-
2
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," in Proc. 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06), 2006, pp. 41-52.
-
(2006)
Proc. 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06)
, pp. 41-52
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
3
-
-
70449650721
-
Botnets as a vehicle for online crime
-
RFC, December
-
N. Ianelli, A. Hackworth, "Botnets as a vehicle for online crime," CERT Request for Comments (RFC) 1700, December 2005.
-
(2005)
CERT Request for Comments
, vol.170
, pp. 0
-
-
Ianelli, N.1
Hackworth, A.2
-
4
-
-
70449463822
-
-
Honeynet Project and Research Alliance. Know your enemy: Tracking Botnets, March 2005. See http://www. honeynet.org/papers/bots/.
-
Honeynet Project and Research Alliance. Know your enemy: Tracking Botnets, March 2005. See http://www. honeynet.org/papers/bots/.
-
-
-
-
5
-
-
33746642190
-
Worms and Viruses and Botnets, Oh My! : Rational Responses to Emerging Internet Threats
-
G. Schaffer, "Worms and Viruses and Botnets, Oh My! : Rational Responses to Emerging Internet Threats", IEEE Security & Privacy, 2006.
-
(2006)
IEEE Security & Privacy
-
-
Schaffer, G.1
-
6
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets," in Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI'05), 2005, pp. 39-44.
-
(2005)
Proc. Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI'05)
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
7
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
8
-
-
51949093835
-
Botnet Research Survey
-
Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P.Roberts, K. Han, "Botnet Research Survey," in Proc. 32nd Annual IEEE International Conference on Computer Software and Applications (COMPSAC '08), 2008, pp.967-972.
-
(2008)
Proc. 32nd Annual IEEE International Conference on Computer Software and Applications (COMPSAC '08)
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.J.4
Roberts, P.5
Han, K.6
-
9
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, "Peer-to-peer botnets: Overview and case study," in Proc. 1st Workshop on Hot Topics in understanding Botnets, 2007.
-
(2007)
Proc. 1st Workshop on Hot Topics in understanding Botnets
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
11
-
-
0141523301
-
Internet Relay Chat: Client Protocol
-
RFC, Informational, April
-
C. Kalt, "Internet Relay Chat: Client Protocol," Request for Comments (RFC) 2812 (Informational), April 2000.
-
(2000)
Request for Comments
, pp. 2812
-
-
Kalt, C.1
-
13
-
-
70449508100
-
Zombies and Botnets
-
Australian Institute of Criminology, Canberra, March
-
K. K. R. Choo, "Zombies and Botnets," Trends and issues in crime and criminal justice, no. 333, Australian Institute of Criminology, Canberra, March 2007.
-
(2007)
Trends and issues in crime and criminal justice
, Issue.333
-
-
Choo, K.K.R.1
-
14
-
-
48649089769
-
A Taxonomy of Botnet Structures
-
D. Dagon, G. Gu , C.P. Lee, W. Lee, "A Taxonomy of Botnet Structures," in Proc. 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007, pp. 325-339.
-
(2007)
Proc. 23rd Annual Computer Security Applications Conference (ACSAC 2007)
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
15
-
-
38049035805
-
Botnet Detection by Monitoring Group Activities in DNS Traffic
-
H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet Detection by Monitoring Group Activities in DNS Traffic," in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007, pp.715-720.
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007)
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
19
-
-
33750376717
-
Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E.Vandekieft, A. C. Snoeren, G. M. Voelker, and S.Savage," Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm," in Proc. ACM SIGOPS Operating System Review, vol. 39(5), pp. 148-162, 2005.
-
(2005)
Proc. ACM SIGOPS Operating System Review
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
20
-
-
33646054897
-
-
F. Freiling, T. Holz, and G. Wicherski, Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, in Proc. 10th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science 3676, September 2005, pp. 319-335.
-
F. Freiling, T. Holz, and G. Wicherski, "Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks," in Proc. 10th European Symposium on Research in Computer Security (ESORICS), vol. Lecture Notes in Computer Science 3676, September 2005, pp. 319-335.
-
-
-
-
21
-
-
70449476277
-
-
P. Barford and V. Yegneswaran, An Inside Look at Botnets, ser. Advances in Information Security, Springer, 2006.
-
P. Barford and V. Yegneswaran, "An Inside Look at Botnets," ser. Advances in Information Security, Springer, 2006.
-
-
-
-
24
-
-
70449479054
-
-
March 2006
-
Snort IDS web page. http://www.snort.org, March 2006.
-
Snort IDS web page
-
-
-
27
-
-
51949119334
-
Botnet Detection and Response, The Network is the Infection
-
D. Dagon, "Botnet Detection and Response, The Network is the Infection," in OARC Workshop, 2005.
-
(2005)
OARC Workshop
-
-
Dagon, D.1
-
29
-
-
37849007911
-
-
Master's Project, University of Amsterdam, Netherlands, Feb
-
A. Schonewille and D.J. van Helmond. "The Domain Name Service as an IDS," Master's Project, University of Amsterdam, Netherlands, Feb 2006, http://staff.science.uva.nl/~delaat/snb-2005-2006/p12/report.pdf
-
(2006)
The Domain Name Service as an IDS
-
-
Schonewille, A.1
van Helmond, D.J.2
-
32
-
-
84882753373
-
Botnet Detection Based on Network Behavior
-
Springer, PP
-
W. Strayer, D. Lapsley, B. Walsh, and C. Livadas, Botnet Detection Based on Network Behavior, ser. Advances in Information Security. Springer, 2008, PP. 1-24.
-
(2008)
ser. Advances in Information Security
, pp. 1-24
-
-
Strayer, W.1
Lapsley, D.2
Walsh, B.3
Livadas, C.4
-
33
-
-
63749106613
-
Flow-based identification of botnet traffic by mining multiple log file
-
Penang, Malaysia
-
M. M. Masud, T. Al-khateeb, L. Khan, B. Thuraisingham, K. W. Hamlen, " Flow-based identification of botnet traffic by mining multiple log file," in Proc. International Conference on Distributed Frameworks & Applications (DFMA), Penang, Malaysia, 2008.
-
(2008)
Proc. International Conference on Distributed Frameworks & Applications (DFMA)
-
-
Masud, M.M.1
Al-khateeb, T.2
Khan, L.3
Thuraisingham, B.4
Hamlen, K.W.5
|