-
1
-
-
46349109903
-
A proposal of metrics for botnet detection based on its cooperative behavior
-
Washington, DC, USA, IEEE Computer Society
-
M. Akiyama, T. Kawamoto, M. Shimamura, T. Yokoyama, Y. Kadobayashi, and S. Yamaguchi. A proposal of metrics for botnet detection based on its cooperative behavior. InSAINT-W '07: Proceedings of the 2007 International Symposium on Applications and the Internet Workshops, page 82, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
InSAINT-W '07: Proceedings of the 2007 International Symposium on Applications and the Internet Workshops
, pp. 82
-
-
Akiyama, M.1
Kawamoto, T.2
Shimamura, M.3
Yokoyama, T.4
Kadobayashi, Y.5
Yamaguchi, S.6
-
2
-
-
84882582017
-
-
P. Barford and V. Yegneswaran. An inside look at botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Special Workshop on Malware Detection, 27 of Advances in Information Security. Springer Verlag, 2007.
-
P. Barford and V. Yegneswaran. An inside look at botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Special Workshop on Malware Detection, volume 27 of Advances in Information Security. Springer Verlag, 2007.
-
-
-
-
3
-
-
85080378133
-
An algorithm for anomaly-based botnet detection
-
Berkeley, CA, USA, USENIX Association
-
J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In SRUTI' 06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet, pages 7-7, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
SRUTI' 06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet
, pp. 7-7
-
-
Binkley, J.R.1
Singh, S.2
-
4
-
-
84888402098
-
-
June
-
E. Cooke, F. Jahanian, and D. Mcpherson. The zombie roundup: Understanding, detecting, and disrupting botnets. pages 39-44, June 2005.
-
(2005)
The zombie roundup: Understanding, detecting, and disrupting botnets
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
Mcpherson, D.3
-
5
-
-
84891429894
-
Modeling botnet propagation using time zones
-
The Internet Society
-
D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In NDSS. The Internet Society, 2006.
-
(2006)
NDSS
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
6
-
-
85077692116
-
Dynamic application-layer protocol analysis for network intrusion detection
-
Berkeley, CA, USA, USENIX Association
-
H. Dreger, A. Feldmann, M. Mai, V. Paxson, and R. Summer. Dynamic application-layer protocol analysis for network intrusion detection. In USENIX-SS'6: Proceedings of the 15th conference on USENIX Security Symposium, pages 18-18, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
USENIX-SS'6: Proceedings of the 15th conference on USENIX Security Symposium
, pp. 18-18
-
-
Dreger, H.1
Feldmann, A.2
Mai, M.3
Paxson, V.4
Summer, R.5
-
7
-
-
42549129831
-
Protocol identification of encrypted network traffic
-
IEEE Computer Society
-
M. Gebski, A. Penev, and R. K. Wong. Protocol identification of encrypted network traffic. In Web Intelligence, pages 957-960. IEEE Computer Society, 2006.
-
(2006)
Web Intelligence
, pp. 957-960
-
-
Gebski, M.1
Penev, A.2
Wong, R.K.3
-
8
-
-
85093871360
-
-
J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by ire nickname evaluation. In HotBots'07: Proceedings of the first conference on First WorkshoponHot Topics in Understanding Botnets, pages 8-8, Berkeley, CA, USA, 2007. USENIX Association
-
J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by ire nickname evaluation. In HotBots'07: Proceedings of the first conference on First WorkshoponHot Topics in Understanding Botnets, pages 8-8, Berkeley, CA, USA, 2007. USENIX Association
-
-
-
-
9
-
-
34547969527
-
The new front line: Estonia under cyberassault
-
IEEE, July-Aug
-
M. Lesk. The new front line: Estonia under cyberassault. Security and Privacy, IEEE, 5(4):76-79, July-Aug. 2007.
-
(2007)
Security and Privacy
, vol.5
, Issue.4
, pp. 76-79
-
-
Lesk, M.1
-
10
-
-
46149123241
-
Using machine learning technliques to identify botnet traffic
-
Nov
-
C. Livadas, R. Walsh, D. Lapsley, and W. Strayer. Using machine learning technliques to identify botnet traffic. Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pages 967-974, Nov. 2006.
-
(2006)
Local Computer Networks, Proceedings 2006 31st IEEE Conference on
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.4
-
11
-
-
2642516930
-
Internet relay chat protocol
-
May
-
J. Oikarinen and D. Reed. Internet relay chat protocol. RFC, May 1993.
-
(1993)
RFC
-
-
Oikarinen, J.1
Reed, D.2
-
12
-
-
24644463025
-
Bots and botnets: An overview
-
Technical report, SANS institute
-
R. Puri. Bots and botnets: An overview. Technical report, SANS institute, 2003.
-
(2003)
-
-
Puri, R.1
-
13
-
-
55349149918
-
-
J. R. Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
-
J. R. Quinlan. C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1993.
-
-
-
-
14
-
-
34547399387
-
A multi-faceted approach to understanding the botnet phenomenon
-
J. M. Almeida, V. A. F. Almeida, and P. Barford, editors, ACM
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multi-faceted approach to understanding the botnet phenomenon. In J. M. Almeida, V. A. F. Almeida, and P. Barford, editors, Internet Measurement Conference, pages 41-52. ACM, 2006.
-
(2006)
Internet Measurement Conference
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
15
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. SIGCOMM Comput. Commun. Rev, 36(4):291-302, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
16
-
-
77952717608
-
Revealing botnet membership using dnsbl counter-intelligence
-
Berkeley, CA, USA, USENIX Association
-
A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using dnsbl counter-intelligence. In SRUTI'06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet, pages 8-8, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
SRUTI'06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet
, pp. 8-8
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
17
-
-
33746642190
-
Worms and viruses and botnets, oh my!: Rational responses to emerging internet threats
-
G. P. Schaffer. Worms and viruses and botnets, oh my!: Rational responses to emerging internet threats. IEEE Security and Privacy, 4(3):52-58, 2006.
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.3
, pp. 52-58
-
-
Schaffer, G.P.1
-
18
-
-
41949115980
-
Detecting botnets with tightcommand and control
-
Nov
-
W. T. Strayer, R. Walsh, C. Livadas, and D. Lapsley. Detecting botnets with tightcommand and control. Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pages 195-202, Nov. 2006.
-
(2006)
Local Computer Networks, Proceedings 2006 31st IEEE Conference on
, pp. 195-202
-
-
Strayer, W.T.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
19
-
-
84887252594
-
Support vector method for function approximation, regression estimation and signal processing
-
M. Mozer, M. I. Jordan, and T. Petsche, editors, MIT Press
-
V. Vapnik, S. E. Golowich, and A. J. Smola. Support vector method for function approximation, regression estimation and signal processing. In M. Mozer, M. I. Jordan, and T. Petsche, editors, NIPS, pages 281-287. MIT Press, 1996.
-
(1996)
NIPS
, pp. 281-287
-
-
Vapnik, V.1
Golowich, S.E.2
Smola, A.J.3
|