-
1
-
-
70449350303
-
-
Over 1 million potential victims of botnet cyber crime, FBI Press Release, Jun. 13, 2007.
-
"Over 1 million potential victims of botnet cyber crime," FBI Press Release, Jun. 13, 2007.
-
-
-
-
2
-
-
70449334059
-
-
'Bot roast II' nets 8 individuals, FBI Press Release, Nov. 29, 2007.
-
"'Bot roast II' nets 8 individuals," FBI Press Release, Nov. 29, 2007.
-
-
-
-
3
-
-
70449368066
-
-
Symantec global internet security threat report, trends for July- December 07, XIII, Symantec Corp, Apr. 2008.
-
"Symantec global internet security threat report, trends for July- December 07, volume XIII," Symantec Corp, Apr. 2008.
-
-
-
-
4
-
-
70449419572
-
Most spam comes from just six botnets
-
Feb. 29
-
J. Leyden, "Most spam comes from just six botnets," The Register, Feb. 29, 2008.
-
(2008)
The Register
-
-
Leyden, J.1
-
5
-
-
68149177571
-
Criminals 'may overwhelm the web',
-
Jan. 25
-
T. Weber, "Criminals 'may overwhelm the web'," BBC News, Jan. 25, 2007.
-
(2007)
BBC News
-
-
Weber, T.1
-
6
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
San Diego, CA, USA, Feb. 10-13
-
G. Gu, J. Zhang, and W. Lee, "BotSniffer: Detecting botnet command and control channels in network traffic," in the 15th Annual Network and Distributed System Security Symposium (NDSS'08), San Diego, CA, USA, Feb. 10-13, 2008.
-
(2008)
the 15th Annual Network and Distributed System Security Symposium (NDSS'08)
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
9
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol and structure-independent botnet detection
-
San Jose, CA, USA, Jul. 28-Aug. 1
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: Clustering analysis of network traffic for protocol and structure-independent botnet detection," in the 17th USENIX Security Symposium (Security'08), San Jose, CA, USA, Jul. 28-Aug. 1, 2008.
-
(2008)
the 17th USENIX Security Symposium (Security'08)
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
10
-
-
84886917022
-
Long-range dependence analysis of control and data planes network traffic
-
Leeds, UK, Jun. 9-10
-
B. AsSadhan, H. Kim, and J. M. F. Moura, "Long-range dependence analysis of control and data planes network traffic," in Saudi International Innovation Conference (SIIC), Leeds, UK, Jun. 9-10, 2008.
-
(2008)
Saudi International Innovation Conference (SIIC)
-
-
AsSadhan, B.1
Kim, H.2
Moura, J.M.F.3
-
11
-
-
51049121828
-
Network traffic behavior analysis by decomposition into control and data planes
-
Miami, FL, USA, Apr. 18
-
B. AsSadhan, H. Kim, J. M. F. Moura, and X. Wang, "Network traffic behavior analysis by decomposition into control and data planes," in InternationalWorkshop on Security in Systems and Networks (SSN) with conjunction of IEEE International Parallel and Distributed Processing Symposium (IPDPS), Miami, FL, USA, Apr. 18, 2008.
-
(2008)
InternationalWorkshop on Security in Systems and Networks (SSN) with conjunction of IEEE International Parallel and Distributed Processing Symposium (IPDPS)
-
-
AsSadhan, B.1
Kim, H.2
Moura, J.M.F.3
Wang, X.4
-
12
-
-
0036980251
-
Using signal processing to analyze wireless data traffic
-
Atlanta, GA, USA, Sep
-
C. Partridge, D. Cousins, A. W. Jackson, R. Krishnan, T. Saxena, and W. T. Strayer, "Using signal processing to analyze wireless data traffic," in ACM Workshop on Wireless Security (WiSe), Atlanta, GA, USA, Sep. 2002, pp. 67-76.
-
(2002)
ACM Workshop on Wireless Security (WiSe)
, pp. 67-76
-
-
Partridge, C.1
Cousins, D.2
Jackson, A.W.3
Krishnan, R.4
Saxena, T.5
Strayer, W.T.6
-
15
-
-
70449419566
-
Periodic behavior in botnet command and control channels traffic
-
unpublished
-
B. AsSadhan, J. M. F. Moura, and D. Lapsley, "Periodic behavior in botnet command and control channels traffic," unpublished.
-
-
-
AsSadhan, B.1
Moura, J.M.F.2
Lapsley, D.3
-
17
-
-
66249122750
-
SLINGbot: A system for live investigation of next generation botnets
-
Washington, DC, USA, Mar
-
A. W. Jackson, D. Lapsley, C. Jones, M. Zatko, C. Golubitsky, and W. T. Strayer, "SLINGbot: A system for live investigation of next generation botnets," in Cybersecurity Application and Technologies Conference for Homeland Security (CATCH), Washington, DC, USA, Mar. 2009.
-
(2009)
Cybersecurity Application and Technologies Conference for Homeland Security (CATCH)
-
-
Jackson, A.W.1
Lapsley, D.2
Jones, C.3
Zatko, M.4
Golubitsky, C.5
Strayer, W.T.6
-
18
-
-
47949132450
-
Taxonomy of botnet threats
-
TrenMicro, Technical report, Nov
-
"Taxonomy of botnet threats," TrenMicro, Technical report, Nov. 2006.
-
(2006)
-
-
-
19
-
-
70449419567
-
-
LBNL/ICSI enterprise tracing project
-
"LBNL/ICSI enterprise tracing project," http://www.icir.org/ enterprisetracing/,2005.
-
(2005)
-
-
-
20
-
-
84878700321
-
A first look at modern enterprise traffic
-
Berkeley, CA, USA, Oct
-
R. Pang, M. Allman, M. Bennett, J. Lee, V. Paxson, and B. Tierney, "A first look at modern enterprise traffic," in ACM SIGCOMM/USENIX Internet Measurement Conference, Berkeley, CA, USA, Oct. 2005, pp. 15-28.
-
(2005)
ACM SIGCOMM/USENIX Internet Measurement Conference
, pp. 15-28
-
-
Pang, R.1
Allman, M.2
Bennett, M.3
Lee, J.4
Paxson, V.5
Tierney, B.6
|