-
1
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
USENIX, Cambridge.MA, July
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'05), USENIX, Cambridge.MA, July 2005. pp. 39-M.
-
(2005)
Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI'05)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
2
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rio de Janeiro, Brazil, October
-
M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, Rio de Janeiro, Brazil, October 2006.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
3
-
-
66249100743
-
Honeynet project
-
March
-
Honeynet Project. Know your Enemy: Tracking Botnets, March 2005. http://www.honeynet.org/papers/bots.
-
(2005)
Know Your Enemy: Tracking Botnets
-
-
-
4
-
-
66249147541
-
A survey of botnet technology and defenses
-
Washington, DC, March
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir. A Survey of Botnet Technology and Defenses In Proceedings of Cybersecurity Applications & Technology Conference For Homeland Security (CATCH), Washington, DC, March 2009. pp. 299-304.
-
(2009)
Proceedings of Cybersecurity Applications & Technology Conference for Homeland Security (CATCH)
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
5
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
USENIX, Berkeley, CA
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling, Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, USENIX, Berkeley, CA, 2008. pp. 1-9.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
6
-
-
61649123904
-
-
Department for Mathematics and Computer Science, University of Mannheim, TR-2007-010 ResearchPaper
-
J. Zhuge, T. Holz, X. Han, J. Guo, and W. Zou. Characterizing the IRC-based Botnet Phenomenon. Department for Mathematics and Computer Science, University of Mannheim, TR-2007-010 ResearchPaper, 2007.
-
(2007)
Characterizing the IRC-based Botnet Phenomenon.
-
-
Zhuge, J.1
Holz, T.2
Han, X.3
Guo, J.4
Zou, W.5
-
7
-
-
85084161366
-
Tor: The secondgeneration onion router
-
USENIX, San Diego, CA, August
-
R. Dingledine, N. Mathewson, and P. Syverson, Tor: The secondgeneration onion router. In Proceedings of the 13 th Usenix Security Symposium, USENIX, San Diego, CA, August 2004, pp. 303-320.
-
(2004)
Proceedings of the 13 Th Usenix Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
8
-
-
85000701895
-
My botnet is bigger than yours (Maybe, Better than Yours): Why size estimates remain challenging
-
USENIX, Berkeley, CA, April
-
M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. My Botnet is Bigger than Yours (Maybe, Better than Yours): Why Size Estimates Remain Challenging. In Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots'07), USENIX, Berkeley, CA, April 2007.
-
(2007)
Proceedings of the First Workshop on Hot Topics in Understanding Botnets (HotBots'07)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
9
-
-
70349706233
-
A first step towards characterizing stealthy botnets
-
Fukuoka, Japan, March
-
J. Leonard, S. Xu, and R. Sandhu. A First Step towards Characterizing Stealthy Botnets. In Proceedings of the International Conference on Availability, Reliability and Security, Fukuoka, Japan, March 2009. pp.106-113.
-
(2009)
Proceedings of the International Conference on Availability, Reliability and Security
, pp. 106-113
-
-
Leonard, J.1
Xu, S.2
Sandhu, R.3
-
10
-
-
77954926821
-
-
AfterGlow. http://afterglow.sourceforge.net/
-
AfterGlow
-
-
|