-
1
-
-
70349663476
-
-
P. Bacher, T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/ bots/, dated on 13 March 2005.
-
P. Bacher, T. Holz, M. Kotter, and G. Wicherski. Know your enemy: Tracking botnets. http://www.honeynet.org/papers/ bots/, dated on 13 March 2005.
-
-
-
-
3
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In SRUTI'05.
-
SRUTI'05
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
5
-
-
84891429894
-
Modeling botnet propagation using time zones
-
D. Dagon, C. Zou, and W. Lee. Modeling botnet propagation using time zones. In Proc. NDSS'06, 2006.
-
(2006)
Proc. NDSS'06
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
6
-
-
70349695671
-
Botnet tracking: Exploring a root-cause methodology to prevent denial-ofservice attaks
-
F. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent denial-ofservice attaks. In ESORICS'05.
-
ESORICS'05
-
-
Freiling, F.1
Holz, T.2
Wicherski, G.3
-
8
-
-
85075837457
-
BotMiner: Clusteringanalysis of network traffic for protocol- and structureindependent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clusteringanalysis of network traffic for protocol- and structureindependent botnet detection. In USENIX Security'08.
-
USENIX Security'08
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
10
-
-
51949091400
-
Botsniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. Botsniffer: Detecting botnet command and control channels in network traffic. In NDSS'08.
-
NDSS'08
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
14
-
-
70349686313
-
-
Trend Micro. Taxonomy of botnet threats (white paper), November 2006.
-
Trend Micro. Taxonomy of botnet threats (white paper), November 2006.
-
-
-
-
16
-
-
77952717608
-
Revealing botnet membership using dnsbl counter-intelligence
-
A. Ramachandran, N. Feamster, and D. Dagon. Revealing botnet membership using dnsbl counter-intelligence. InSRUTI'06.
-
SRUTI'06
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
18
-
-
70349658991
-
Characterizing bots' remote ontrol behavior
-
E. Stinson and J. Mitchell. Characterizing bots' remote ontrol behavior. In DIMVA'07.
-
DIMVA'07
-
-
Stinson, E.1
Mitchell, J.2
-
22
-
-
58449108281
-
Traffic aggregation for malware detection
-
T. Yen and M. Reiter. Traffic aggregation for malware detection. In DIMVA'08.
-
DIMVA'08
-
-
Yen, T.1
Reiter, M.2
-
23
-
-
85084095135
-
Characterizing botnets from email spam records
-
L. Zhuang, J. Dunagan, D. Simon, H. Wang, I. Osipkov, G. Hulten, and J. Tygar. Characterizing botnets from email spam records. In LEET'08.
-
LEET'08
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.3
Wang, H.4
Osipkov, I.5
Hulten, G.6
Tygar, J.7
-
24
-
-
70349680241
-
Honeypot-aware advanced botnet construction and maintenance
-
C. Zou and R. Cunningham. Honeypot-aware advanced botnet construction and maintenance. DSN'06.
-
DSN'06
-
-
Zou, C.1
Cunningham, R.2
|