-
1
-
-
70349680893
-
A framework for understanding botnets
-
(Fukuoka, Japan), Fukuoka Institute of Technology, March
-
L. Leonard, S. Xu, and R. Sandhu, "A Framework for Understanding Botnets," in Proceedings of the International Workshop on Advances in Information Security (WAIS at ARES), (Fukuoka, Japan), Fukuoka Institute of Technology, March 2009.
-
(2009)
Proceedings of the International Workshop on Advances in Information Security (WAIS at ARES)
-
-
Leonard, L.1
Xu, S.2
Sandhu, R.3
-
2
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven
-
Berkeley, CA, USA, dialog correlation," USENIX Association
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: detecting malware infection through ids-driven dialog correlation," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, (Berkeley, CA, USA), pp. 12:1-12:16, USENIX Association, 2007.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 121-1216
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
3
-
-
33750376598
-
The nepenthes platform: An efficient approach to collect malware
-
Recent Advances in Intrusion Detection - 9th International Symposium, RAID 2006, Proceedings
-
P. Baecher, M. Koetter, M. Dornseif, and F. Freiling, "The nepenthes platform: An efficient approach to collect malware," in In Proceedings of the 9 th International Symposium on Recent Advances in Intrusion Detection (RAID, pp. 165-184, Springer, 2006. (Pubitemid 44617852)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4219
, pp. 165-184
-
-
Baecher, P.1
Koetter, M.2
Holz, T.3
Dornseif, M.4
Freiling, F.5
-
4
-
-
85093847546
-
Peerto- peer botnets: Overview and case study
-
(Berkeley, CA, USA), USENIX Association
-
J. B. Grizzard,V. Sharma,C . Nunnery,B . B. Kang,a nd D. Dagon," Peerto- peer botnets: overview and case study," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, (Berkeley, CA, USA), pp. 1-1, USENIX Association, 2007.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 1-1
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
5
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection,"
-
(Berkeley, CA, USA), USENIX Association
-
G. Gu, R. Perdisci, I. Zhang, and W. Lee, "Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection," in Proceedings of the 17th coriference on Security symposium, (Berkeley, CA, USA), pp. 139-154, USENIX Association, 2008.
-
(2008)
Proceedings of the 17th Coriference on Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, I.3
Lee, W.4
-
6
-
-
76649107873
-
Exploiting temporal persistence to detect covert botnet channels
-
(Berlin, Heidelberg), Springer-Verlag
-
F. Giroire, 1. Chandrashekar, N. Taft, E. Schooler, and D. Papagiannaki, "Exploiting temporal persistence to detect covert botnet channels," in Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09, (Berlin, Heidelberg), pp. 326-345, Springer-Verlag, 2009.
-
(2009)
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection, RAID '09
, pp. 326-345
-
-
Giroire, F.1
Chandrashekar, L.2
Taft, N.3
Schooler, E.4
Papagiannaki, D.5
-
7
-
-
67249165178
-
Botnet detection based on network behavior
-
(w. Lee, C. Wang, and D. Dagon, eds. ), Springer-Verlag
-
W. T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, "Botnet Detection Based on Network Behavior," in Botnet Detection: Countering the Largest Security Threat (w. Lee, C. Wang, and D. Dagon, eds. ), Springer-Verlag, 2007.
-
(2007)
Botnet Detection: Countering the Largest Security Threat
-
-
Strayer, W.T.1
Lapsley, D.2
Walsh, R.3
Livadas, C.4
-
8
-
-
78651429288
-
A p2p-botnet detection model and algorithms based on network streams analysis
-
D. Liu, Y. Li, Y. Hu, and Z. Liang, "A p2p-botnet detection model and algorithms based on network streams analysis," in Future Iriformation Technology and Management Engineering (FITME), 2010 International Conference on, vol. 1, pp. 55-58, 2010.
-
(2010)
Future Iriformation Technology and Management Engineering (FITME), 2010 International Conference
, vol.1
, pp. 55-58
-
-
Liu, D.1
Li, Y.2
Hu, Y.3
Liang, Z.4
-
9
-
-
63749095692
-
Detecting p2p botnets using a multi-phased flow model
-
Third International Conference on
-
S.-K. Noh,1 .-H. Dh,J .-S. Lee,B .-N. Noh,a nd H.-C. Jeong," Detecting p2p botnets using a multi-phased flow model," in Digital Society, 2009. ICDS '09. Third International Conference on, pp. 247-253, 2009.
-
Digital Society 2009. ICDS '09
, vol.2009
, pp. 247-253
-
-
Noh, S.-K.1
Dh, L.-H.2
Lee, J.-S.3
Noh, B.-N.4
Jeong, H.-C.5
-
10
-
-
67650280654
-
Online classification of network flows
-
(Washington, DC, USA), IEEE Computer Society
-
M. Tavallaee, W. Lu, and A. A. Ghorbani, "Online classification of network flows," in Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference, (Washington, DC, USA), pp. 78-85, IEEE Computer Society, 2009.
-
Proceedings of the 2009 Seventh Annual Communication Networks and Services Research Conference
, vol.2009
, pp. 78-85
-
-
Tavallaee, M.1
Lu, W.2
Ghorbani, A.A.3
-
11
-
-
70350786131
-
A new method of p2p traffic identification based on support vector machine at the host level
-
(Washington, DC, USA), IEEE Computer Society
-
F. Liu, Z. Li, and Q. Nie, "A new method of p2p traffic identification based on support vector machine at the host level," in Proceedings of the 2009 International Coriference on Iriformation Technology and Computer Science-Volume 02, (Washington, DC, USA), pp. 579-582, IEEE Computer Society, 2009.
-
Proceedings of the 2009 International Coriference on Iriformation Technology and Computer Science
, vol.2
, Issue.2009
, pp. 579-582
-
-
Liu, F.1
Li, Z.2
Nie, Q.3
-
12
-
-
79955115896
-
Better network traffic identification through the independent combination of techniques
-
July 2010
-
A. Callado, J. Kelner, D. Sadok, C. Alberto Kamienski, and S. Fernandes, "Better network traffic identification through the independent combination of techniques," J. Netw. Comput. Appl. , vol. 33, pp. 433- 446, July 2010.
-
J. Netw. Comput. Appl.
, vol.33
, pp. 433-446
-
-
Callado, A.1
Kelner, J.2
Sadok, D.3
Alberto Kamienski, C.4
Fernandes, S.5
-
13
-
-
70449999623
-
Detection of networks blocks used by the storm worm botnet
-
(New York, NY, USA), ACM
-
C. Wei, A. Sprague, and G. Warner, "Detection of networks blocks used by the storm worm botnet," in Proceedings of the 46th Annual Southeast Regional Conference on XX, ACM-SE 46, (New York, NY, USA), pp. 356-360, ACM, 2008.
-
(2008)
Proceedings of the 46th Annual Southeast Regional Conference on XX, ACM-SE
, vol.46
, pp. 356-360
-
-
Wei, C.1
Sprague, A.2
Warner, G.3
-
14
-
-
78549259165
-
On the analysis of the zeus botnet crimeware toolkit
-
H. Binsalleeh, T. Ormerod, A. Boukhtouta, P. Sinha, A. Youssef, M. Debbabi, and L. Wang, "On the Analysis of the Zeus Botnet Crimeware Toolkit," Proceedings of the 8th Annual Conference on Privacy, Security and Trust. , pp. 31-38, 2010.
-
(2010)
Proceedings of the 8th Annual Conference on Privacy, Security and Trust
, pp. 31-38
-
-
Binsalleeh, H.1
Ormerod, T.2
Boukhtouta, A.3
Sinha, P.4
Youssef, A.5
Debbabi, M.6
Wang, L.7
-
15
-
-
77950233357
-
Adaptive concept drift detection,"
-
A. Dries and U. Riickert, "Adaptive concept drift detection," Statistical Analy Data Mining, vol. 2, no. 5-6, pp. 311-327, 2009.
-
(2009)
Statistical Analy Data Mining
, vol.2
, Issue.5-6
, pp. 311-327
-
-
Dries, A.1
Riickert, U.2
-
16
-
-
0003957032
-
-
I. H. Witten, E. Frank, L. Trigg, M. Hall, G. Holmes, and S. J. Cunningham, "Weka: Practical machine learning tools and techniques with java implementations," 1999.
-
(1999)
Weka: Practical Machine Learning Tools and Techniques with Java Implementations
-
-
Witten, I.H.1
Frank, E.2
Trigg, L.3
Hall, M.4
Holmes, G.5
Cunningham, S.J.6
-
17
-
-
66549101951
-
Java-ML: A machine learning library
-
Apr.
-
T. Abeel, Y. Van de Peer, and Y. Saeys, "Java-ML: A Machine Learning Library," Journal of Machine Learning Research, vol. 10, pp. 931-934, Apr. 2009.
-
(2009)
Journal of Machine Learning Research
, vol.10
, pp. 931-934
-
-
Abeel, T.1
Van De Peer, Y.2
Saeys, Y.3
|