-
2
-
-
70350669107
-
-
The Times: Asprox computer virus infects key government and consumer websites, http://technology.timesonline.co.uk/tol/news/tech and web/the web/article4381034.ece
-
The Times: Asprox computer virus infects key government and consumer websites, http://technology.timesonline.co.uk/tol/news/tech and web/the web/article4381034.ece
-
-
-
-
5
-
-
70350684114
-
ASPROX SQL Injection Attacks - Block them using a Cisco router
-
July
-
Cisco News: ASPROX SQL Injection Attacks - Block them using a Cisco router (July 2008), http://cisconews.co.uk/2008/07/09/asprox-sql-injection- attacks-block-them-using-a-cisco-router
-
(2008)
Cisco News
-
-
-
6
-
-
70350644134
-
-
string automated SQL injection attack
-
Zino, M.: ASCII Encoded/Binary string automated SQL injection attack, http://www.bloombit.com/Articles/2008/05/ASCII-Encoded-Binary-String-Automated- SQL-Injection.aspx
-
ASCII Encoded/Binary
-
-
Zino, M.1
-
7
-
-
70350694705
-
-
Hexasoft Development Sdn, February 2008
-
Hexasoft Development Sdn. Bhd.: IP2Location geolocation service (February 2008), http://www.ip2location.com/
-
Bhd.: IP2Location geolocation service
-
-
-
8
-
-
84949626334
-
Spamscatter: Characterizing internet scam hosting infrastructure
-
Anderson, D.S., Fleizach, C., Savage, S., Voelker, G.M.: Spamscatter: Characterizing internet scam hosting infrastructure. In: USENIX Security (2007)
-
(2007)
USENIX Security
-
-
Anderson, D.S.1
Fleizach, C.2
Savage, S.3
Voelker, G.M.4
-
13
-
-
70350642344
-
-
Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and Detecting Fast-Flux Service Networks. In: NDSS (2008)
-
Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and Detecting Fast-Flux Service Networks. In: NDSS (2008)
-
-
-
-
14
-
-
24344436426
-
-
Bailey, M., Cooke, E., Jahanian, F., Watson, D.: The Blaster Worm: Then and Now. In: IEEE Security and Privacy (2005)
-
Bailey, M., Cooke, E., Jahanian, F., Watson, D.: The Blaster Worm: Then and Now. In: IEEE Security and Privacy (2005)
-
-
-
-
15
-
-
58449122201
-
Spamming Botnets: Signatures and Characteristics
-
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming Botnets: Signatures and Characteristics. In: ACM SIGCOMM (2008)
-
(2008)
ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
16
-
-
84871999581
-
A Multifaced Approach to Understanding the Botnet Phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaced Approach to Understanding the Botnet Phenomenon. In: ACM IMC (2006)
-
(2006)
ACM IMC
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
17
-
-
85084095135
-
Characterizing Botnets from Email Spam Records
-
Zhuang, L., Dunagan, J., Simon, D.R., Wang, H.J., Tygar, J.D.: Characterizing Botnets from Email Spam Records. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats (2008)
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
Wang, H.J.4
Tygar, J.D.5
-
18
-
-
85084097128
-
Measurements and Mitigation of Peer-to-Peer-based botnets: A Case Study on Storm Worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based botnets: A Case Study on Storm Worm. In: USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET (2008)
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
19
-
-
70350652418
-
Anatomy of the Asprox Bonet
-
San Diego September
-
Brown, D.: Anatomy of the Asprox Bonet. ToorCon X - San Diego (September 2008)
-
(2008)
ToorCon X
-
-
Brown, D.1
-
21
-
-
49949109144
-
-
CCS 2007
-
Bandhakavi, S., Bisht, P., Madhusudan, P., Venkatakrishnan, V.N.: CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations. In: CCS (2007)
-
CANDID: Preventing SQL Injection Attacks using Dynamic Candidate Evaluations
-
-
Bandhakavi, S.1
Bisht, P.2
Madhusudan, P.3
Venkatakrishnan, V.N.4
-
24
-
-
49949091964
-
Fluxor: Detecting and monitoring fast-flux service networks
-
Zamboni, D, ed, DIMVA 2008, Springer, Heidelberg
-
Passerini, E., Paleari, R., Martignoni, L., Bruschi, D.: Fluxor: detecting and monitoring fast-flux service networks. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 186-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 186-206
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
|