-
2
-
-
56149114543
-
-
Wikipedia http://en.wikipedia.org/wiki/Internetbot
-
Wikipedia, Internet bot. http://en.wikipedia.org/wiki/Internetbot
-
Internet Bot
-
-
-
3
-
-
70449403675
-
-
Wikipedia http://en.wikipedia.org/wiki/Botnet
-
Wikipedia, Botnet. http://en.wikipedia.org/wiki/Botnet
-
Botnet
-
-
-
6
-
-
3042784584
-
Botnets: Big and bigger
-
McCarty B., Botnets: big and bigger IEEE Security and Privacy 2003 1 4 87 90
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 87-90
-
-
McCarty, B.1
-
7
-
-
33746642190
-
Worms and viruses and botnets, oh my!: Rational responses to emerging internet threats
-
Schaffer G. P., Worms and viruses and botnets, oh my!: rational responses to emerging internet threats IEEE Security and Privacy 2006 4 3 52 58
-
(2006)
IEEE Security and Privacy
, vol.4
, Issue.3
, pp. 52-58
-
-
Schaffer, G.P.1
-
11
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
October Rio de Janeriro, Brazil
-
Abu Rajab M., Zarfoss J., Monrose F., Terzis A., A multifaceted approach to understanding the botnet phenomenon Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference (IMC 06) October 2006 Rio de Janeriro, Brazil 41 52
-
(2006)
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference (IMC 06)
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
12
-
-
3042826619
-
The making of a spam zombie army: Dissecting the sobig worms
-
Levy E., The making of a spam zombie army: dissecting the sobig worms IEEE Security and Privacy 2003 1 4 58 59
-
(2003)
IEEE Security and Privacy
, vol.1
, Issue.4
, pp. 58-59
-
-
Levy, E.1
-
13
-
-
84872766781
-
Catching spam before it arrives: Domain specific dynamic blacklists
-
January Hobart, Australia
-
Cook D., Hartnett J., Manderson K., Scanlan J., Catching spam before it arrives: domain specific dynamic blacklists Proceedings of the Australasian Workshops on Grid Computing and E-Research January 2006 Hobart, Australia 193 202
-
(2006)
Proceedings of the Australasian Workshops on Grid Computing and E-Research
, pp. 193-202
-
-
Cook, D.1
Hartnett, J.2
Manderson, K.3
Scanlan, J.4
-
15
-
-
77952717608
-
Revealing botnet membership using DNSBL counter-intelligence
-
San Jose, Calif, USA
-
Ramachandran A., Feamster N., Dagon D., Revealing botnet membership using DNSBL counter-intelligence 2 Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 06) 2006 San Jose, Calif, USA 8
-
(2006)
Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 06)
, vol.2
, pp. 8
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
19
-
-
41949115980
-
Detecting botnets with tight command and control
-
November Tampa, Fla, USA
-
Strayer W. T., Walsh R., Livadas C., Lapsley D., Detecting botnets with tight command and control Proceedings of the 31st Annual IEEE Conference on Local Computer Networks (LCN 06) November 2006 Tampa, Fla, USA 195 202
-
(2006)
Proceedings of the 31st Annual IEEE Conference on Local Computer Networks (LCN 06)
, pp. 195-202
-
-
Strayer, W.T.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
20
-
-
46349109903
-
A proposal of metrics for botnet detection based on its cooperative behavior
-
January Washington, DC, USA
-
Akiyama M., Kawamoto T., Shimamura M., Yokoyama T., Kadobayashi Y., Yamaguchi S., A proposal of metrics for botnet detection based on its cooperative behavior Proceedings of the International Symposium on Applications and the Internet Workshops January 2007 Washington, DC, USA 82
-
(2007)
Proceedings of the International Symposium on Applications and the Internet Workshops
, pp. 82
-
-
Akiyama, M.1
Kawamoto, T.2
Shimamura, M.3
Yokoyama, T.4
Kadobayashi, Y.5
Yamaguchi, S.6
-
22
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cambridge, Mass, USA
-
Cooke E., Jahanian F., Mcpherson D., The zombie roundup: understanding, detecting, and disrupting botnets Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 05) 2005 Cambridge, Mass, USA 6
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI 05)
, pp. 6
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
23
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
November Tampa, Fla, USA
-
Livadas C., Walsh R., Lapsley D., Strayer W. T., Using machine learning techniques to identify botnet traffic Proceedings of the 31st Annual IEEE Conference on Local Computer Networks (LCN 06) November 2006 Tampa, Fla, USA 967 974
-
(2006)
Proceedings of the 31st Annual IEEE Conference on Local Computer Networks (LCN 06)
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
24
-
-
85084097128
-
Measurement and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
April San Francisco, Calif, USA
-
Holz T., Steiner M., Dahl F., Biersack E. W., Freiling F., Measurement and mitigation of peer-to-peer-based botnets: a case study on storm worm Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats April 2008 San Francisco, Calif, USA 1 9
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.W.4
Freiling, F.5
-
25
-
-
58149094526
-
An advanced hybrid peer-to-peer botnet
-
July Cambridge, Mass, USA
-
Wang P., Sparks S., Zou C. C., An advanced hybrid peer-to-peer botnet Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets July 2008 Cambridge, Mass, USA 2
-
(2008)
Proceedings of the 1st Workshop on Hot Topics in Understanding Botnets
, pp. 2
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
28
-
-
78649306695
-
-
http://www.secureworks.com/research/threats/sinit/
-
Stewart J., Sinit P2P Trojan analysis. http://www.secureworks.com/ research/threats/sinit/
-
Sinit P2P Trojan Analysis
-
-
Stewart, J.1
-
30
-
-
62849116756
-
A model to use denied Internet traffic to indirectly discover internal network security problems
-
December Austin, Tex, USA
-
Langin C., Zhou H., Rahimi S., A model to use denied Internet traffic to indirectly discover internal network security problems Proceedings of the IEEE International Performance, Computing, and Communications Conference (IPCCC 08) December 2008 Austin, Tex, USA 486 490
-
(2008)
Proceedings of the IEEE International Performance, Computing, and Communications Conference (IPCCC 08)
, pp. 486-490
-
-
Langin, C.1
Zhou, H.2
Rahimi, S.3
-
31
-
-
33646054897
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
September Milan, Italy Springer Lecture Notes in Computer Science
-
Freiling F. C., Holz T., Wicherski G., Botnet tracking: exploring a root-cause methodology to prevent distributed denial-of-service attacks 3679 Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 05) September 2005 Milan, Italy Springer 319 335 Lecture Notes in Computer Science
-
(2005)
Proceedings of the 10th European Symposium on Research in Computer Security (ESORICS 05)
, vol.3679
, pp. 319-335
-
-
Freiling, F.C.1
Holz, T.2
Wicherski, G.3
-
32
-
-
44649107712
-
Back to basics to fight botnets
-
Pappas K., Back to basics to fight botnets Communications News 2008 45 5 12
-
(2008)
Communications News
, vol.45
, Issue.5
, pp. 12
-
-
Pappas, K.1
-
33
-
-
63749114531
-
Email shape analysis for spam botnet detection
-
January Las Vegas, Nev, USA
-
Sroufe P., Phithakkitnukoon S., Dantu R., Cangussu J., Email shape analysis for spam botnet detection Proceedings of the 6th IEEE Consumer Communications and Networking Conference (CCNC 09) January 2009 Las Vegas, Nev, USA 1 2
-
(2009)
Proceedings of the 6th IEEE Consumer Communications and Networking Conference (CCNC 09)
, pp. 1-2
-
-
Sroufe, P.1
Phithakkitnukoon, S.2
Dantu, R.3
Cangussu, J.4
-
36
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
August Seattle, Wash, USA
-
Xie Y., Yu F., Achan K., Panigrahy R., Hulten G., Osipkov I., Spamming botnets: signatures and characteristics 38 Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM 08) August 2008 Seattle, Wash, USA 171 182
-
(2008)
Proceedings of the ACM SIGCOMM Conference on Data Communication (SIGCOMM 08)
, vol.38
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
40
-
-
70449362107
-
Remote detection via simple probe packet
-
Honeyd security advisory 2004001, Remote detection via simple probe packet. 2004, http://www.honeyd.org/adv.2004-01.asc
-
(2004)
Honeyd Security Advisory 2004001
-
-
-
41
-
-
85058835823
-
Mapping internet sensors with probe response attacks
-
August Baltimore, Md, USA
-
Bethencourt J., Franklin J., Vernon M., Mapping internet sensors with probe response attacks Proceedings of the 14th Conference on USENIX Security Symposium August 2005 Baltimore, Md, USA 193 208
-
(2005)
Proceedings of the 14th Conference on USENIX Security Symposium
, pp. 193-208
-
-
Bethencourt, J.1
Franklin, J.2
Vernon, M.3
-
42
-
-
2342615538
-
Anti-Honeypot technology
-
Krawetz N., Anti-Honeypot technology IEEE Security and Privacy 2004 2 1 76 79
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.1
, pp. 76-79
-
-
Krawetz, N.1
-
44
-
-
50249168251
-
Bot detection based on traffic analysis
-
October Jeju Island, South Korea
-
Kugisaki Y., Kasahara Y., Hori Y., Sakurai K., Bot detection based on traffic analysis Proceedings of the International Conference on Intelligent Pervasive Computing (IPC 07) October 2007 Jeju Island, South Korea 303 306
-
(2007)
Proceedings of the International Conference on Intelligent Pervasive Computing (IPC 07)
, pp. 303-306
-
-
Kugisaki, Y.1
Kasahara, Y.2
Hori, Y.3
Sakurai, K.4
-
45
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
October Fukushima, Japan
-
Choi H., Lee H., Lee H., Kim H., Botnet detection by monitoring group activities in DNS traffic Proceedings of the 7th IEEE International Conference on Computer and Information Technology (CIT 07) October 2007 Fukushima, Japan 715 720
-
(2007)
Proceedings of the 7th IEEE International Conference on Computer and Information Technology (CIT 07)
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
|