-
1
-
-
46349109903
-
A proposal of metrics for botnet detection based on its cooperative behavior
-
Washington, DC, May
-
M. Akiyama, T. Kawamoto, M. Shimamura, T. Yokoyama, Y. Kadobayashi, and S. Yamaguchi. A proposal of metrics for botnet detection based on its cooperative behavior. In Proceedings of the 2007 International Symposium on Applications and the InternetWorkshops(SAINT- W'07),Washington, DC, May 2007.
-
(2007)
Proceedings of the 2007 International Symposium on Applications and the InternetWorkshops(SAINT- W'07)
-
-
Akiyama, M.1
Kawamoto, T.2
Shimamura, M.3
Yokoyama, T.4
Kadobayashi, Y.5
Yamaguchi, S.6
-
2
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Boston, MA, August
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: Characterizing internet scam hosting infrastructure. In Proceedings of the 16th USENIX Security Symposium (Security'07), Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security'07)
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
5
-
-
38049035805
-
Botnet detection by monitoring group activities in dns traffic
-
Washington, DC, October
-
H. Choi, H. Lee, H. Lee, and H. Kim. Botnet detection by monitoring group activities in dns traffic. In Proceedings of the 7th IEEE International Conference on Computer and Information Technology (CIT'07), Washington, DC, October 2007.
-
(2007)
Proceedings of the 7th IEEE International Conference on Computer and Information Technology (CIT'07)
-
-
Choi, H.1
Lee, H.2
Lee, H.3
H. Kim4
-
6
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cambridge, MA, July
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop), Cambridge, MA, July 2005.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet (SRUTI 2005 Workshop)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
7
-
-
48649089769
-
A taxonomy of botnet structures
-
Florida, USA, November
-
D. Dagon, G. Gu, C. P. Lee, and W. Lee. A taxonomy of botnet structures. In Twenty-Third Annual Computer Security Applications Conference (ACSAC'07), Florida, USA,November 2007.
-
(2007)
Twenty-Third Annual Computer Security Applications Conference (ACSAC'07)
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
8
-
-
84891429894
-
Modeling botnet propagation using time zones
-
San Diego, CA, February
-
D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In Proceedings of the 13rd Network and Distributed System Security Symposium (NDSS'06), San Diego, CA, February 2006.
-
(2006)
Proceedings of the 13rd Network and Distributed System Security Symposium (NDSS'06)
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
10
-
-
78751511305
-
Measurement and classification of huamans and bots in internet chat
-
San Jose, CA, July
-
S. Gianvecchio, M. Xie, Z.Wu, and H.Wang. Measurement and classification of huamans and bots in internet chat. In Proceedings of the 17th USENIX Security Symposium (Security' 08), San Jose, CA, July 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium (Security' 08)
-
-
Gianvecchio, S.1
Xie, M.2
Z. Wu3
Wang, H.4
-
12
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Cambridge, MA, April
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-Peer Botnets: Overview and case study. In First Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, April 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
13
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
San Jose, CA, July
-
G. Gu, R. Perdisci, junjie Zhang, and W. Lee. BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th USENIX Security Symposium (Security'08), San Jose, CA, July 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium (Security'08)
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
14
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
Boston, MA, August
-
G. Gu, P. Porras, V. Yegneswaran, M. Frog, and W. Lee. BotHunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium (Security'07), Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security'07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Frog, M.4
Lee, W.5
-
15
-
-
85175133385
-
Botsniffer: Detecting botnet command and control channels in network traffic
-
San Diego, CA, February
-
G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting botnet command and control channels in network traffic. In Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS'08), San Diego, CA, February 2008.
-
(2008)
Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS'08)
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
16
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
San Francisco, CA, April
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and Mitigation of Peer-to-Peer- based Botnets: A case study on storm worm. In First UsenixWorkshop on Large-scale Exploits and Emergent Threats (LEET'08), San Francisco, CA, April 2008.
-
(2008)
First UsenixWorkshop on Large-scale Exploits and Emergent Threats (LEET'08)
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
17
-
-
85084096724
-
The heisenbot uncertainty problem: Challenges in separating bots from chaff
-
San Francisco, CA, April
-
C. Kanich, K. Lechenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in separating bots from chaff. In First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET'08), San Francisco, CA, April 2008.
-
(2008)
First Usenix Workshop on Large-scale Exploits and Emergent Threats (LEET'08)
-
-
Kanich, C.1
Lechenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
18
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Cambridge, MA, April
-
A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In First Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, April 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
19
-
-
14844331622
-
Bot software spreads, causes new worries
-
June
-
L. McLaughlin. Bot software spreads, causes new worries IEEE Distributed Systems Online, 5(6), June 2004.
-
(2004)
IEEE Distributed Systems Online
, vol.5
, Issue.6
-
-
McLaughlin, L.1
-
20
-
-
66249138331
-
Microsoft
-
July december, 2006, May
-
Microsoft. Microsoft security intelligence report: Julydecember 2006. http://www.microsoft.com/technet/ security/default.mspx, May 2007.
-
(2007)
Microsoft security intelligence report
-
-
-
21
-
-
85080711655
-
The ghost in the browser: Analysis of webbased malware
-
USENIX
-
N. Provos, D. McNamee, P. Mavrommatis, K. Wang, and N. Modadugu. The ghost in the browser: Analysis of webbased malware. In First Workshop on Hot Topics in Understanding Botnets, HotBots'07. USENIX, 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets, HotBots'07
-
-
Provos, N.1
McNamee, D.2
Mavrommatis, P.3
Wang, K.4
Modadugu, N.5
-
22
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
DOI 10.1145/1177080.1177086, Proceedings of the 2006 ACM SIGCOMM Internet Measurement Conference, IMC 2006
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of Internet Measurement Conference 2006 (IMC'06), Rio de Janeiro, Brazil, October 2006. (Pubitemid 47165587)
-
(2006)
Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
23
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
Cambridge, MA, April
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My Botnet is Bigger than Yours (Maybe, Better than Yours): why size estimates remain challenging. In First Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, April 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
24
-
-
77952717608
-
Revealing botnet membership using dnsbl counter- intelligence
-
San Jose, CA, July
-
A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using dnsbl counter- intelligence. In Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'06), San Jose, CA, July 2006.
-
(2006)
Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'06)
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
25
-
-
78651523935
-
To catch a predator: A natural language approach for eliciting malicious payloads
-
San Jose, CA, July
-
S. Small, J. Mason, and F. Monrose. To Catch a Predator: A natural language approach for eliciting malicious payloads. In Proceedings of the 17th USENIX Security Symposium (Security'08), San Jose, CA, July 2008.
-
(2008)
Proceedings of the 17th USENIX Security Symposium (Security'08)
-
-
Small, S.1
Mason, J.2
Monrose, F.3
-
26
-
-
41949115980
-
Detecting botnets with tight command and control
-
Tampa, Florida, November
-
W. T. Strayey, R.Walsh, C. Livadas, and D. Lapsley. Detecting botnets with tight command and control. In 31st IEEE Conference on Local Computer Networks (LCN06), Tampa, Florida, November 2006.
-
(2006)
31st IEEE Conference on Local Computer Networks (LCN06)
-
-
Strayey, W.T.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
27
-
-
41949089847
-
An advanced hybrid peer-to-peer botnet
-
Cambridge, MA, April
-
P. Wang, S. Sparks, and C. C. Zou. An advanced hybrid peer-to-peer botnet. In First Workshop on Hot Topics in Understanding Botnets (HotBots'07), Cambridge, MA, April 2007.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
28
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Seattle,WA, August
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and characteristics. In Proceedings of ACM SIGCOMM'08, Seattle,WA, August2008.
-
(2008)
Proceedings of ACM SIGCOMM'08
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
29
-
-
77649329707
-
Botnet research survey
-
Turku, Finland, July
-
Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. Roberts, and K. Han. Botnet research survey. In 2008 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC'08), Turku, Finland, July 2008.
-
(2008)
2008 32nd Annual IEEE International Computer Software and Applications Conference (COMPSAC'08)
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.J.4
Roberts, P.5
Han, K.6
-
30
-
-
85084095135
-
Characterizing botnets from email spam records
-
San Francisco, CA, April
-
L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, I. Osipkov G. Hulten, and J. D. Tygar. Characterizing botnets from email spam records. In First Usenix Workshop on LargescaleE xploits and Emergent Threats (LEET'08), San Francisco, CA, April 2008.
-
(2008)
First Usenix Workshop on LargescaleE xploits and Emergent Threats (LEET'08)
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
Wang, H.J.4
Osipkov, I.5
Hulten, G.6
Tygar, J.D.7
|