-
1
-
-
48649089769
-
A Taxonomy of Botnet Structures
-
D. Dagon, G. Guofei and C. P. Lee, and L. Wenke, "A Taxonomy of Botnet Structures," in Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, 2007, p. 325-339.
-
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, 2007
, pp. 325-339
-
-
Dagon, D.1
Guofei, G.2
Lee, C.P.3
Wenke, L.4
-
2
-
-
77955410918
-
-
"The Honeynet Project ,".http://www.honeynet.org/
-
-
-
-
3
-
-
57149085446
-
An Inside Look at Botnets
-
V. Y. Paul Barford, "An Inside Look at Botnets," in Special Workshop on Malware Detection, Advances in Information Security, Arlington, VA, 2006.
-
Special Workshop on Malware Detection, Advances in Information Security, Arlington, VA, 2006
-
-
Barford, V.Y.P.1
-
7
-
-
38049035805
-
Botnet Detection by Monitoring Group Activities in DNS Traffic
-
H. Choi, H. Lee and H. Lee, and H. Kim, "Botnet Detection by Monitoring Group Activities in DNS Traffic," in Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on, 2007, p. 715-720.
-
(2007)
Computer and Information Technology, 2007. CIT 2007. 7th IEEE International Conference on
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
9
-
-
77952717608
-
Revealing botnet membership using DNSBL counter-intelligence
-
A. Ramachandran, N. Feamster and D. Dagon, "Revealing botnet membership using DNSBL counter-intelligence," in Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet, 2006, p. 8-8.
-
Proceedings of the 2nd Conference on Steps to Reducing Unwanted Traffic on the Internet, 2006
, pp. 8-8
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
10
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. A. Rajab, J. Zarfoss and F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, 2006, p. 41-52.
-
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, 2006
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
13
-
-
46149123241
-
Usilng Machine Learning Technliques to Identify Botnet Traffic
-
C. Livadas, R. Walsh and D. Lapsley, and W. T. Strayer, "Usilng Machine Learning Technliques to Identify Botnet Traffic," in Local Computer Networks, Proceedings 2006 31st IEEE Conference on, 2006, p. 967-974.
-
(2006)
Local Computer Networks, Proceedings 2006 31st IEEE Conference on
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
14
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras and V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting malware infection through IDS-driven dialog correlation.," in In Proceedings of the 16th USENIX Security Symp. (Security 2007), 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symp. (Security 2007)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
17
-
-
50249168251
-
Bot Detection Based on Traffic Analysis
-
Y. Kugisaki, Y. Kasahara and Y. Hori, and K. Sakurai, "Bot Detection Based on Traffic Analysis," in Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference on, 2007, p. 303-306.
-
(2007)
Intelligent Pervasive Computing, 2007. IPC. The 2007 International Conference on
, pp. 303-306
-
-
Kugisaki, Y.1
Kasahara, Y.2
Hori, Y.3
Sakurai, K.4
-
18
-
-
33751393658
-
Automated traffic classification and application identification using machine learning
-
S. Zander, T. Nguyen and G. Armitage, "Automated traffic classification and application identification using machine learning," in Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on, 2005, p. 250-257.
-
(2005)
Local Computer Networks, 2005. 30th Anniversary. The IEEE Conference on
, pp. 250-257
-
-
Zander, S.1
Nguyen, T.2
Armitage, G.3
-
19
-
-
0001704377
-
On-line construction of suffix trees
-
E. Ukkonen, "On-line construction of suffix trees," Algorithmica, vol. 14, p. 249-260, 1995.
-
(1995)
Algorithmica
, vol.14
, pp. 249-260
-
-
Ukkonen, E.1
|