-
1
-
-
84924375780
-
Botz-4-sale: Surviving organized DDOS attacks that mimic flash crowds
-
May
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-Sale: Surviving Organized DDOS Attacks That Mimic Flash Crowds," Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05), May 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05)
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
3
-
-
33845592623
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of- Service attacks
-
CS Dept. RWTH Aachen Univ., Apr
-
F. Freiling, T. Holz, and G. Wicherski, "Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of- Service Attacks," Technical Report AIB-2005-07, CS Dept. RWTH Aachen Univ., Apr. 2005.
-
(2005)
Technical Report AIB-2005-07
-
-
Freiling, F.1
Holz, T.2
Wicherski, G.3
-
4
-
-
84891429894
-
Modeling botnet propagation using time zones
-
Feb
-
D. Dagon, C. Zou, and W. Lee, "Modeling Botnet Propagation Using Time Zones," Proc. 13th Ann. Network and Distributed System Security Symp. (NDSS '06), pp. 235-249, Feb. 2006.
-
(2006)
Proc. 13th Ann. Network and Distributed System Security Symp. (NDSS '06)
, pp. 235-249
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
6
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
July
-
E. Cooke, F. Jahanian, and D. McPherson, "The Zombie Roundup: Understanding, Detecting, and Disrupting Botnets," Proc. USE-NIX Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI '05), July 2005.
-
(2005)
Proc. USE-NIX Workshop Steps to Reducing Unwanted Traffic on the Internet (SRUTI '05)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
8
-
-
3042742908
-
An analysis of the slapper worm
-
Jan.-Feb
-
I. Arce and E. Levy, "An Analysis of the Slapper Worm," IEEE Security & Privacy Magazine, vol. 1, no. 1, pp. 82-87, Jan.-Feb. 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
-
12
-
-
77952683876
-
-
Servent, http://en. wikipedia.org/wiki/Servent, 2008.
-
(2008)
Servent
-
-
-
14
-
-
3042784584
-
Botnets: Big and bigger
-
July-Aug
-
B. McCarty, "Botnets: Big and Bigger," IEEE Security & Privacy Magazine, vol. 1, no. 4, pp. 87-90, July-Aug. 2003.
-
(2003)
IEEE Security & Privacy Magazine
, vol.1
, Issue.4
, pp. 87-90
-
-
McCarty, B.1
-
22
-
-
77951157906
-
A survey and comparison of peer-to-peer overlay network schemes
-
E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, "A Survey and Comparison of Peer-to-Peer Overlay Network Schemes," IEEE Comm. Surveys and Tutorials, vol. 7, no. 2, 2005.
-
(2005)
IEEE Comm. Surveys and Tutorials
, vol.7
, Issue.2
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
26
-
-
33947597689
-
Planet scale software updates
-
Sept
-
C. Gkantsidis, T. Karagiannis, P. Rodriguez, and M. Vojnovic, "Planet Scale Software Updates," Proc. ACM SIGCOMM '06, Sept. 2006.
-
(2006)
Proc. ACM SIGCOMM '06
-
-
Gkantsidis, C.1
Karagiannis, T.2
Rodriguez, P.3
Vojnovic, M.4
-
28
-
-
77952697918
-
-
Feb
-
Washington Post: The Botnet Trackers, http://www.washington post.com/wp-dyn/content/article/2006/02/16 AR2006021601388.html, Feb. 2006.
-
(2006)
Washington Post: The Botnet Trackers
-
-
-
31
-
-
84955618043
-
Basis: A biological approach to system information security
-
V. A. Skormin, J. G. Delgado-Frias, D. L. McGee, J. Giordano, L. J. Popyack, V. I. Gorodetski, and A. O. Tarakanov, "BASIS: A Biological Approach to System Information Security," Proc. Int'l Workshop Information Assurance in Computer Networks (MMM-ACNS '01), pp. 127-142, 2001.
-
(2001)
Proc. Int'l Workshop Information Assurance in Computer Networks (MMM-ACNS '01)
, pp. 127-142
-
-
Skormin, V.A.1
Delgado-Frias, J.G.2
McGee, D.L.3
Giordano, J.4
Popyack, L.J.5
Gorodetski, V.I.6
Tarakanov, A.O.7
-
32
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Oct
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A Multifaceted Approach to Understanding the Botnet Phenomenon," Proc. ACM SIGCOMM Internet Measurement Conf. (IMC '06), Oct. 2006.
-
(2006)
Proc. ACM SIGCOMM Internet Measurement Conf. (IMC '06)
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
33
-
-
28044442580
-
Honeystat: Local worm detection using honeypots
-
D. Dagon, X. Qin, G. Gu, W. Lee, J. Grizzard, J. Levin, and H. Owen, "Honeystat: Local Worm Detection Using Honeypots," Proc. Seventh Int'l Symp. Recent Advances in Intrusion Detection (RAID), 2004.
-
(2004)
Proc. Seventh Int'l Symp. Recent Advances in Intrusion Detection (RAID)
-
-
Dagon, D.1
Qin, X.2
Gu, G.3
Lee, W.4
Grizzard, J.5
Levin, J.6
Owen, H.7
-
34
-
-
25844462447
-
Defending against internet worms: A signature-based approach
-
May
-
Y. Tang and S. Chen, "Defending Against Internet Worms: A Signature-Based Approach," Proc. IEEE INFOCOM '05, May 2005.
-
(2005)
Proc. IEEE INFOCOM '05
-
-
Tang, Y.1
Chen, S.2
-
35
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
Y. Chen, R. Venkatesan, M. Cary, R. Pang, S. Sinha, and M. H. Jakubowski, "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive," Revised Papers from the Fifth Int'l Workshop Information Hiding (IH '03), pp. 400-414, 2003.
-
(2003)
Revised Papers From the Fifth Int'l Workshop Information Hiding (IH '03)
, pp. 400-414
-
-
Chen, Y.1
Venkatesan, R.2
Cary, M.3
Pang, R.4
Sinha, S.5
Jakubowski, M.H.6
-
37
-
-
16344396406
-
Monitoring and early warning for internet worms
-
Oct
-
C. Zou, L. Gao, W. Gong, and D. Towsley, "Monitoring and Early Warning for Internet Worms," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 190-199, Oct. 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
, pp. 190-199
-
-
Zou, C.1
Gao, L.2
Gong, W.3
Towsley, D.4
-
38
-
-
85084162258
-
How to own the internet in your spare time
-
Aug
-
S. Staniford, V. Paxson, and N. Weaver, "How to Own the Internet in Your Spare Time," Proc. 11th USENIX Security Symp. (SSYM '02), pp. 149-167, Aug. 2002.
-
(2002)
Proc. 11th USENIX Security Symp. (SSYM '02)
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
39
-
-
14944381614
-
Network telescopes: Technical report
-
CAIDA
-
D. Moore, C. Shannon, G. Voelker, and S. Savage, "Network Telescopes: Technical Report," Technical Report TR-2004-04, CAIDA, 2004.
-
(2004)
Technical Report TR-2004-04
-
-
Moore, D.1
Shannon, C.2
Voelker, G.3
Savage, S.4
-
41
-
-
77952694586
-
-
University of Michigan Internet Motion Sensor
-
University of Michigan Internet Motion Sensor, http://ims.eecs.umich.edu/ , 2008.
-
(2008)
-
-
-
42
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
Aug
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation," Proc. 16th USENIX Security Symp. (Security '07), Aug. 2007.
-
(2007)
Proc. 16th USENIX Security Symp. (Security '07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
|