • Eckman, B.1
  • 13
    • 53349129207 scopus 로고    scopus 로고
    • L. International. Key logger woes: How this type of spyware can hurt you, 2006. http://whitepapers.zdnet.com/whitepaper.aspx?docid=178232.
    • L. International. Key logger woes: How this type of spyware can hurt you, 2006. http://whitepapers.zdnet.com/whitepaper.aspx?docid=178232.
  • 14
    • 53349089204 scopus 로고    scopus 로고
    • Nobody's anonymous: Spam tracking and covert channels
    • Las Vegas, NV, July
    • C. Kret. Nobody's anonymous: Spam tracking and covert channels. In Black Hat Windows Security Briefings, Las Vegas, NV, July 2004.
    • (2004) Black Hat Windows Security Briefings
    • Kret, C.1
  • 15
  • 16
    • 3042750820 scopus 로고    scopus 로고
    • The future of internet worms
    • Technical report, Crimelabs Research, July
    • J. Nazario, J. Anderson, R. Walsh, and C. Connelly. The future of internet worms. Technical report, Crimelabs Research, July 2001.
    • (2001)
    • Nazario, J.1    Anderson, J.2    Walsh, R.3    Connelly, C.4
  • 17
    • 34547399387 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenomenon
    • Rio de Janeriro, Brazil, Oct
    • M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Internet Measurement Conference, Rio de Janeriro, Brazil, Oct. 2006.
    • (2006) Internet Measurement Conference
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 18
  • 21
    • 12244282921 scopus 로고    scopus 로고
    • CAPTCHA: Using hard AI problems for security
    • Warsaw, Poland, May
    • L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In EUROCRYPT, Warsaw, Poland, May 2003.
    • (2003) EUROCRYPT
    • von Ahn, L.1    Blum, M.2    Hopper, N.J.3    Langford, J.4
  • 22
    • 41949089847 scopus 로고    scopus 로고
    • An advanced hybrid peer-to-peer botnet
    • Cambridge, MA, Apr
    • P. Wang, S. Sparks, and C. Zou. An advanced hybrid peer-to-peer botnet. In HotBots '07, Cambridge, MA, Apr. 2007.
    • (2007) HotBots '07
    • Wang, P.1    Sparks, S.2    Zou, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.