-
1
-
-
47949132450
-
Taxonomy of botnet threats
-
Trend Micro White Paper, Tech. Rep, November
-
T.Micro, "Taxonomy of botnet threats", Trend Micro White Paper, Tech. Rep., November 2006.
-
(2006)
-
-
Micro, T.1
-
2
-
-
70349716164
-
-
LURHQ Threat Intelligence Group. (2007) Sinit p2p Trojan analysis. [Online]. Available: http://www.lurhq.com/sinit.html
-
LURHQ Threat Intelligence Group. (2007) Sinit p2p Trojan analysis. [Online]. Available: http://www.lurhq.com/sinit.html
-
-
-
-
4
-
-
70350241605
-
-
Online, Available
-
J.Stewart. (2007) Storm worm DDos attack. [Online]. Available: http://www.secureworked.com/research/threats/storm-worm
-
(2007)
Storm worm DDos attack
-
-
Stewart, J.1
-
5
-
-
70349702361
-
-
Online, Available
-
Overnet. [Online]. Available: http://www.overnet.org
-
Overnet
-
-
-
6
-
-
2442421260
-
Kademlian: A peer-to-peer information system based on the XOR metric
-
March
-
P.Maymounkov and D.Mazieres, "Kademlian: A peer-to-peer information system based on the XOR metric", in Proceedings of IPTPS'02, March 2002.
-
(2002)
Proceedings of IPTPS'02
-
-
Maymounkov, P.1
Mazieres, D.2
-
9
-
-
33751556300
-
Measuring large overlay networks - The overnet example
-
March
-
K.Kutzner and T. Fuhrmann, "Measuring large overlay networks - The overnet example", in Proceedings of KiVS2005, March 2005.
-
(2005)
Proceedings of KiVS2005
-
-
Kutzner, K.1
Fuhrmann, T.2
-
11
-
-
0034427756
-
Testing that distributions are close
-
December
-
T.Batu, L.Fortnow, R.Rubinfeld, W.D.Smith and P.White, "Testing that distributions are close", in Proceedings of FOCS2000, December 2000.
-
(2000)
Proceedings of FOCS2000
-
-
Batu, T.1
Fortnow, L.2
Rubinfeld, R.3
Smith, W.D.4
White, P.5
-
12
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by IRC nickname evaluation
-
April
-
J.Goebel and T.Holz, "Rishi: Identify bot contaminated hosts by IRC nickname evaluation", in Proceedings of USENIX HotBots'07, April 2007.
-
(2007)
Proceedings of USENIX HotBots'07
-
-
Goebel, J.1
Holz, T.2
-
15
-
-
85075837457
-
BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection
-
July
-
G.F.Gu, R.Perdisci, J.J.Zhang and W.K.Lee, "BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection", in Proceedings of USENIX Security'08, July 2008.
-
(2008)
Proceedings of USENIX Security'08
-
-
Gu, G.F.1
Perdisci, R.2
Zhang, J.J.3
Lee, W.K.4
-
16
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
July
-
E.Cooke, F.Jahanian, and D.McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets", in Proceedings of USENIX SRUTI'05, July 2005.
-
(2005)
Proceedings of USENIX SRUTI'05
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
17
-
-
85093847546
-
Peer-to-Peer Botnets: Overview and Case Study
-
April
-
J.GRizzard, V.Sharma, C.Nunnery, B.Kang, D.Dagon, "Peer-to-Peer Botnets: Overview and Case Study", in Proceedings of USENIX Hot-Bots'07, April 2007.
-
(2007)
Proceedings of USENIX Hot-Bots'07
-
-
GRizzard, J.1
Sharma, V.2
Nunnery, C.3
Kang, B.4
Dagon, D.5
-
18
-
-
44649128920
-
-
SRI International, Tech. Rep, October
-
P.Porras, H.Saidi and V.Yegneswaran, "A Multi-perspective Analysis of the Storm(Peacomm) Worm", SRI International, Tech. Rep., October 2007.
-
(2007)
A Multi-perspective Analysis of the Storm(Peacomm) Worm
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
20
-
-
63749125905
-
Peerbot:Catch me if you can
-
Symantec Security Response, Tech. Rep, April
-
E.Florio and M.Ciubotariu, "Peerbot:Catch me if you can", Symantec Security Response, Tech. Rep., April 2007.
-
(2007)
-
-
Florio, E.1
Ciubotariu, M.2
-
21
-
-
85084097128
-
Measurements and Mitigation of Peerto-Peer-based Botnets:A Case Study on Storm Worm
-
April
-
T.Holz, M.Steiner, F.Dahl etc, "Measurements and Mitigation of Peerto-Peer-based Botnets:A Case Study on Storm Worm", in Proceedings of USENIX LEET'08, April 2008.
-
(2008)
Proceedings of USENIX LEET'08
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
etc4
-
22
-
-
70249137512
-
-
February, Online, Available
-
R.Schoff and R.Koning. (2007, February) Detecting peer-to-peer botnets. [Online]. Available: http://staff.science.uva.nl/ delaat/sne-2006-2007/p17/ report.pdf
-
(2007)
Detecting peer-to-peer botnets
-
-
Schoff, R.1
Koning, R.2
|