-
1
-
-
17844404852
-
Malicious bots threaten network security
-
Geer D, "Malicious bots threaten network security," IEEE Computer, 2005, 38(1):18-20.
-
(2005)
IEEE Computer
, vol.38
, Issue.1
, pp. 18-20
-
-
Geer, D.1
-
2
-
-
41949123110
-
Research and Development of Botnets
-
in Chinese with English abstract
-
Zhuge JW, Han XH, Zhou YL, Ye ZY, and Zou W, "Research and Development of Botnets," Journal of Software, 2008, 19(3):702-715(in Chinese with English abstract).
-
(2008)
Journal of Software
, vol.19
, Issue.3
, pp. 702-715
-
-
Zhuge, J.W.1
Han, X.H.2
Zhou, Y.L.3
Ye, Z.Y.4
Zou, W.5
-
3
-
-
34547399387
-
A multi-faceted approach to understanding the Botnet phenomenon
-
Brazil, October
-
I M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multi-faceted approach to understanding the Botnet phenomenon," In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC 06), Brazil, October 2006.
-
(2006)
Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference (IMC 06)
-
-
Rajab, I.M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
5
-
-
71949131077
-
Advances in the Honeypot and Honeynet Technologies
-
in Chinese with English abstract
-
Cheng JR, Yin JP, Liu Y, and Zhong JW, "Advances in the Honeypot and Honeynet Technologies," Journal of Computer Research and Development, 2008, 45(Suppl1):375-378 (in Chinese with English abstract).
-
(2008)
Journal of Computer Research and Development
, vol.45
, Issue.SUPPL.1
, pp. 375-378
-
-
Cheng, J.R.1
Yin, J.P.2
Liu, Y.3
Zhong, J.W.4
-
6
-
-
85061529860
-
BotHunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting malware infection through ids-driven dialog correlation," In Proceedings of the 16th USENIX Security Symposium (Security' 07), 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security' 07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
7
-
-
85080378133
-
An algorithm for anomaly-based Botnet detection
-
July
-
J. R. Binkley and S. Singh, "An algorithm for anomaly-based Botnet detection," In Proceedings of USENIX SRUTI' 06, pp. 43-48, July 2006.
-
(2006)
Proceedings of USENIX SRUTI' 06
, pp. 43-48
-
-
Binkley, J.R.1
Singh, S.2
-
8
-
-
60349104800
-
-
Lee Jae-Seo, Jeong Hyun Cheol, Park Jun-Hyung, Kim Minsoo, and Noh Bong-Nam, The activity analysis of malicious http-based botnets using degree of periodic repeatability, Proceedings - 2008 International Conference on Security Technology, SecTech 2008, pp. 83-86, 2008.
-
Lee Jae-Seo, Jeong Hyun Cheol, Park Jun-Hyung, Kim Minsoo, and Noh Bong-Nam, "The activity analysis of malicious http-based botnets using degree of periodic repeatability," Proceedings - 2008 International Conference on Security Technology, SecTech 2008, pp. 83-86, 2008.
-
-
-
-
9
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
OCT 16-19, Aizu-Wakamatsu City, JAPAN
-
Choi H, Lee H, Lee H, et al, "Botnet detection by monitoring group activities in DNS traffic," 7th IEEE International Conference on Computer and Information Technology, OCT 16-19, 2007 Aizu-Wakamatsu City, JAPAN.
-
(2007)
7th IEEE International Conference on Computer and Information Technology
-
-
Choi, H.1
Lee, H.2
Lee, H.3
-
10
-
-
58149092781
-
Detection of peer-to-peer botnets,
-
Masters Thesis, University of Amsterdam
-
Matthew Steggink and Igor Idziejczak, "Detection of peer-to-peer botnets," Masters Thesis, University of Amsterdam, 2008.
-
(2008)
-
-
Steggink, M.1
Idziejczak, I.2
-
11
-
-
71949129783
-
Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract)
-
SEP 15-17, MIT Lincoln Lab, Cambridge, MA
-
Lu W and Ghorbani AA, "Bots Behaviors vs. Human Behaviors on Large-Scale Communication Networks (Extended Abstract)," 11th International Symposium on Recent Advances in Intrusion Detection, SEP 15-17, 2008 MIT Lincoln Lab, Cambridge, MA.
-
(2008)
11th International Symposium on Recent Advances in Intrusion Detection
-
-
Lu, W.1
Ghorbani, A.A.2
-
14
-
-
62749197655
-
A Multi-Layered Approach to Botnet Detection
-
Robert Erbacher, Adele Cutler, Pranab Banerjee, and Jim Marshall, "A Multi-Layered Approach to Botnet Detection," Security and Management 2008: 301-308, 2008.
-
(2008)
Security and Management 2008
, pp. 301-308
-
-
Erbacher, R.1
Cutler, A.2
Banerjee, P.3
Marshall, J.4
-
15
-
-
47949094673
-
Towards practical framework for collecting and analyzing network-centric attacks
-
AUG 13-15, Las Vegas, NV
-
Paxton N, Ahn GJ, and Chu B, "Towards practical framework for collecting and analyzing network-centric attacks," IEEE International Conference on Information Reuse and Integration, AUG 13-15, 2007 Las Vegas, NV.
-
(2007)
IEEE International Conference on Information Reuse and Integration
-
-
Paxton, N.1
Ahn, G.J.2
Chu, B.3
-
16
-
-
58449125799
-
A holistic perspective on understanding and breaking botnets: Challenges and countermeasures
-
June/September
-
Zhang Zonghua and Kadobayashi Youki, "A holistic perspective on understanding and breaking botnets: Challenges and countermeasures," Journal of the National Institute of Information and Communications Technology, vol. 55, pp. 43-59, June/September 2008.
-
(2008)
Journal of the National Institute of Information and Communications Technology
, vol.55
, pp. 43-59
-
-
Zhang, Z.1
Youki, K.2
-
17
-
-
60349110610
-
Botnet detection and response architecture for offering secure internet services
-
Ji Seung Goo, Im Chae Tae, Kim Mi Joo, and Jeong Hyun Cheol, "Botnet detection and response architecture for offering secure internet services," 2008 International Conference on Security Technology, SecTech 2008, pp. 101-104, 2008.
-
(2008)
2008 International Conference on Security Technology, SecTech
, pp. 101-104
-
-
Seung Goo, J.1
Chae Tae, I.2
Mi Joo, K.3
Hyun Cheol, J.4
|