-
3
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In Proceedings of the 16th ACM Conference on Computer and Communication Security, Chicago, IL, November 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communication Security, Chicago, IL, November 2009
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
5
-
-
70450185494
-
-
Technical report, Northwestern EECS Technical Report, March
-
D. R. Choffnes, J. Duch, D. Malmgren, R. Guierma, F. E. Bustamante, and L. Amaral. Swarmscreen: Privacy through plausible deniability in P2P systems. Technical report, Northwestern EECS Technical Report, March 2009.
-
(2009)
Swarmscreen: Privacy Through Plausible Deniability in P2P Systems
-
-
Choffnes, D.R.1
Duch, J.2
Malmgren, D.3
Guierma, R.4
Bustamante, F.E.5
Amaral, L.6
-
14
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study. In
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: overview and case study. In HotBots'07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, 2007.
-
HotBots'07: Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, 2007
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
16
-
-
85061529860
-
BotHunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting malware infection through ids-driven dialog correlation. In Proceedings of the 16th USENIX Security Symposium (Security'07), August 2007.
-
Proceedings of the 16th USENIX Security Symposium (Security'07), August 2007
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
18
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on Storm Worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: a case study on Storm Worm. In LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, 2008
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
19
-
-
42149143451
-
Network monitoring using traffic dispersion graphs (TDGs)
-
M. Iliofotou, P. Pappu, M. Faloutsos, M. Mitzenmacher, S. Singh, and G. Varghese. Network monitoring using traffic dispersion graphs (TDGs). In IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 315-320, 2007.
-
(2007)
IMC '07: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 315-320
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
21
-
-
77952351261
-
Towards complete node enumeration in a peer-to-peer botnet
-
B. B. Kang, E. Chan-Tin, C. P. Lee, J. Tyra, H. J. Kang, C. N. Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim. Towards complete node enumeration in a peer-to-peer botnet. In Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), March 2009.
-
Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), March 2009
-
-
Kang, B.B.1
Chan-Tin, E.2
Lee, C.P.3
Tyra, J.4
Kang, H.J.5
Wadler, C.N.Z.6
Sinclair, G.7
Hopper, N.8
Dagon, D.9
Kim, Y.10
-
22
-
-
85084096724
-
The Heisenbot uncertainty problem: Challenges in separating bots from chaff
-
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot uncertainty problem: challenges in separating bots from chaff. In LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, pages 1-9, 2008.
-
(2008)
LEET'08: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
, pp. 1-9
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
24
-
-
38149112602
-
Botnet traffic detection techniques by C&C session classification using svm
-
S. Kondo and N. Sato. Botnet traffic detection techniques by C&C session classification using svm. Advances in Information and Computer Security, pages 91-104, 2007.
-
(2007)
Advances in Information and Computer Security
, pp. 91-104
-
-
Kondo, S.1
Sato, N.2
-
25
-
-
46149123241
-
Using machine learning technliques to identify botnet traffic
-
0
-
C. Livadas, R. Walsh, D. Lapsley, and W. Strayer. Using machine learning technliques to identify botnet traffic. Local Computer Networks, Annual IEEE Conference on, 0:967-974, 2006.
-
(2006)
Local Computer Networks, Annual IEEE Conference on
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.4
-
26
-
-
85059753615
-
BotGrep: Finding P2P bots with structured graph analysis
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov. BotGrep: Finding P2P bots with structured graph analysis. In USENIX Security Conference, August 2010.
-
USENIX Security Conference, August 2010
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
28
-
-
77950106995
-
The waledac protocol: The how and why
-
October
-
G. Sinclair, C. Nunnery, and B.-H. Kang. The waledac protocol: The how and why. In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pages 69-77, October 2009.
-
(2009)
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
, pp. 69-77
-
-
Sinclair, G.1
Nunnery, C.2
Kang, B.-H.3
-
30
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2P is here
-
6, December
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the storm and nugache trojans: P2P is here. In ;login: The USENIX Magazine, volume 32-6, December 2007.
-
(2007)
Login: The USENIX Magazine
, vol.32
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
31
-
-
41949115980
-
Detecting botnets with tight command and control
-
0
-
W. Strayer, R. Walsh, C. Livadas, and D. Lapsley. Detecting botnets with tight command and control. Local Computer Networks, Annual IEEE Conference on, 0:195-202, 2006.
-
(2006)
Local Computer Networks, Annual IEEE Conference on
, pp. 195-202
-
-
Strayer, W.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
32
-
-
85170000917
-
-
The Honeynet Project. Honeywall, 2009. https://projects.honeynet.org/ honeywall/.
-
(2009)
Honeywall
-
-
|