-
2
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon, " in Proc. 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06), 2006, pp. 41-52.
-
(2006)
Proc. 6th ACM SIGCOMM Conference on Internet Measurement (IMC'06)
, pp. 41-52
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
4
-
-
63749106613
-
Flow-based identification of botnet traffic by mining multiple log files
-
Penang, Malaysia, October 21-22
-
M. M. Masud, T. Al-khateeb, L. Khan, B. Thuraisingham, and K. W. Hamlen, "Flow-based Identification of Botnet Traffic by Mining Multiple Log Files, " in Proc. International Conference on Distributed Frameworks & Applications (DFMA), Penang, Malaysia, October 21-22, 2008.
-
(2008)
Proc. International Conference on Distributed Frameworks & Applications (DFMA)
-
-
Masud, M.M.1
Al-Khateeb, T.2
Khan, L.3
Thuraisingham, B.4
Hamlen, K.W.5
-
5
-
-
84882753373
-
Botnet detection based on network behavior ser
-
Springer
-
W. Strayer, D. Lapsley, B. Walsh, and C. Livadas, Botnet Detection Based on Network Behavior ser. Advances in Information Security. Springer, 2008, PP. 1-24.
-
(2008)
Advances in Information Security
, pp. 1-24
-
-
Strayer, W.1
Lapsley, D.2
Walsh, B.3
Livadas, C.4
-
6
-
-
51949093835
-
Botnet research survey
-
Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P.Roberts, and K. Han, "Botnet Research Survey, " in Proc. 32nd Annual IEEE International Conference on Computer Software and Applications (COMPSAC '08), 2008, pp.967- 972.
-
(2008)
Proc. 32nd Annual IEEE International Conference on Computer Software and Applications (COMPSAC '08)
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.J.4
Roberts, P.5
Han, K.6
-
7
-
-
70449508100
-
Zombies and Botnets
-
Australian Institute of Criminology, Canberra, March
-
K. K. R. Choo, "Zombies and Botnets, " Trends and issues in crime and criminal justice, no. 333, Australian Institute of Criminology, Canberra, March 2007.
-
(2007)
Trends and Issues in Crime and Criminal Justice
, Issue.333
-
-
Choo, K.K.R.1
-
9
-
-
77951117972
-
Botnet detection using netflow information Finding new botnets based on client connections
-
H. Weststrate, "Botnet detection using netflow information Finding new botnets based on client connections" in Proc. 10th Twente Student Conference on IT, 2009.
-
(2009)
Proc. 10th Twente Student Conference on it
-
-
Weststrate, H.1
-
10
-
-
77951127918
-
-
[Online]. Available, [Accessed: March. 12, 2009]
-
The MITRE Corporation, "Data Mining for Network Intrusion Detection: How to Get Started, " [Online]. Available: http://www.mitre.org/work/tech- papers/tech-papers-01/bloedorn-datamining/bloedorn-datamining.pdf. [Accessed: March. 12, 2009].
-
Data Mining for Network Intrusion Detection: How to Get Started
-
-
-
12
-
-
84882753373
-
Botnet detection based on network behavior
-
Springer
-
W. Strayer, D. Lapsley, B. Walsh, and C. Livadas, Botnet Detection Based on Network Behavior, ser. Advances in Information Security. Springer, 2008, PP. 1-24.
-
(2008)
Ser. Advances in Information Security
, pp. 1-24
-
-
Strayer, W.1
Lapsley, D.2
Walsh, B.3
Livadas, C.4
-
13
-
-
2942640996
-
Data mining methods for network intrusion detection
-
P. Dokas, L. Ertoz, V. Kumar, A. Lazarevic, J. Srivastava, P. Tan, "Data Mining Methods for Network Intrusion Detection" in Proc. NSF Workshop on Next Generation Data Mining, 2002.
-
(2002)
Proc. NSF Workshop on Next Generation Data Mining
-
-
Dokas, P.1
Ertoz, L.2
Kumar, V.3
Lazarevic, A.4
Srivastava, J.5
Tan, P.6
-
16
-
-
0003873725
-
-
Brooks-Cole, Toronto, Ontario, Canada
-
R. Johnson and P. Kuby, Elementary Statistics, Brooks-Cole, Toronto, Ontario, Canada, 2004.
-
(2004)
Elementary Statistics
-
-
Johnson, R.1
Kuby, P.2
-
17
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network traffic for protocol- and structure independent botnet detection, " in Proc. 17th USENIX Security Symposium, 2008.
-
(2008)
Proc. 17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
18
-
-
77951135529
-
Surf the flood: Reducing high-volume intrusion detection data by automated record aggregation
-
C. Skorupka,, J. Tivel, L. Talbot, D. Debarr, W. Hill, E. Bloedorn, and A. Christiansen. "Surf the Flood: Reducing High-Volume Intrusion Detection Data by Automated Record Aggregation, " in Proc. SANS 2001 Technical Conference, 2001.
-
(2001)
Proc. SANS 2001 Technical Conference
-
-
Skorupka, C.1
Tivel, J.2
Talbot, L.3
Debarr, D.4
Hill, W.5
Bloedorn, E.6
Christiansen, A.7
-
20
-
-
77951136594
-
-
[Online]. Available:, [Accessed: March. 17, 2009
-
J. E. Clark, C. P. Lee, R. Menon, and V. Rood, "HoneyTrap: Visualization for Monitoring Honeynets, " [Online]. Available: http://idt.gatech.edu/~rmenon/newfolio/files/honeytrap/honeytrap.pdf [Accessed: March. 17, 2009].
-
HoneyTrap: Visualization for Monitoring Honeynets
-
-
Clark, J.E.1
Lee, C.P.2
Menon, R.3
Rood, V.4
|