-
3
-
-
77955033852
-
An analysis of the Skype peer-to-peer internet telephony protocol
-
Baset, S., Schulzrinne, H.: An analysis of the Skype peer-to-peer internet telephony protocol. In: CoRR (2004)
-
(2004)
CoRR
-
-
Baset, S.1
Schulzrinne, H.2
-
5
-
-
85080378133
-
An algorithm for anomaly-based botnet detection
-
Binkley, J.R.: An algorithm for anomaly-based botnet detection. In: SRUTI 2006 (2006)
-
(2006)
SRUTI 2006
-
-
Binkley, J.R.1
-
8
-
-
11944253901
-
-
Cambridge University Press Cambridge (January)
-
Bollob́as, B.: Random Graphs. Cambridge University Press, Cambridge (January 2001)
-
(2001)
Random Graphs
-
-
Bollob́as, B.1
-
9
-
-
77955018674
-
Mining the network behavior of bots
-
Department of Computer Science, University of California at Santa Barbara (UCSB), CA, USA (July)
-
Cavallaro, L., Kruegel, C., Vigna, G.: Mining the network behavior of bots. Tech. Rep. 2009-2012, Department of Computer Science, University of California at Santa Barbara (UCSB), CA, USA (July 2009)
-
(2009)
Tech. Rep. 2009-2012
-
-
Cavallaro, L.1
Kruegel, C.2
Vigna, G.3
-
10
-
-
27544433210
-
Semantics-aware malware detection
-
Oakland 2005
-
Christodorescu, M., Jha, S., Seshia, S.A., Song, D., Bryant, R.E.: Semantics-aware malware detection. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Oakland 2005 (2005)
-
(2005)
Proceedings of the 2005 IEEE Symposium on Security and Privacy
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
11
-
-
47949109162
-
Improving sender anonymity in a structured overlay with imprecise routing
-
Springer, Heidelberg
-
Ciaccio, G.: Improving sender anonymity in a structured overlay with imprecise routing. LNCS. Springer, Heidelberg (2006)
-
(2006)
LNCS
-
-
Ciaccio, G.1
-
12
-
-
52049095294
-
-
July
-
CNET News. Hacking for dollars (July 2005), http://news.cnet.com/Hacking- for-dollars/2100-7349-3-5772238.html
-
(2005)
Hacking for Dollars
-
-
-
14
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: SRUTI 2005: Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet (2005)
-
(2005)
SRUTI 2005: Proceedings of the Workshop on Steps to Reducing Unwanted Traffic on the Internet
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
19
-
-
84903607772
-
Dynamic spyware analysis
-
Usenix 2007
-
Egele, M., Kruegel, C., Kirda, E., Yin, H.: Dynamic Spyware Analysis. In: Proceedings of the 2007 Usenix Annual Conference, Usenix 2007 (2007)
-
(2007)
Proceedings of the 2007 Usenix Annual Conference
-
-
Egele, M.1
Kruegel, C.2
Kirda, E.3
Yin, H.4
-
20
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
Franklin, J., Paxson, V., Perrig, A., Savage, S.: An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
21
-
-
33646054897
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
Freiling, F.C., Holz, T., Wicherski, G.: Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. In: Proceedings of 10 th European Symposium on Research in Computer Security, ESORICS (2005)
-
(2005)
Proceedings of 10 Th European Symposium on Research in Computer Security, ESORICS
-
-
Freiling, F.C.1
Holz, T.2
Wicherski, G.3
-
22
-
-
84870637050
-
-
Gnutella Development Forum
-
Gnutella Development Forum. Gnutella protocol specification, http://wiki.limewire.org/index.php?title=GDF
-
Gnutella Protocol Specification
-
-
-
24
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection. In: Proceedings of the 17th USENIX Security Symposium (2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
25
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-Driven dialog correlation
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In: Proceedings of the 16th USENIX Security Symposium (2007)
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
28
-
-
77955036937
-
Congestion control and message loss in Gnutella networks
-
He, Q., Ammar, M.: Congestion control and message loss in Gnutella networks. In: Proceedings of SPIE (2003)
-
(2003)
Proceedings of SPIE
-
-
He, Q.1
Ammar, M.2
-
29
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets:A case study on storm worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and Mitigation of Peer-to-Peer-based Botnets:A Case study on Storm Worm. In: USENIX Workshop on Large Scale Exploits and Emerging Threats (2008)
-
(2008)
USENIX Workshop on Large Scale Exploits and Emerging Threats
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
35
-
-
56549121841
-
A layered architecture for detecting malicious behaviors
-
Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. Springer, Heidelberg
-
Martignoni, L., Stinson, E., Fredrikson, M., Jha, S., Mitchell, J.C.: A Layered Architecture for Detecting Malicious Behaviors. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol.5230, pp. 78-97. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5230
, pp. 78-97
-
-
Martignoni, L.1
Stinson, E.2
Fredrikson, M.3
Jha, S.4
Mitchell, J.C.5
-
37
-
-
49949091964
-
FLuXOR: Detecting and monitoring fast-flux service networks
-
Springer, Heidelberg
-
Passerini, E., Paleari, R., Martignoni, L., Bruschi, D.: FLuXOR: Detecting and Monitoring Fast-Flux Service Networks. LNCS. Springer, Heidelberg (2008)
-
(2008)
LNCS
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
39
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon. In: IMC 2006: Proceedings of the 6th ACM SIGCOMM on Internet measurement (2006)
-
(2006)
IMC 2006: Proceedings of the 6th ACM SIGCOMM on Internet Measurement
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
40
-
-
48649089285
-
Distributed routing in small-world networks
-
Sandberg, O.: Distributed routing in small-world networks. In: ALENEX 2006 (2006)
-
(2006)
ALENEX 2006
-
-
Sandberg, O.1
-
42
-
-
77955015348
-
-
Sissel, J.: xdotool, http://www.semicomplete.com/projects/xdotool/
-
Xdotool
-
-
Sissel, J.1
-
43
-
-
70249108888
-
Overbot - A botnet protocol based on Kademlia
-
SecureComm., Istambul, Turkey
-
Starnberger, G., Kruegel, C., Kirda, E.: Overbot - A botnet protocol based on Kademlia. In: Proceedings of the International on Security and Privacy in Communication Networks, SecureComm., Istambul, Turkey (2008)
-
(2008)
Proceedings of the International on Security and Privacy in Communication Networks
-
-
Starnberger, G.1
Kruegel, C.2
Kirda, E.3
-
44
-
-
77954925610
-
Walowdac - Analysis of a peer-to-peer botnet
-
November
-
Stock, B., Goebel, J., Engelberth, M., Freiling, F., Holz, T.: Walowdac - Analysis of a Peer-to-Peer Botnet. In: European Conference on Computer Network Defense (EC2ND) (November 2009)
-
(2009)
European Conference on Computer Network Defense (EC2ND)
-
-
Stock, B.1
Goebel, J.2
Engelberth, M.3
Freiling, F.4
Holz, T.5
-
45
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
CCS 2009
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your Botnet is My Botnet: Analysis of a Botnet Takeover. In: Proceedings of the 16th ACM conference on Computer and Communications Security, CCS 2009 (2009)
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
46
-
-
41949115980
-
Detecting botnets with tight command and control
-
Strayer, W.T., Walsh, R., Livadas, C., Lapsley, D.: Detecting botnets with tight command and control. In: Proceedings of the 31st IEEE Conference on Local Computer Networks (2006)
-
(2006)
Proceedings of the 31st IEEE Conference on Local Computer Networks
-
-
Strayer, W.T.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
50
-
-
70350374367
-
Automatically generating models for botnet detection
-
Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
-
Wurzinger, P., Bilge, L., Holz, T., Goebel, J., Kruegel, C., Kirda, E.: Automatically Generating Models for Botnet Detection. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol.5789, pp. 232-249. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5789
, pp. 232-249
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
51
-
-
49949094072
-
Traffic aggregation for malware detection
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Yen, T.-F., Reiter, M.K.: Traffic Aggregation for Malware Detection. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol.5137, pp. 207-227. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 207-227
-
-
Yen, T.-F.1
Reiter, M.K.2
-
52
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Yin, H., Song, D., Egele, D.M., Kruegel, C., Kirda, E.: Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.2
Egele, D.M.3
Kruegel, C.4
Kirda, E.5
|