-
1
-
-
57149085446
-
An inside look at botnets
-
Advances in Information Security, Springer, Heidelberg
-
P. Barford and V.Yagneswaran, "An Inside Look at Botnets". In: Special Workshop on Malware Detection, Advances in Information Security, Springer, Heidelberg (2006).
-
(2006)
Special Workshop on Malware Detection
-
-
Barford, P.1
Yagneswaran, V.2
-
5
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers, " in Proc. ACM SIGCOMM, 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
6
-
-
70449508100
-
Zombies and botnets
-
Australian Institute of Criminology, Canberra, March
-
K. K. R. Choo, "Zombies and Botnets, " Trends and issues in crime and criminal justice, no. 333, Australian Institute of Criminology, Canberra, March 2007.
-
(2007)
Trends and Issues in Crime and Criminal Justice
, Issue.333
-
-
Choo, K.K.R.1
-
7
-
-
33750376717
-
Scalability, fidelity and containment in the potemkin virtual honeyfarm
-
M. Vrable, J. Ma, J. Chen, D. Moore, E.Vandekieft, A. C. Snoeren, G.M. Voelker, and S.Savage, " Scalability, Fidelity and Containment in the Potemkin Virtual Honeyfarm, " in Proc. ACM SIGOPS OperatingSystem Review, vol. 39(5), pp. 148-162, 2005.
-
(2005)
Proc. ACM SIGOPS OperatingSystem Review
, vol.39
, Issue.5
, pp. 148-162
-
-
Vrable, M.1
Ma, J.2
Chen, J.3
Moore, D.4
Vandekieft, E.5
Snoeren, A.C.6
Voelker, G.M.7
Savage, S.8
-
8
-
-
33646054897
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
vol. Lecture Notes in Computer Science 3676, September
-
F. Freiling, T. Holz, and G. Wicherski, "Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, " in Proc. 10th European Symposium on Research in Computer Security (ESORICS), vol. Lecture Notes in Computer Science 3676, September 2005, pp. 319-335.
-
(2005)
Proc. 10th European Symposium on Research in Computer Security (ESORICS)
, pp. 319-335
-
-
Freiling, F.1
Holz, T.2
Wicherski, G.3
-
10
-
-
37849009457
-
Characterizing dark DNS behavior
-
J. Oberheide, M. Karir, and Z.M. Mao, "Characterizing Dark DNS Behavior, " in Proc. 4th nteraational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, 2007.
-
(2007)
Proc. 4th Nteraational Conference on Detection of Intrusions and Malware, and Vulnerability Assessment
-
-
Oberheide, J.1
Karir, M.2
Mao, Z.M.3
-
11
-
-
77958582326
-
-
web page, March
-
Snort IDS web page, http://www.snort.org March 2006.
-
(2006)
Snort IDS
-
-
-
12
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by ire nickname evaluation
-
J. Goebel and T. Holz. Rishi: Identify bot contaminated hosts by ire nickname evaluation. In Proceedings of USENIX HotBots'07, 2007.
-
(2007)
Proceedings of USENIX HotBots'07
-
-
Goebel, J.1
Holz, T.2
-
15
-
-
85080378133
-
An algorithm for anomaly-based Botnet detection
-
July
-
R. Binkley and S. Singh. An algorithm for anomaly-based Botnet detection. In Proceedings of USENIX SRLTCT06, pages 43-48, July 2006.
-
(2006)
Proceedings of USENIX SRLTCT06
, pp. 43-48
-
-
Binkley, R.1
Singh, S.2
-
16
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
San Diego, CA, February
-
Guofei Gu, Junjie Zhang, and Wenke Lee. "BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic." In Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08), San Diego, CA, February2008.
-
(2008)
Proceedings of the 15th Annual Network and Distributed System Security Symposium (NDSS'08)
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
17
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet Detection by Monitoring Group Activities in DNS Traffic, " in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007, pp.715-720.
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007)
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
19
-
-
51949119334
-
Botnet detection and response, the network is the infection
-
D. Dagon, "Botnet Detection and Response, The Network is the Infection, " in OARC Workshop, 2005.
-
(2005)
OARC Workshop
-
-
Dagon, D.1
-
21
-
-
84882753373
-
-
ser. Advances in Information Security. Springer
-
W. Strayer, D. Lapsley, B. Walsh, and C. Livadas, Botnet Detection Based on Network Behavior, ser. Advances in Information Security. Springer, 2008, PP. 1-24.
-
(2008)
Botnet Detection Based on Network Behavior
, pp. 1-24
-
-
Strayer, W.1
Lapsley, D.2
Walsh, B.3
Livadas, C.4
-
22
-
-
63749106613
-
Flow-based identification of Botnet traffic by mining multiple
-
Penang, Malaysia
-
M. M. Masud, T. Al-khateeb, L. Khan, B. Thuraisingham, K. W.Hamlen, " Flow-based identification of Botnet traffic by mining multiple in Proc. International Conference on Distributed Framework& Application, Penang, Malaysia.2008.
-
(2008)
Proc. International Conference on Distributed Framework& Application
-
-
Masud, M.M.1
Al-Khateeb, T.2
Khan, L.3
Thuraisingham, B.4
Hamlen, K.W.5
-
23
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure independent Botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network traffic for protocol- and structure independent Botnet detection, " in Proc. 17th USENIX Security Symposium, 2008.
-
(2008)
Proc. 17th USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
24
-
-
85061529860
-
BotHunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium (Security'07), 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium (Security'07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
25
-
-
77950820631
-
Active Botnet probing to identify obscure command and control channels
-
asac
-
G. Gu, V. Yegneswaran, P. Porras, J. Stoll, and W. Lee. " Active Botnet probing to identify obscure command and control channels". In Proceeding of Annual computer security application conferences, asac, pp.241-253, 2009.
-
(2009)
Proceeding of Annual Computer Security Application Conferences
, pp. 241-253
-
-
Gu, G.1
Yegneswaran, V.2
Porras, P.3
Stoll, J.4
Lee, W.5
-
26
-
-
77958537868
-
Botnet detection by monitoring similar communication patterns
-
March, ISSN 1947-5500. USA
-
H.R. Zeidanloo, A.A. Manaf, " Botnet Detection by Monitoring Similar Communication Patterns". International Journal of Computer Science and Information Security, Vol. 7, No. 3, March 2010, ISSN 1947-5500. USA.
-
(2010)
International Journal of Computer Science and Information Security
, vol.7
, Issue.3
-
-
Zeidanloo, H.R.1
Manaf, A.A.2
-
27
-
-
34547141391
-
The nepenthes platform: An efficient approach to collect malware
-
(Hamburg), September
-
P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, "The nepenthes platform: An efficient approach to collect malware, " in Proceedings of International Symposium on Recent Advances in Intrusion Detection (RAID'06), (Hamburg), September 2006.
-
(2006)
Proceedings of International Symposium on Recent Advances in Intrusion Detection (RAID'06)
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
|