-
1
-
-
80053101784
-
-
Worldwide Infrastructure Security Report ARBOR NETWORK, Available at:
-
Worldwide Infrastructure Security Report vol. iii. 2007. ARBOR NETWORK, Available at:.
-
(2007)
, vol.3
-
-
-
2
-
-
3042784584
-
Botnets: big and bigger
-
McCarty B. Botnets: big and bigger. IEEE Security & Privacy 2003; 1(4): 87-90.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 87-90
-
-
McCarty, B.1
-
3
-
-
80053097275
-
-
Criminals may overwhelm the web. BBC NEWS, 25 January. Available at:
-
Weber T. Criminals may overwhelm the web. BBC NEWS, 25 January 2007. Available at:.
-
(2007)
-
-
Weber, T.1
-
4
-
-
77952415099
-
-
An inquiry into the nature and causes of the wealth of internet miscreants. In Proceedings of the 14th ACM Conference on Computer and Communications Security, SESSION: Internet Security, Alexandria, Virginia
-
Franklin J, Paxson V, Perrig A, Savage S. An inquiry into the nature and causes of the wealth of internet miscreants. In Proceedings of the 14th ACM Conference on Computer and Communications Security, SESSION: Internet Security, Alexandria, Virginia, 2007; 375-388.
-
(2007)
, pp. 375-388
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
5
-
-
84947616598
-
-
Criminals in computer related crimes. Computer Crime Research Center. Available at:
-
Golubev V. Criminals in computer related crimes. Computer Crime Research Center. Available at:.
-
-
-
Golubev, V.1
-
6
-
-
36949007580
-
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
-
Ford R, Gordon S. Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. In New Security Paradigms Workshop, 2006; 3-10.
-
(2006)
New Security Paradigms Workshop
, pp. 3-10
-
-
Ford, R.1
Gordon, S.2
-
8
-
-
80053128233
-
-
Modeling botnet propagation using time zones. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06), February
-
Dagon D, Zou C, Lee W. Modeling botnet propagation using time zones. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS'06), February 2006.
-
(2006)
-
-
Dagon, D.1
Zou, C.2
Lee, W.3
-
9
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
Cambridge, MA, 10 April; 1.
-
Grizzard JB, Sharma V, Nunnery C, Kang BB, Dagon D. Peer-to-peer botnets: Overview and case study. In First Workshop on Hot Topics in Understanding Botnets (HotBots07), Cambridge, MA, 10 April 2007; 1.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots07)
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
10
-
-
84888402098
-
The zombie roundup: understanding, detecting, and disrupting botnets
-
Cooke E, Jahanian F, McPherson D. The zombie roundup: understanding, detecting, and disrupting botnets. In Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), 2005; 39-44.
-
(2005)
Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
11
-
-
41949089847
-
An advanced hybrid peer-to-peer botnet
-
Cambridge, MA, 10 April; 2.
-
Wang P, Sparks S, Zou CC. An advanced hybrid peer-to-peer botnet. In First Workshop on Hot Topics in Understanding Botnets (HotBots07), Cambridge, MA, 10 April 2007; 2.
-
(2007)
First Workshop on Hot Topics in Understanding Botnets (HotBots07)
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
12
-
-
69249090883
-
Symantec global internet security threat report-trends for July-December 07
-
April
-
Turner D, Fossi M, Johnson E, et al. Symantec global internet security threat report-trends for July-December 07. Symantec Enterprise Security, vol. XIII, April 2008.
-
(2008)
Symantec Enterprise Security
, vol.13
-
-
Turner, D.1
Fossi, M.2
Johnson, E.3
-
13
-
-
4544272175
-
Controlling high bandwidth aggregates in the network
-
Mahajan R, Bellovin S, Floyd S, Ioannidis J, Paxon V, Shenker S. Controlling high bandwidth aggregates in the network. ACM SIGCOMM Computer Communication Review 2002; 32(3): 62-73.
-
(2002)
ACM SIGCOMM Computer Communication Review
, vol.32
, Issue.3
, pp. 62-73
-
-
Mahajan, R.1
Bellovin, S.2
Floyd, S.3
Ioannidis, J.4
Paxon, V.5
Shenker, S.6
-
14
-
-
15544363902
-
Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles
-
Yau DKY, Lui JCS, Liang F, Yam Y. Defending against distributed denial-of-service attacks with max-min fair server-centric router throttles. IEEE/ACM Transactions on Networking 2005; 13(1): 29-42.
-
(2005)
IEEE/ACM Transactions on Networking
, vol.13
, Issue.1
, pp. 29-42
-
-
Yau, D.K.Y.1
Lui, J.C.S.2
Liang, F.3
Yam, Y.4
-
15
-
-
0035010963
-
-
On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of INFOCOM
-
Park K, Lee H. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack. In Proceedings of INFOCOM, 2001; 338-347.
-
(2001)
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
16
-
-
0034775309
-
-
Hash-based IP traceback. In Proceedings of SIGCOMM
-
Snoeren A, Partridge C, Sanchez L, et al. Hash-based IP traceback. In Proceedings of SIGCOMM, 2001; 3-14.
-
(2001)
, pp. 3-14
-
-
Snoeren, A.1
Partridge, C.2
Sanchez, L.3
-
17
-
-
0033650584
-
-
Practical network support for (IP) traceback. In Proceedings of SIGCOMM
-
Savage S, Wetherall D, Karlin AP, Anderson T. Practical network support for (IP) traceback. In Proceedings of SIGCOMM, 2000; 295-306.
-
(2000)
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.P.3
Anderson, T.4
-
18
-
-
0037328484
-
Sustaining availability of web services under distributed denial of service attacks
-
Xu J, Lee W. Sustaining availability of web services under distributed denial of service attacks. Transactions on Computers 2003; 52(2): 195-208.
-
(2003)
Transactions on Computers
, vol.52
, Issue.2
, pp. 195-208
-
-
Xu, J.1
Lee, W.2
-
19
-
-
17644411571
-
-
Hop-count filtering: an effective defense against spoofed DoS traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security
-
Jin C, Wang H, Shin K. Hop-count filtering: an effective defense against spoofed DoS traffic. In Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003; 30-41.
-
(2003)
, pp. 30-41
-
-
Jin, C.1
Wang, H.2
Shin, K.3
-
20
-
-
4143081502
-
-
A covariance analysis model for DDoS attack detection. In Proceedings of the IEEE International Conference on Communications (ICC), June
-
Jin S, Yeung D. A covariance analysis model for DDoS attack detection. In Proceedings of the IEEE International Conference on Communications (ICC), vol. 4, June 2004; 1882-1886.
-
(2004)
, vol.4
, pp. 1882-1886
-
-
Jin, S.1
Yeung, D.2
-
21
-
-
80053098918
-
-
Botnet economics: uncertainty matters. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June
-
Li Z, Liao Q, Striegel A. Botnet economics: uncertainty matters. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June 2008.
-
(2008)
-
-
Li, Z.1
Liao, Q.2
Striegel, A.3
-
22
-
-
25844529486
-
-
Pollution in p2p file sharing systems. In Proceedings of IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, March, 1174-1185.
-
Liang J, Kumar R, Xi Y, Ross KW. Pollution in p2p file sharing systems. In Proceedings of IEEE INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies., vol. 2, 13-17 March 2005; 1174-1185.
-
(2005)
, vol.2
, pp. 13-17
-
-
Liang, J.1
Kumar, R.2
Xi, Y.3
Ross, K.W.4
-
23
-
-
80053104452
-
-
Computer scientist fights threat of 'botnets'. Science Daily, 10 November. Available at:
-
Computer scientist fights threat of 'botnets'. Science Daily, 10 November 2007. Available at:.
-
(2007)
-
-
-
24
-
-
0004066308
-
-
Hart, Schaffner & Marx; Houghton Mifflin Company: Boston, MA
-
Knight FH. Risk, Uncertainty, and Profit. Hart, Schaffner & Marx; Houghton Mifflin Company: Boston, MA, 1921.
-
(1921)
Risk, Uncertainty, and Profit
-
-
Knight, F.H.1
-
25
-
-
0000438997
-
Uncertainty, evolution, and economic theory
-
1950.
-
Alchian AA. Uncertainty, evolution, and economic theory. The Journal of Political Economy (JSTOR) 1950; 58(3): 211-221. 1950.
-
(1950)
The Journal of Political Economy (JSTOR)
, vol.58
, Issue.3
, pp. 211-221
-
-
Alchian, A.A.1
-
27
-
-
80053096673
-
-
Know your enemy: tracking botnets. The Honeynet Project, Available at:
-
Know your enemy: tracking botnets. The Honeynet Project, 2008. Available at:.
-
(2008)
-
-
-
28
-
-
33845590556
-
-
Honeypot-aware advanced botnet construction and maintenance. In International Conference on Dependable Systems and Networks, Philadelphia, PA, June; 199-208.
-
Zou C, Cunningham R. Honeypot-aware advanced botnet construction and maintenance. In International Conference on Dependable Systems and Networks, Philadelphia, PA, 25-28 June 2006; 199-208.
-
(2006)
, pp. 25-28
-
-
Zou, C.1
Cunningham, R.2
-
29
-
-
34547399387
-
-
A multifaceted approach to understanding the botnet phenomenon. In 6th ACM SIGCOMM Conference on Internet Measurment, SESSION: Security and Privacy
-
Rajab MA, Zarfoss J, Monrose F, Terzin A. A multifaceted approach to understanding the botnet phenomenon. In 6th ACM SIGCOMM Conference on Internet Measurment, SESSION: Security and Privacy, 2006; 41-52.
-
(2006)
, pp. 41-52
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzin, A.4
-
30
-
-
85000701895
-
-
My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 5.
-
Rajab MA, Zarfoss J, Monrose F, Terzis A. My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets, Cambridge, MA, 2007; 5.
-
(2007)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
31
-
-
80053097478
-
-
Security investment (failures) in five economic environments: a comparison of homogeneous and heterogeneous user agents. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June
-
Grossklags J, Christin N, Chuang J. Security investment (failures) in five economic environments: a comparison of homogeneous and heterogeneous user agents. In Proceedings of Workshop on the Economics of Information Security (WEIS '08), Hanover, New Hampshire, 25-28 June 2008.
-
(2008)
-
-
Grossklags, J.1
Christin, N.2
Chuang, J.3
|