-
3
-
-
84888402098
-
The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets. In SRUTI05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop, 2005.
-
(2005)
SRUTI05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
4
-
-
58149091623
-
Discovery techniques for P2P botnets
-
Technical Report CS 2008-4, Stevens Institute of Technology, September
-
D. Dittrieh and S. Dietrich. Discovery techniques for P2P botnets. Technical Report CS 2008-4, Stevens Institute of Technology, September 2008.
-
(2008)
-
-
Dittrieh, D.1
Dietrich, S.2
-
5
-
-
58149085575
-
New directions in P2P mal-ware
-
Princeton, New Jersey, USA, April
-
D. Dittrieh and S. Dietrich. New directions in P2P mal-ware. In Proceedings of the 2008 IEEE Sarnoff Symposium, page 5, Princeton, New Jersey, USA, April 2008.
-
(2008)
Proceedings of the 2008 IEEE Sarnoff Symposium
, pp. 5
-
-
Dittrieh, D.1
Dietrich, S.2
-
6
-
-
58149096198
-
-
Technical Report CS 2008-3. Stevens Institute of Technology, June
-
D. Dittrieh and S. Dietrich. Technical Report CS 2008-3. Stevens Institute of Technology, June 2008.
-
(2008)
-
-
Dittrieh, D.1
Dietrich, S.2
-
7
-
-
58149085697
-
Storm, Nugache lead dangerous new botnet barrage
-
December, 289142,sidl4.gcil286808,00.html
-
D. Fischer. Storm, Nugache lead dangerous new botnet barrage. SearchSecurity.com, December 2007. http://searchsecurity.techtarget.com/ news/article/0,289142,sidl4.gcil286808,00.html.
-
(2007)
SearchSecurity.com
-
-
Fischer, D.1
-
9
-
-
20844452458
-
A short visit to the bot zoo
-
May-June
-
T. Holz. A short visit to the bot zoo. IEEE Security & Privacy Magazine, 3(3):76-79, May-June 2005.
-
(2005)
IEEE Security & Privacy Magazine
, vol.3
, Issue.3
, pp. 76-79
-
-
Holz, T.1
-
10
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
San Francisco, CA, USA, April
-
T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freil-ing. Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In LEET'08: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008, San Francisco, CA, USA, April 2008.
-
(2008)
LEET'08: First USENIX Workshop on Large-Scale Exploits and Emergent Threats, April 15, 2008
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.W.4
Freil-ing, F.5
-
11
-
-
58149101353
-
-
B. Kaliski. PKCS #1: RSA Encryption version 1.5. RFC 2313, Internet Engineering Task Force, 1998
-
B. Kaliski. PKCS #1: RSA Encryption version 1.5. RFC 2313, Internet Engineering Task Force, 1998.
-
-
-
-
13
-
-
58149095086
-
Cheyenne teen pleads guilty to computer crime
-
August
-
J. Miller. Cheyenne teen pleads guilty to computer crime. Star-Tribune, August 2008. http://www.casperstartribune.net/articles/ 2008/08/16/news/casper/2c6fb0ecfe2ddf6c872574a700057d26.txt.
-
(2008)
Star-Tribune
-
-
Miller, J.1
-
14
-
-
48649088885
-
The topology of covert conflict
-
Technical Report UCAM-CL-TR-637, University of Cambridge, July
-
S. Nagaraja and R. Anderson. The topology of covert conflict. Technical Report UCAM-CL-TR-637, University of Cambridge, July 2005.
-
(2005)
-
-
Nagaraja, S.1
Anderson, R.2
-
15
-
-
58149089569
-
-
Bot, May
-
J. Nazario. Nugache: TCP port 8 Bot, May 2006. http://asert. arbornetworks.com/2006/05/nugache-tcp-port-8-bot/.
-
(2006)
Nugache: TCP port
, vol.8
-
-
Nazario, J.1
-
17
-
-
44649128920
-
A Multi-perspective Analysis of the Storm (Peacomm) Worm
-
Technical report, Computer Science Laboratory, SRI International
-
P. Porras, H. Saidi, and V. Yegneswaran. A Multi-perspective Analysis of the Storm (Peacomm) Worm. Technical report, Computer Science Laboratory, SRI International, 2007.
-
(2007)
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
18
-
-
0003509661
-
-
RFC 1918, Internet Engineering Task Force
-
Y. Rekhter, B. Moskowitz, D. Karrenberg, G. J. de Groot, and E. Lear. Address allocation for private internets. RFC 1918, Internet Engineering Task Force, 1996.
-
(1996)
Address allocation for private internets
-
-
Rekhter, Y.1
Moskowitz, B.2
Karrenberg, D.3
de Groot, G.J.4
Lear, E.5
-
21
-
-
49049107082
-
Analysis of the Storm and Nugache Trojans: P2P is here
-
December
-
S. Stover, D. Dittrieh, J. Hernandez, and S. Dietrich. Analysis of the Storm and Nugache Trojans: P2P is here. In USENIX; login: vol. 32, no. 6, December 2007.
-
(2007)
USENIX; login
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrieh, D.2
Hernandez, J.3
Dietrich, S.4
-
22
-
-
58149083207
-
-
The Honeynet Project. Honeynet Definitions, Requirements, and Standards version 1.6.0, 2004
-
The Honeynet Project. Honeynet Definitions, Requirements, and Standards version 1.6.0, 2004. http://www.honeynet.org/alliance/requirement s.html.
-
-
-
-
23
-
-
58149094302
-
-
The Honeynet Project
-
The Honeynet Project. Honeywall, 2005. http://www.honeynet.org/papers/ cdrom/.
-
(2005)
Honeywall
-
-
-
25
-
-
58149100791
-
-
Trend Micro. TROJ-DLOADER.IBZ, December 2006. http://www.trendmicro.com/ vinfo/virusencyclo/default5.asp?VName=TROJ/DLOADER.IBZ.
-
Trend Micro. TROJ-DLOADER.IBZ, December 2006. http://www.trendmicro.com/ vinfo/virusencyclo/default5.asp?VName=TROJ/DLOADER.IBZ.
-
-
-
-
26
-
-
58149097890
-
-
December 2006
-
Trend Micro. WORM.NUGACHE.G. http://www.trendmicro.com/vinfo/ virusencyclo/default5. asp?VName=WORM\-NUGACHE.G, December 2006.
-
Trend Micro. WORM.NUGACHE.G
-
-
-
27
-
-
58149089218
-
-
December
-
Trend Micro. WORM-NUGACHE.G (Japanese web site), December 2006. http://blog. trendmicro.co.jp/archives/1053.
-
(2006)
G (Japanese web site)
-
-
-
30
-
-
41949089847
-
An advanced hybrid peer-to-peer botnet
-
Berkeley, CA, USA, USENIX Association
-
P. Wang, S. Sparks, and C. C. Zou. An advanced hybrid peer-to-peer botnet. In HotBots '07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pages 2-2, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots '07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 2-2
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
|