-
4
-
-
34547422995
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Usenix Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2006.
-
(2006)
Usenix Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
9
-
-
74049152682
-
-
Your computer is now stoned, again, April
-
E. Florio and K. Kasslin. Your computer is now stoned (...again!). Virus Bulletin, April 2008.
-
(2008)
Virus Bulletin
-
-
Florio, E.1
Kasslin, K.2
-
12
-
-
74049091060
-
-
GMER Team
-
GMER Team. Stealth MBR rootkit. http://www2.gmer.net/mbr/, 2008.
-
(2008)
Stealth MBR rootkit
-
-
-
13
-
-
74049137348
-
Superworm seizes 9m pcs, 'stunned' researchers say
-
D. Goodin. Superworm seizes 9m pcs, 'stunned' researchers say. http://www.theregister.co.uk/2009/01/16/9m-downadup-infections/, 2009.
-
(2009)
-
-
Goodin, D.1
-
15
-
-
77955022292
-
The Commercial Malware Industry
-
P. Gutmann. The Commercial Malware Industry. In DEFCON conference, 2007.
-
(2007)
DEFCON conference
-
-
Gutmann, P.1
-
16
-
-
74049104277
-
Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones
-
University of Mannheim
-
T. Holz, M. Engelberth, and F. Freiling. Learning More About the Underground Economy: A Case-Study of Keyloggers and Dropzones. Reihe Informatik TR-2008-006, University of Mannheim, 2008.
-
(2008)
Reihe Informatik TR-2008-006
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.3
-
18
-
-
85084097128
-
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
20
-
-
74049129647
-
-
D. Jackson. Untorpig. http://www.secureworks.com/research/tools/untorpig/ , 2008.
-
(2008)
Untorpig
-
-
Jackson, D.1
-
21
-
-
77952351261
-
Towards complete node enumeration in a peer-to-peer botnet
-
B. Kang, E. Chan-Tin, C. Lee, J. Tyra, H. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim. Towards complete node enumeration in a peer-to-peer botnet. In ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009), 2009.
-
(2009)
ACM Symposium on Information, Computer & Communication Security (ASIACCS 2009)
-
-
Kang, B.1
Chan-Tin, E.2
Lee, C.3
Tyra, J.4
Kang, H.5
Nunnery, C.6
Wadler, Z.7
Sinclair, G.8
Hopper, N.9
Dagon, D.10
Kim, Y.11
-
22
-
-
70349272437
-
Spamalytics: An Empirical Analysis of Spam Marketing Conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In ACM Conference on Computer and Communications Security, 2008.
-
(2008)
ACM Conference on Computer and Communications Security
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
23
-
-
85084096724
-
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
-
C. Kanich, K. Levchenko, B. Enright, G. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.4
Savage, S.5
-
26
-
-
74049127487
-
-
at 10m infections, 2009
-
J. Leyden. Conficker botnet growth slows at 10m infections. http://www.theregister.co.uk/2009/01/26/conficker-botnet/, 2009.
-
Conficker botnet growth slows
-
-
Leyden, J.1
-
34
-
-
85000701895
-
My Botnet is Bigger than Yours (Maybe, Better than Yours) : Why Size Estimates Remain Challenging
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My Botnet is Bigger than Yours (Maybe, Better than Yours) : Why Size Estimates Remain Challenging. In USENIX Workshop on Hot Topics in Understanding Botnet, 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnet
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
36
-
-
33750300419
-
Understanding the Network-level Behavior of Spammers
-
A. Ramachandran and N. Feamster. Understanding the Network-level Behavior of Spammers. In ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
38
-
-
74049164572
-
-
RSA FraudAction Lab. One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts. http://www.rsa.com/blog/blog-entry.aspx?id= 1378, October 2008.
-
RSA FraudAction Lab. One Sinowal Trojan + One Gang = Hundreds of Thousands of Compromised Accounts. http://www.rsa.com/blog/blog-entry.aspx?id= 1378, October 2008.
-
-
-
-
41
-
-
74049117296
-
-
at risk as one third of surfers admit they use the same password for all websites, Sophos reports, March 2009
-
Sophos. Security at risk as one third of surfers admit they use the same password for all websites, Sophos reports. http://www.sophos.com/pressoffice/ news/articles/2009/03/password-security.html, March 2009.
-
Sophos. Security
-
-
-
42
-
-
74049098794
-
SpeedMatters.org
-
States, August
-
SpeedMatters.org. 2008 Report on Internet Speeds in All 50 States. http://www.speedmatters.org/document-library/sourcematerials/ cwa-report-on-internet-speeds-2008.pdf, August 2008.
-
(2008)
Report on Internet Speeds in All
, vol.50
-
-
-
43
-
-
68149130387
-
-
Symantec. Report on the underground economy. http://www.symantec.com/ content/en/us/about/media/pdfs/Underground-Econ-Report.pdf, 2008.
-
(2008)
Report on the underground economy
-
-
-
44
-
-
74049163521
-
-
The Spamhaus Project
-
The Spamhaus Project. ZEN. http://www.spamhaus.org/zen/.
-
ZEN. http
-
-
-
45
-
-
74049142182
-
-
VeriSign iDefense Intelligence Operations Team. The Russian Business Network: Rise and Fall of a Criminal ISP. blog.wired.com/defense/files/iDefense- RBNUpdated-20080303.doc, 2008.
-
VeriSign iDefense Intelligence Operations Team. The Russian Business Network: Rise and Fall of a Criminal ISP. blog.wired.com/defense/files/iDefense- RBNUpdated-20080303.doc, 2008.
-
-
-
-
47
-
-
85084095135
-
Characterizing botnets from email spam records
-
L. Zhuang, J. Dunagan, D. Simon, H. Wang, I. Osipkov, G. Hulten, and J. Tygar. Characterizing botnets from email spam records. In USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.3
Wang, H.4
Osipkov, I.5
Hulten, G.6
Tygar, J.7
|