-
1
-
-
48649089769
-
A Taxonomy of Botnet Structures
-
In the, Miami, FL, USA
-
D. Dagon, G. Gu, C. P. Lee, and W. Lee, "A Taxonomy of Botnet Structures," In the Proc. of ACSAC 2007, Miami, FL, USA.
-
(2007)
Proc. of ACSAC
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
2
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," In Proceedings of the 6th ACM SIGCOMM on Internet measurement, pages 41-52, 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM on Internet measurement
, pp. 41-52
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
3
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis,"My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging," In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
6
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon, "Peer-to-peer botnets: Overview and case study," In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
7
-
-
20844452458
-
A Short Visit to the Bot Zoo, In proc
-
T. Holz, "A Short Visit to the Bot Zoo," In proc. IEEE Security & Privacy 3(3): 76-79 (2005).
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.3
, pp. 76-79
-
-
Holz, T.1
-
8
-
-
17644411571
-
Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic
-
Washington, DC, October
-
C. Jin, H. Wang, and Kang G. Shin," Hop-Count Filtering: An Effective Defense Against Spoofed DDoS Traffic," in Proc. ACM Conference on Computer and Communications Security (CCS)'2003, Washington, DC, October 2003.
-
(2003)
Proc. ACM Conference on Computer and Communications Security (CCS)'2003
-
-
Jin, C.1
Wang, H.2
Shin, K.G.3
-
10
-
-
0001083965
-
On the Effectiveness of Route-Based Packet filtering for Distributed DoS Attack Prevention in Power-Law Internets
-
San Diego, CA, August
-
K. Park and H. Lee, "On the Effectiveness of Route-Based Packet filtering for Distributed DoS Attack Prevention in Power-Law Internets," in Proc. ACM SIGCOMM 2001, San Diego, CA, August 2001.
-
(2001)
Proc. ACM SIGCOMM 2001
-
-
Park, K.1
Lee, H.2
-
11
-
-
0036349004
-
SAVE: Source address validity enforcement protocol
-
New York, June
-
J. Li, J. Mirkovic, M. Wang, P. Reiher, and L. Zhang., "SAVE: Source address validity enforcement protocol," in Proc. of IEEE INFOCOMM 2002, New York, June 2002.
-
(2002)
Proc. of IEEE INFOCOMM 2002
-
-
Li, J.1
Mirkovic, J.2
Wang, M.3
Reiher, P.4
Zhang, L.5
-
13
-
-
36048986923
-
Botz-4-Sale: Surviving DDos Attacks that Mimic Flash Crowds
-
Boston, MA, May
-
S. Kandula, D. Katabi, M. Jacob, and A. Burger, "Botz-4-Sale: Surviving DDos Attacks that Mimic Flash Crowds," in Proc. USENIX NSDI 2005. Boston, MA, May 2005.
-
(2005)
Proc. USENIX NSDI 2005
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Burger, A.4
-
14
-
-
70449501807
-
-
Akamai technologies
-
Akamai technologies. http://www.akamai.com/.
-
-
-
-
15
-
-
70449508732
-
-
Google™. http://www.google.com/.
-
Google™
-
-
-
16
-
-
70449483451
-
-
http://www.buildtraffic.net/.
-
-
-
-
17
-
-
70449500314
-
-
http://www.increased-online-traffic.com/
-
-
-
-
18
-
-
70449474678
-
-
http://www.pcworld.com/article/id,124688-page,1/article.html
-
http://www.pcworld.com/article/id,124688-page,1/article.html
-
-
-
-
19
-
-
70449508734
-
-
http://blogpond.com.au/2007/10/14/google-refers-over-95-percent-of- search-engine-traffic/
-
-
-
-
20
-
-
70449474679
-
-
CERT Advisory CA-1996-21, TCP SYN Flooding and IP Spoofing Attacks, available at http://www.cert.org/advisories/CA-1996-21.html
-
CERT Advisory CA-1996-21, "TCP SYN Flooding and IP Spoofing Attacks," available at http://www.cert.org/advisories/CA-1996-21.html
-
-
-
-
21
-
-
70449508733
-
-
C. Labovitz, D. McPherson, and F. Jahanian, Infrastructure attack detection and mitigation, in Proc. SIGCOMM 2005, Tutorial. bibitempushback1 J. Ioannidis and S. M. Bellovin, Implementing Pushback: Router-Based Defense Against DDoS Attacks, in Proc. Network and Distributed System Security Symposium ,San Diego, California, Feb. 2002.
-
C. Labovitz, D. McPherson, , and F. Jahanian, "Infrastructure attack detection and mitigation," in Proc. SIGCOMM 2005, Tutorial. bibitempushback1 J. Ioannidis and S. M. Bellovin, "Implementing Pushback: Router-Based Defense Against DDoS Attacks", in Proc. Network and Distributed System Security Symposium ,San Diego, California, Feb. 2002.
-
-
-
-
22
-
-
0038404196
-
-
D. K. Y. Yau, J. C. S. Lui and F. Liang, Defending Against Distributed Denial of service Attacks with Max-min Fair Server-centric Router Throuttles, in Proc. of IEEE International Workshop on QoS, May 2002.
-
D. K. Y. Yau, J. C. S. Lui and F. Liang, " Defending Against Distributed Denial of service Attacks with Max-min Fair Server-centric Router Throuttles," in Proc. of IEEE International Workshop on QoS, May 2002.
-
-
-
|