-
1
-
-
56649085023
-
Antisocial networks: Turning a social network into a botnet
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. Springer, Heidelberg
-
Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K., Markatos, E.: Antisocial networks: Turning a social network into a botnet. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 146-160. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 146-160
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Antoniades, D.4
Ioannidis, S.5
Anagnostakis, K.6
Markatos, E.7
-
2
-
-
84855680528
-
-
Technical report, Trend Micro
-
Balatzar, J., Costoya, J., Flores, R.: The real face of koobface: The largest web 2.0 botnet explained. Technical report, Trend Micro (2009)
-
(2009)
The Real Face of Koobface: The Largest Web 2.0 Botnet Explained
-
-
Balatzar, J.1
Costoya, J.2
Flores, R.3
-
6
-
-
38149070087
-
Hit-list worm detection and bot identification in large networks using protocol graphs
-
Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. Springer, Heidelberg
-
Collins, M., Reiter, M.: Hit-list worm detection and bot identification in large networks using protocol graphs. In: Kruegel, C., Lippmann, R., Clark, A. (eds.) RAID 2007. LNCS, vol. 4637, pp. 276-295. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4637
, pp. 276-295
-
-
Collins, M.1
Reiter, M.2
-
7
-
-
42149173109
-
Using uncleanliness to predict future botnet addresses
-
Collins, M., Shimeall, T., Faber, S., Janies, J., Weaver, R., De Shon, M., Kadane, J.: Using uncleanliness to predict future botnet addresses. In: Proc. IMC '07 (2007)
-
(2007)
Proc. IMC '07
-
-
Collins, M.1
Shimeall, T.2
Faber, S.3
Janies, J.4
Weaver, R.5
De Shon, M.6
Kadane, J.7
-
8
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cooke, E., Jahanian, F., McPherson, D.: The zombie roundup: understanding, detecting, and disrupting botnets. In: Proc. SRUTI '05 (2005)
-
(2005)
Proc. SRUTI '05
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
9
-
-
79956311697
-
-
Microsoft Corporation. Network monitor 3.3, http://go.microsoft.com/ fwlink/?LinkID=103158&clcid=0x409
-
Network Monitor 3.3
-
-
-
11
-
-
79956298054
-
A taxonomy of botnet structures
-
Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007, Springer, Heidelberg
-
Dagon, D., Gu, G., Lee, C., Lee, W.: A taxonomy of botnet structures. In: Choi, L., Paek, Y., Cho, S. (eds.) ACSAC 2007. LNCS, vol. 4697, Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4697
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
Lee, W.4
-
14
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by irc nickname evaluation
-
Goebel, J., Holz, T.: Rishi: identify bot contaminated hosts by irc nickname evaluation. In: Proc. HotBots '07 (2007)
-
(2007)
Proc. HotBots '07
-
-
Goebel, J.1
Holz, T.2
-
15
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets: overview and case study. In: Proc. HotBots '07 (2007)
-
(2007)
Proc. HotBots '07
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
16
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Security '08 (2008)
-
(2008)
Security '08
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
17
-
-
85061529860
-
BotHunter: Detecting malware infection through ids-driven dialog correlation
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting malware infection through ids-driven dialog correlation. In: USENIX Security '07 (2007)
-
(2007)
USENIX Security '07
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
18
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: Proc. NDSS '08 (2008)
-
(2008)
Proc. NDSS '08
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
19
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Holz, T., Steiner, M., Dahl, F., Biersack, E., Freiling, F.: Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In: LEET '08 (2008)
-
(2008)
LEET '08
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
20
-
-
84908346958
-
Rb-seeker: Auto-detection of redirection botnets
-
Hu, X., Knysz, M., Shin, K.G.: Rb-seeker: Auto-detection of redirection botnets. In: Proc. NDSS '09 (2009)
-
(2009)
Proc. NDSS '09
-
-
Hu, X.1
Knysz, M.2
Shin, K.G.3
-
21
-
-
79960808450
-
-
Technical report, Finjan Software Inc.
-
Finjan Software Inc. Web security trends report q4 2007. Technical report, Finjan Software Inc. (2007), http://www.finjan.com/Content.aspx?id=827
-
(2007)
Web Security Trends Report q4 2007
-
-
-
22
-
-
85076932663
-
Studying spamming botnets using botlab
-
John, J., Moshchuk, A., Gribble, S., Krishnamurthy, A.: Studying spamming botnets using botlab. In: Proc. NSDI '09 (2009)
-
(2009)
Proc. NSDI '09
-
-
John, J.1
Moshchuk, A.2
Gribble, S.3
Krishnamurthy, A.4
-
24
-
-
78649242902
-
Identification of file infecting viruses through detection of self-reference replication
-
Morales, J.A., Clarke, P.J., Deng, Y., Kibria, B.G.: Identification of file infecting viruses through detection of self-reference replication. Journal in Computer Virology (2008)
-
(2008)
Journal in Computer Virology
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Kibria, B.G.4
-
26
-
-
58149161861
-
As the net churns: Fast-flux botnet observations
-
Nazario, J., Holz, T.: As the net churns: Fast-flux botnet observations. In: Proc. MALWARE '08 (2008)
-
(2008)
Proc. MALWARE '08
-
-
Nazario, J.1
Holz, T.2
-
29
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A multifaceted approach to understanding the botnet phenomenon. In: Proc. IMC '06 (2006)
-
(2006)
Proc. IMC '06
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
30
-
-
79956314807
-
Evaluating email's feasibility for botnet command and control
-
Singh, K., Srivastava, A., Giffin, J., Lee, W.: Evaluating email's feasibility for botnet command and control. In: Proc. DSN
-
Proc. DSN
-
-
Singh, K.1
Srivastava, A.2
Giffin, J.3
Lee, W.4
-
31
-
-
37849037807
-
Characterizing bots' remote control behavior
-
Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. Springer, Heidelberg
-
Stinson, E., Mitchell, J.C.: Characterizing bots' remote control behavior. In: Hämmerli, B.M., Sommer, R. (eds.) DIMVA 2007. LNCS, vol. 4579, pp. 89-108. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4579
, pp. 89-108
-
-
Stinson, E.1
Mitchell, J.C.2
-
34
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Xie, Y., Yu, F., Achan, K., Panigrahy, R., Hulten, G., Osipkov, I.: Spamming botnets: signatures and characteristics. In: Proc. SIGCOMM '08, pp. 171-182 (2008)
-
(2008)
Proc. SIGCOMM '08
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
35
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Zhao, Y., Xie, Y., Yu, F., Ke, Q., Yu, Y., Chen, Y., Gillum, E.: Botgraph: large scale spamming botnet detection. In: Proc. NSDI '09 (2009)
-
(2009)
Proc. NSDI '09
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
-
36
-
-
79957654482
-
Using failure information analysis to detect enterprise zombies
-
Zhu, Z., Yegneswaran, V., Chen, Y.: Using failure information analysis to detect enterprise zombies. In: Proc. Securecomm '09 (2009)
-
(2009)
Proc. Securecomm '09
-
-
Zhu, Z.1
Yegneswaran, V.2
Chen, Y.3
-
37
-
-
85084095135
-
Characterizing botnets from email spam records
-
Zhuang, L., Dunagan, J., Simon, D., Wang, H., Osipkov, I., Hulten, G., Tygar, J.: Characterizing botnets from email spam records. In: Proc. LEET '08 (2008)
-
(2008)
Proc. LEET '08
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.3
Wang, H.4
Osipkov, I.5
Hulten, G.6
Tygar, J.7
|