-
1
-
-
64749104904
-
-
http://www.honeynet.org/papers/bots.
-
-
-
-
2
-
-
64749094061
-
-
K. A, R. B, and H. D. Wide-scale botnet detection and characterization. In HotBots, 2007.
-
K. A, R. B, and H. D. Wide-scale botnet detection and characterization. In HotBots, 2007.
-
-
-
-
3
-
-
64749108264
-
-
M. Bailey, E. Cooke, D.Watson, F. Jahanian, and N. Provos. hybrid honeypot architecture for scalable network monitoring. Technical report, October 2004.
-
M. Bailey, E. Cooke, D.Watson, F. Jahanian, and N. Provos. hybrid honeypot architecture for scalable network monitoring. Technical report, October 2004.
-
-
-
-
4
-
-
64749110302
-
Node behavior based detection for p2p botnets in enterprise network environments
-
submitted to NDSS
-
S. Chang and T. E. Daniels. Node behavior based detection for p2p botnets in enterprise network environments. submitted to NDSS, 2009.
-
(2009)
-
-
Chang, S.1
Daniels, T.E.2
-
5
-
-
48649089769
-
-
D. Dagon, G. Gu, C. Lee, andW. Lee. A taxonomy of botnet structures. In ACSAC, 2007.
-
D. Dagon, G. Gu, C. Lee, andW. Lee. A taxonomy of botnet structures. In ACSAC, 2007.
-
-
-
-
7
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Botminer: Clustering analysis of network traffic for protocol- and structureindependent botnet detection. In Security, 2008.
-
(2008)
Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
8
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium, 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
9
-
-
85175133385
-
Botsniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In NDSS, 2008.
-
(2008)
NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
10
-
-
64749098996
-
-
G. JB, S. V, and N. C. Peer-to-peer botnets: Overview and case study. In Proc. of the 1st Workshop on Hot Topics in Understanding Botnets, 2007.
-
G. JB, S. V, and N. C. Peer-to-peer botnets: Overview and case study. In Proc. of the 1st Workshop on Hot Topics in Understanding Botnets, 2007.
-
-
-
-
11
-
-
84878700321
-
A first look at modern enterprise traffic
-
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney. A first look at modern enterprise traffic. In ACM/USENIX Internet Measurement Conference, 2005.
-
(2005)
ACM/USENIX Internet Measurement Conference
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
-
13
-
-
77952717608
-
Revealing botnet membership with dnsbl counter-intelligence
-
A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership with dnsbl counter-intelligence. In SRUTI, 2006.
-
(2006)
SRUTI
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
14
-
-
44649101679
-
Attack of the 50 foot botnet
-
Technical report
-
R. Vogt and J. Aycock. Attack of the 50 foot botnet. Technical report, 2006.
-
(2006)
-
-
Vogt, R.1
Aycock, J.2
-
16
-
-
33845590556
-
-
C. Zou and R. Cunningham. Honeypot-aware advanced botnet construction and maintenance. In DSN, 2006.
-
C. Zou and R. Cunningham. Honeypot-aware advanced botnet construction and maintenance. In DSN, 2006.
-
-
-
|