-
2
-
-
77950830502
-
-
Shadowserver. http://shadowserver.org.
-
-
-
-
5
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
M. Collins, T. Shimeall, S. Faber, J. Janies, R. Weaver, M. D. Shon, and J. Kadane. Using uncleanliness to predict future botnet addresses. In Proceedings of the 2007 Internet MeasurementConference (IMC'07), 2007.
-
Proceedings of the 2007 Internet MeasurementConference (IMC'07), 2007
-
-
Collins, M.1
Shimeall, T.2
Faber, S.3
Janies, J.4
Weaver, R.5
Shon, M.D.6
Kadane, J.7
-
7
-
-
33746632334
-
Botnet tracking: Exploring a root-cause methodology to prevent denial of service attacks
-
F. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent denial of service attacks. In Proceedings of ESORICS, 2005.
-
Proceedings of ESORICS, 2005
-
-
Freiling, F.1
Holz, T.2
Wicherski, G.3
-
9
-
-
80051950220
-
Exploiting temporal persistence to detect covert botnet channels
-
F. Giroire, J. Chandrashekar, N. Taft, E. Schooler, and K. Papagiannaki. Exploiting temporal persistence to detect covert botnet channels. In 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), 2009.
-
12th International Symposium on Recent Advances in Intrusion Detection (RAID'09), 2009
-
-
Giroire, F.1
Chandrashekar, J.2
Taft, N.3
Schooler, E.4
Papagiannaki, K.5
-
11
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: Overview and case study. In USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007.
-
USENIX Workshop on Hot Topics in Understanding Botnets (HotBots'07), 2007
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
13
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through IDS-driven dialog correlation. In 16th USENIX Security Symposium (Security'07), 2007.
-
16th USENIX Security Symposium (Security'07), 2007
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
15
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
USENIX Association
-
M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th Conference on USENIX Security Symposium, Berkeley, CA, USA, 2001. USENIX Association.
-
Proceedings of the 10th Conference on USENIX Security Symposium, Berkeley, CA, USA, 2001
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
16
-
-
3543096392
-
Fast portscan detection using sequential hypothesis testing
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast portscan detection using sequential hypothesis testing. In IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A.W.3
Balakrishnan, H.4
-
18
-
-
0040291388
-
The click modular router
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek. The click modular router. ACM Transactions on Computer Systems, 18(3):263-297, 2000.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M.F.5
-
23
-
-
34547399387
-
A multi-faceted approach to understanding the botnet phenomenon
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multi-faceted approach to understanding the botnet phenomenon. In Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference, Brazil, October 2006.
-
Proceedings of ACM SIGCOMM/USENIX Internet Measurement Conference, Brazil, October 2006
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
26
-
-
51949109118
-
-
SecureWorks. Bobax trojan analysis. http://www.secureworks.com/research/ threats/bobax/.
-
Bobax Trojan Analysis
-
-
-
28
-
-
0002988210
-
Computing machinery and intelligence
-
A. Turing. Computing machinery and intelligence. In Mind Vol.59, 1950.
-
(1950)
Mind
, vol.59
-
-
Turing, A.1
-
29
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using hard AI problems for security. In Proceedings of Eurocrypt, pages 294-311, 2003.
-
(2003)
Proceedings of Eurocrypt
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
31
-
-
2442501519
-
Protocol scrubbing: Network security through transparent flow modification
-
D. Watson, M. Smart, G. R. Malan, and F. Jahanian. Protocol scrubbing: Network security through transparent flow modification. IEEE/ACM Trans. Networking, 12(2):261-273, 2004.
-
(2004)
IEEE/ACM Trans. Networking
, vol.12
, Issue.2
, pp. 261-273
-
-
Watson, D.1
Smart, M.2
Malan, G.R.3
Jahanian, F.4
-
32
-
-
78650896043
-
Automatically generating models for botnet detection
-
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda. Automatically generating models for botnet detection. In 14th European Symposium on Research in Computer Security (ESORICS'09), 2009.
-
14th European Symposium on Research in Computer Security (ESORICS'09), 2009
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
35
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Berkeley, CA, USA, USENIX Association
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. Botgraph: large scale spamming botnet detection. In NSDI'09: Proceedings of the 6th USENIX symposium on Networked systems design and implementation, pages 321-334, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
NSDI'09: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
, pp. 321-334
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
-
36
-
-
61649123904
-
Characterizing the IRC-based botnet phenomenon
-
J. Zhuge, X. Han, J. Guo, W. Zou, T. Holz, and Y. Zhou. Characterizing the IRC-based botnet phenomenon. China Honeynet Technical Report, 2007.
-
(2007)
China Honeynet Technical Report
-
-
Zhuge, J.1
Han, X.2
Guo, J.3
Zou, W.4
Holz, T.5
Zhou, Y.6
|