-
4
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Proceedings of the 10th annual conference on Internet measurement - IMC '10, New York, New York, USA, November 2010, p. 48.
-
Proceedings of the 10th Annual Conference on Internet Measurement - IMC '10, New York, New York, USA, November 2010
, pp. 48
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.N.3
Ranjan, S.4
-
6
-
-
80053942235
-
-
[Online]. Available
-
F. Leder and T.Werner. (2011) Containing conficker. [Online]. Available: http://net.cs.uni-bonn.de/uploads/media/c-domains-april2009.zip
-
(2011)
Containing Conficker
-
-
Leder, F.1
Werner, T.2
-
7
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive DNS traces
-
December
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive DNS traces," 2009 Annual Computer Security Applications Conference, pp. 311-320, December 2009.
-
(2009)
2009 Annual Computer Security Applications Conference
, pp. 311-320
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
8
-
-
58149145577
-
Measuring and detecting fast-flux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and detecting fast-flux service networks," in MALWARE 2008. 3rd International Conference on Malicious and Unwanted Software, 2008, 2008, pp. 24-31.
-
(2008)
MALWARE 2008. 3rd International Conference on Malicious and Unwanted Software, 2008
, pp. 24-31
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
9
-
-
80053977696
-
-
Dragon Research Group. [Online]. Available
-
Dragon Research Group. (2011) Team cymru. [Online]. Available: http://www.team-cymru.org/Services/ip-to-asn.html
-
(2011)
-
-
-
10
-
-
80053993627
-
-
University Computing
-
H. Xiong, P. Malhotra, D. Stefan, C. Wu, and D. Yao, "User-assisted host-based detection of outbound malware traffic," University Computing.
-
User-assisted Host-based Detection of Outbound Malware Traffic
-
-
Xiong, H.1
Malhotra, P.2
Stefan, D.3
Wu, C.4
Yao, D.5
-
11
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: clustering analysis of network traffic for protocol- and structure-independent botnet detection," in Proceedings of the 17th conference on Security symposium, 2008, pp. 139-154.
-
Proceedings of the 17th Conference on Security Symposium, 2008
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
12
-
-
79957629730
-
Identifying suspicious activities through DNS failure graph analysis
-
N. Jiang, J. Cao, Y. Jin, L. E. Li, and Z.-l. Zhang, "Identifying suspicious activities through DNS failure graph analysis," in IEEE International Conference on Network Protocols (IEEE ICNP'10), 2010, pp. 144-153.
-
IEEE International Conference on Network Protocols (IEEE ICNP'10), 2010
, pp. 144-153
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
Li, L.E.4
Zhang, Z.-L.5
-
13
-
-
80053965559
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists : Learning to detect malicious web sites from suspicious urls," World Wide Web Internet And Web Information Systems, 2009.
-
(2009)
World Wide Web Internet and Web Information Systems
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
14
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming botnets: Signatures and characteristics," in ACM SIGCOMM Computer Communication Review, 2008.
-
(2008)
ACM SIGCOMM Computer Communication Review
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
15
-
-
79956014847
-
Boosting the scalability of botnet detection using adaptive traffic sampling
-
ACM
-
J. Zhang, X. Luo, R. Perdisci, G. Gu, W. Lee, and N. Feamster, "Boosting the scalability of botnet detection using adaptive traffic sampling," in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security. ACM, 2011, pp. 124-134.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
, pp. 124-134
-
-
Zhang, J.1
Luo, X.2
Perdisci, R.3
Gu, G.4
Lee, W.5
Feamster, N.6
-
16
-
-
0009304541
-
A bayesian approach to filtering junk e-mail
-
M. Sahami, S. Dumais, D. Heckerman, and E. Horvitz, "A bayesian approach to filtering junk e-mail," in AAAI'98 Workshop on Learning for Text Categorization, 1998.
-
AAAI'98 Workshop on Learning for Text Categorization, 1998
-
-
Sahami, M.1
Dumais, S.2
Heckerman, D.3
Horvitz, E.4
-
17
-
-
33646037321
-
Alarm clustering for intrusion detection systems in computer networks
-
June
-
R. Perdisci, G. Giacinto, and F. Roli, "Alarm clustering for intrusion detection systems in computer networks," Engineering Applications of Artificial Intelligence, vol. 19, no. 4, pp. 429-438, June 2006.
-
(2006)
Engineering Applications of Artificial Intelligence
, vol.19
, Issue.4
, pp. 429-438
-
-
Perdisci, R.1
Giacinto, G.2
Roli, F.3
-
18
-
-
80053976084
-
-
[Online]. Available
-
Google. (2011) Top 1000 sites - doubleclick ad planner. [Online]. Available: http://www.google.com/adplanner/static/top1000/
-
(2011)
Top 1000 Sites - Doubleclick Ad Planner
-
-
-
19
-
-
80053946886
-
-
abuse.ch. (2011) [Online]. Available
-
abuse.ch. (2011) Zeus monitor. [Online]. Available: https://zeustracker. abuse.ch/monitor.php?filter=level5
-
Zeus Monitor
-
-
-
20
-
-
80053935742
-
-
[Online]. Available
-
-. (2011) Spyeye monitor. [Online]. Available: https://spyeyetracker. abuse.ch/monitor.php?filter=level5
-
(2011)
Spyeye Monitor
-
-
-
21
-
-
80053961728
-
-
[Online]. Available
-
-. (2011) Fastflux tracker. [Online]. Available: http://dnsbl.abuse.ch/ fastfluxtracker.php
-
(2011)
Fastflux Tracker
-
-
-
22
-
-
60349090690
-
-
[Online]. Available
-
P. Royal. (2008) On the kraken and bobax botnets. [Online]. Available: http://www.damballa.com/downloads/r-pubs/Kraken-Response.pdf
-
(2008)
On the Kraken and Bobax Botnets
-
-
Royal, P.1
-
23
-
-
80053932520
-
-
[Online]. Available
-
MalwareURL. (2011) Malwareurl. [Online]. Available: http://www. malwareurl.com/
-
(2011)
Malwareurl
-
-
-
24
-
-
80053943884
-
-
See5/c5.0. [Online]. Available
-
Rulequest Research. (2011) See5/c5.0. [Online]. Available: http://www.rulequest.com/see5-info.html
-
(2011)
-
-
|