메뉴 건너뛰기




Volumn 4, Issue 10, 2011, Pages 1104-1113

Fighting botnets with economic uncertainty

Author keywords

Botnet; DDoS spam; Economics; Uncertainty; Virtual bots; Virtual machines

Indexed keywords

DECISION MAKING; ECONOMICS; PROFITABILITY; VIRTUAL MACHINE;

EID: 80053112937     PISSN: 19390114     EISSN: 19390122     Source Type: Journal    
DOI: 10.1002/sec.235     Document Type: Article
Times cited : (3)

References (31)
  • 1
    • 80053101784 scopus 로고    scopus 로고
    • Worldwide Infrastructure Security Report ARBOR NETWORK, Available at:
    • Worldwide Infrastructure Security Report vol. iii. 2007. ARBOR NETWORK, Available at:.
    • (2007) , vol.3
  • 2
    • 3042784584 scopus 로고    scopus 로고
    • Botnets: big and bigger
    • McCarty B. Botnets: big and bigger. IEEE Security & Privacy 2003; 1(4): 87-90.
    • (2003) IEEE Security & Privacy , vol.1 , Issue.4 , pp. 87-90
    • McCarty, B.1
  • 3
    • 80053097275 scopus 로고    scopus 로고
    • Criminals may overwhelm the web. BBC NEWS, 25 January. Available at:
    • Weber T. Criminals may overwhelm the web. BBC NEWS, 25 January 2007. Available at:.
    • (2007)
    • Weber, T.1
  • 4
    • 77952415099 scopus 로고    scopus 로고
    • An inquiry into the nature and causes of the wealth of internet miscreants. In Proceedings of the 14th ACM Conference on Computer and Communications Security, SESSION: Internet Security, Alexandria, Virginia
    • Franklin J, Paxson V, Perrig A, Savage S. An inquiry into the nature and causes of the wealth of internet miscreants. In Proceedings of the 14th ACM Conference on Computer and Communications Security, SESSION: Internet Security, Alexandria, Virginia, 2007; 375-388.
    • (2007) , pp. 375-388
    • Franklin, J.1    Paxson, V.2    Perrig, A.3    Savage, S.4
  • 5
    • 84947616598 scopus 로고    scopus 로고
    • Criminals in computer related crimes. Computer Crime Research Center. Available at:
    • Golubev V. Criminals in computer related crimes. Computer Crime Research Center. Available at:.
    • Golubev, V.1
  • 6
    • 36949007580 scopus 로고    scopus 로고
    • Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
    • Ford R, Gordon S. Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. In New Security Paradigms Workshop, 2006; 3-10.
    • (2006) New Security Paradigms Workshop , pp. 3-10
    • Ford, R.1    Gordon, S.2
  • 8
    • 80053128233 scopus 로고    scopus 로고
    • Modeling botnet propagation using time zones. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06), February
    • Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06), February 2006.
    • (2006)
    • Dagon, D.1    Zou, C.2    Lee, W.3
  • 12
    • 69249090883 scopus 로고    scopus 로고
    • Symantec global internet security threat report-trends for July-December 07
    • April
    • Turner D, Fossi M, Johnson E, et al. Symantec global internet security threat report-trends for July-December 07. Symantec Enterprise Security, vol. XIII, April 2008.
    • (2008) Symantec Enterprise Security , vol.13
    • Turner, D.1    Fossi, M.2    Johnson, E.3
  • 14
    • 15544363902 scopus 로고    scopus 로고
    • Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
    • Yau DKY, Lui JCS, Liang F, Yam Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Transactions on Networking 2005; 13(1): 29-42.
    • (2005) IEEE/ACM Transactions on Networking , vol.13 , Issue.1 , pp. 29-42
    • Yau, D.K.Y.1    Lui, J.C.S.2    Liang, F.3    Yam, Y.4
  • 15
    • 0035010963 scopus 로고    scopus 로고
    • On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of INFOCOM
    • Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of INFOCOM, 2001; 338-347.
    • (2001) , pp. 338-347
    • Park, K.1    Lee, H.2
  • 16
    • 0034775309 scopus 로고    scopus 로고
    • Hash-based IP traceback. In Proceedings of SIGCOMM
    • Snoeren A, Partridge C, Sanchez L, et al. Hash-based IP traceback. In Proceedings of SIGCOMM, 2001; 3-14.
    • (2001) , pp. 3-14
    • Snoeren, A.1    Partridge, C.2    Sanchez, L.3
  • 17
    • 0033650584 scopus 로고    scopus 로고
    • Practical network support for (IP) traceback. In Proceedings of SIGCOMM
    • Savage S, Wetherall D, Karlin AP, Anderson T. Practical network support for (IP) traceback. In Proceedings of SIGCOMM, 2000; 295-306.
    • (2000) , pp. 295-306
    • Savage, S.1    Wetherall, D.2    Karlin, A.P.3    Anderson, T.4
  • 18
    • 0037328484 scopus 로고    scopus 로고
    • Sustaining availability of web services under distributed denial of service attacks
    • Xu J, Lee W. Sustaining availability of web services under distributed denial of service attacks. Transactions on Computers 2003; 52(2): 195-208.
    • (2003) Transactions on Computers , vol.52 , Issue.2 , pp. 195-208
    • Xu, J.1    Lee, W.2
  • 19
    • 17644411571 scopus 로고    scopus 로고
    • Hop-count filtering: an effective defense against spoofed DoS traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security
    • Jin C, Wang H, Shin K. Hop-count filtering: an effective defense against spoofed DoS traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003; 30-41.
    • (2003) , pp. 30-41
    • Jin, C.1    Wang, H.2    Shin, K.3
  • 20
    • 4143081502 scopus 로고    scopus 로고
    • A covariance analysis model for DDoS attack detection. In Proceedings of the IEEE International Conference on Communications (ICC), June
    • Jin S, Yeung D. A covariance analysis model for DDoS attack detection. In Proceedings of the IEEE International Conference on Communications (ICC), vol. 4, June 2004; 1882-1886.
    • (2004) , vol.4 , pp. 1882-1886
    • Jin, S.1    Yeung, D.2
  • 21
    • 80053098918 scopus 로고    scopus 로고
    • Botnet economics: uncertainty matters. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June
    • Li Z, Liao Q, Striegel A. Botnet economics: uncertainty matters. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June 2008.
    • (2008)
    • Li, Z.1    Liao, Q.2    Striegel, A.3
  • 22
    • 25844529486 scopus 로고    scopus 로고
    • Pollution in p2p file sharing systems. In Proceedings of IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, March, 1174-1185.
    • Liang J, Kumar R, Xi Y, Ross KW. Pollution in p2p file sharing systems. In Proceedings of IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies., vol. 2, 13-17 March 2005; 1174-1185.
    • (2005) , vol.2 , pp. 13-17
    • Liang, J.1    Kumar, R.2    Xi, Y.3    Ross, K.W.4
  • 23
    • 80053104452 scopus 로고    scopus 로고
    • Computer scientist fights threat of 'botnets'. Science Daily, 10 November. Available at:
    • Computer scientist fights threat of 'botnets'. Science Daily, 10 November 2007. Available at:.
    • (2007)
  • 24
    • 0004066308 scopus 로고
    • Hart, Schaffner & Marx; Houghton Mifflin Company: Boston, MA
    • Knight FH. Risk, Uncertainty, and Profit. Hart, Schaffner & Marx; Houghton Mifflin Company: Boston, MA, 1921.
    • (1921) Risk, Uncertainty, and Profit
    • Knight, F.H.1
  • 25
    • 0000438997 scopus 로고
    • Uncertainty, evolution, and economic theory
    • 1950.
    • Alchian AA. Uncertainty, evolution, and economic theory. The Journal of Political Economy (JSTOR) 1950; 58(3): 211-221. 1950.
    • (1950) The Journal of Political Economy (JSTOR) , vol.58 , Issue.3 , pp. 211-221
    • Alchian, A.A.1
  • 27
    • 80053096673 scopus 로고    scopus 로고
    • Know your enemy: tracking botnets. The Honeynet Project, Available at:
    • Know your enemy: tracking botnets. The Honeynet Project, 2008. Available at:.
    • (2008)
  • 28
    • 33845590556 scopus 로고    scopus 로고
    • Honeypot-aware advanced botnet construction and maintenance. In International Conference on Dependable Systems and Networks, Philadelphia, PA, June; 199-208.
    • Zou C, Cunningham R. Honeypot-aware advanced botnet construction and maintenance. In International Conference on Dependable Systems and Networks, Philadelphia, PA, 25-28 June 2006; 199-208.
    • (2006) , pp. 25-28
    • Zou, C.1    Cunningham, R.2
  • 29
    • 34547399387 scopus 로고    scopus 로고
    • A multifaceted approach to understanding the botnet phenomenon. In 6th ACM SIGCOMM Conference on Internet Measurment, SESSION: Security and Privacy
    • Rajab MA, Zarfoss J, Monrose F, Terzin A. A multifaceted approach to understanding the botnet phenomenon. In 6th ACM SIGCOMM Conference on Internet Measurment, SESSION: Security and Privacy, 2006; 41-52.
    • (2006) , pp. 41-52
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzin, A.4
  • 30
    • 85000701895 scopus 로고    scopus 로고
    • My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 5.
    • Rajab MA, Zarfoss J, Monrose F, Terzis A. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 2007; 5.
    • (2007)
    • Rajab, M.A.1    Zarfoss, J.2    Monrose, F.3    Terzis, A.4
  • 31
    • 80053097478 scopus 로고    scopus 로고
    • Security investment (failures) in five economic environments: a comparison of homogeneous and heterogeneous user agents. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June
    • Grossklags J, Christin N, Chuang J. Security investment (failures) in five economic environments: a comparison of homogeneous and heterogeneous user agents. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June 2008.
    • (2008)
    • Grossklags, J.1    Christin, N.2    Chuang, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.