-
1
-
-
77952334842
-
-
Symantec Internet Security Threat Report, April
-
http://www.symantec.com/business/theme.jsp?themeid=threa treport, Symantec Internet Security Threat Report, Volume XIII: April, 2008
-
(2008)
, vol.13
-
-
-
2
-
-
38149117561
-
An inside look at botnets
-
Springer Verlag, ISBN: 0-387-32720-7
-
P. Barford and V. Yegneswaran, "An inside look at Botnets, " Special Workshop on Malware Detection, Advances in Information Security, Springer Verlag, ISBN: 0-387-32720-7, 2006.
-
(2006)
Special Workshop on Malware Detection, Advances in Information Security
-
-
Barford, P.1
Yegneswaran, V.2
-
3
-
-
77952375044
-
-
available on and assessed in December
-
Sinit, available on and assessed in December 2008 http://www.secureworks. com/research/threats/sinit
-
(2008)
-
-
Sinit1
-
4
-
-
77952330158
-
-
available on and assessed in December
-
Phatbot, available on and assessed in December 2008 http://www. secureworks.com/research/threats/phatbot
-
(2008)
-
-
Phatbot1
-
5
-
-
77952402734
-
-
available on and assessed in December
-
Nugache, available on and assessed in December 2008 http://www. securityfocus.com/news/11390
-
(2008)
-
-
Nugache1
-
6
-
-
77952365684
-
-
http://www.secureworks.com/research/blog/index.php/2007/09/12/ analysis-of-storm-worm-ddos-traffic
-
-
-
-
7
-
-
77950128950
-
Antisocial networks: Turning a social network into a botnet
-
Taipei, Taiwan
-
th Information Security Conference, Taipei, Taiwan, 2008.
-
(2008)
th Information Security Conference
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Antoniades, D.4
Ioannidis, S.5
Anagnostakis, K.6
Markatos, E.7
-
9
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
LNCS 4219, 2006 Springer-Verlag, Hamburg
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, "The nepenthes platform: an efficient approach to collect malware, " In Proceedings of Recent Advances in Intrusion Detection, LNCS 4219, Springer-Verlag, 2006, pp. 165-184, Hamburg, 2006.
-
(2006)
Proceedings of Recent Advances in Intrusion Detection
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
11
-
-
84881411869
-
Honeynet-based botnet scan traffic analysis
-
Series: Advances in Information Security, W. K. Lee, C. Wang, D. Dagon, Eds., Springer, ISBN: 978-0-387-68766-7
-
Z. H. Li, A. Goyal, and Y. Chen, "Honeynet-based botnet scan traffic analysis, " Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Information Security, Vol. 36, W. K. Lee, C. Wang, D. Dagon, (Eds.), Springer, ISBN: 978-0-387-68766-7, 2008.
-
(2008)
Botnet Detection: Countering the Largest Security Threat
, vol.36
-
-
Li, Z.H.1
Goyal, A.2
Chen, Y.3
-
15
-
-
67249165178
-
Botnet detection based on network behavior
-
Series: Advances in Information Security, W. K. Lee, C. Wang, D. Dagon, Eds., Springer
-
T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, "Botnet detection based on network behavior, " Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Information Security, Vol. 36, W. K. Lee, C. Wang, D. Dagon, (Eds.), Springer, 2008.
-
(2008)
Botnet Detection: Countering the Largest Security Threat
, vol.36
-
-
Strayer, T.1
Lapsley, D.2
Walsh, R.3
Livadas, C.4
-
17
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by irc nickname evaluation
-
J. Goebel and T. Holz, "Rishi: Identify bot contaminated hosts by irc nickname evaluation, " In Proceedings of USENIX HotBots'07, 2007.
-
(2007)
Proceedings of USENIX HotBots'07
-
-
Goebel, J.1
Holz, T.2
-
23
-
-
33750283653
-
A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification
-
N. Williams, S. Zander and G. Armitage, "A preliminary performance comparison of five machine learning algorithms for practical IP traffic flow classification, " ACM SIGCOMM Computer Communication Review, Vol. 36, Issue 5, pp. 5-16, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.5
, pp. 5-16
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
-
24
-
-
35048887481
-
-
Antibes Juan-les-Pins, France
-
th International Workshop on Passive and Active Network Measurement, pp. 205-214, Antibes Juan-les-Pins, France, 2004.
-
(2004)
th International Workshop on Passive and Active Network Measurement
, pp. 205-214
-
-
McGregor, A.1
Hall, M.2
Lorier, P.3
Brunskill, J.4
-
26
-
-
77953868170
-
Early application identification
-
CONEXT 06, Lisboa, Portugal
-
L. Bernaille, R. Teixeira, K. Salamatian, "Early application identification, " In Proceedings of ACM International Conference On Emerging Networking Experiments And Technologies (CONEXT 06), Lisboa, Portugal, 2006.
-
(2006)
Proceedings of ACM International Conference on Emerging Networking Experiments and Technologies
-
-
Bernaille, L.1
Teixeira, R.2
Salamatian, K.3
-
27
-
-
33244467936
-
Internet traffic classification using bayesian analysis techniques
-
A. Moore, D. Zuev, "Internet traffic classification using Bayesian analysis techniques, " ACM SIGMETRICS Performance Evaluation Review, Vol. 30, Issue 1, pp. 50-60, 2005.
-
(2005)
ACM SIGMETRICS Performance Evaluation Review
, vol.30
, Issue.1
, pp. 50-60
-
-
Moore, A.1
Zuev, D.2
-
28
-
-
48749130030
-
Traffic classification through simple statistical fingerprinting
-
M. Crotti, M. Dusi, F. Gringoli, L. Salgarelli, "Traffic classification through simple statistical fingerprinting, " ACM SIGCOMM Computer Communication Review, Vol. 37, Issue 1, 5-16, 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.1
, pp. 5-16
-
-
Crotti, M.1
Dusi, M.2
Gringoli, F.3
Salgarelli, L.4
-
29
-
-
14944383480
-
Class of service mapping for QoS: A statistical signature based approach to IPx traffic classification
-
Taormina, Sicily, Italy, October 25-27
-
th ACM SIGCOMM Conference on Internet Measurement, Taormina, Sicily, Italy, October 25-27, 2004.
-
(2004)
th ACM SIGCOMM Conference on Internet Measurement
-
-
Roughan, M.1
Sen, S.2
Spatscheck, O.3
Duffield, N.G.4
-
30
-
-
34548242664
-
A markovian signature-based approach to ip traffic classification
-
San Diego, California, USA
-
rd Annual ACM Workshop on Mining Network Data, San Diego, California, USA, pp. 29-34, 2007.
-
(2007)
rd Annual ACM Workshop on Mining Network Data
, pp. 29-34
-
-
Dahmouni, H.1
Vaton, S.2
Rosse, D.3
-
31
-
-
51849134180
-
Towards automated application signature generation for traffic identification
-
NOMS 2008, Salvador, Brazil
-
C. Park, Y. Won, M. Kim and J. Hong, "Towards automated application signature generation for traffic identification, " In Proceedings of the IEEE/IFIP Network Operations and Management Symposium (NOMS 2008), Salvador, Brazil, 160-167, 2008.
-
(2008)
Proceedings of the IEEE/IFIP Network Operations and Management Symposium
, pp. 160-167
-
-
Park, C.1
Won, Y.2
Kim, M.3
Hong, J.4
-
32
-
-
33847303101
-
Blinc: Multilevel traffic classification in the dark
-
Philadelphia, Pennsylvania
-
T. Karagiannis, K. Papagiannaki, and M. Faloutsos, "BLINC: multilevel traffic classification in the dark, " In Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 229-240, Philadelphia, Pennsylvania, 2005.
-
(2005)
Proceedings of the 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 229-240
-
-
Karagiannis, T.1
Papagiannaki, K.2
Faloutsos, M.3
-
33
-
-
33646890686
-
Traffic classification on the fly
-
L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, "Traffic classification on the fly, " ACM SIGCOMM Computer Communication Review, Vol. 36, Issue 2, pp. 23-26, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.2
, pp. 23-26
-
-
Bernaille, L.1
Teixeira, R.2
Akodkenou, I.3
Soule, A.4
Salamatian, K.5
-
34
-
-
77952349242
-
-
Fred-eZone WiFi ISP, available on and assessed in December
-
Fred-eZone WiFi ISP, available on and assessed in December 2008 http://www.fred-ezone.ca
-
(2008)
-
-
-
35
-
-
12244296737
-
Fully automatic cross-associations
-
Seattle, Washington
-
th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 79-88, Seattle, Washington, 2004.
-
(2004)
th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 79-88
-
-
Chakrabarti, D.1
Papadimitriou, S.2
Modha, D.3
Faloutsos, C.4
-
39
-
-
46349109903
-
A proposal of metrics for botnet detection based on its cooperative behavior
-
M. Akiyama, T. Kawamoto, M. Shimamura, T. Yokoyama, Y. Kadobayashi, and S. Yamaguchi, "A proposal of metrics for botnet detection based on its cooperative behavior, " In Proceedings of the 2007 International Symposium on Applications and the Internet Workshops, pp. 82-85, 2007.
-
(2007)
Proceedings of the 2007 International Symposium on Applications and the Internet Workshops
, pp. 82-85
-
-
Akiyama, M.1
Kawamoto, T.2
Shimamura, M.3
Yokoyama, T.4
Kadobayashi, Y.5
Yamaguchi, S.6
-
41
-
-
77952405126
-
-
Kaiten, available on and assessed in December
-
Kaiten, available on and assessed in December 2008 http:// packetstormsecurity.org/distributed/indexsize.html
-
(2008)
-
-
-
42
-
-
77952407910
-
-
BlackEnergy, available on and assessed in December
-
BlackEnergy, available on and assessed in December 2008 http://atlas-public.ec2.arbor.net/docs/BlackEnergy+DDoS+ Bot+Analysispdf
-
(2008)
-
-
-
43
-
-
67650326519
-
Comparing traffic classifiers
-
L. Salgarelli, F. Gringoli, and T. Karagiannis, "Comparing traffic classifiers", ACM SIGCOMM Computer Communication Review, Volume 37, Issue 3, pp. 65-68, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
, vol.37
, Issue.3
, pp. 65-68
-
-
Salgarelli, L.1
Gringoli, F.2
Karagiannis, T.3
-
46
-
-
77952358661
-
-
German Honeynet Project, assessed in Dec
-
German Honeynet Project, assessed in Dec. 2008 http://pi1.informatik.uni- mannheim.de/index.php? pagecontent=site/Research.menu/Honeynet.page
-
(2008)
-
-
|