-
1
-
-
53349109623
-
Evaluating Email's Feasibility for Botnet Command and Control
-
USA
-
K. Singh, A. Srivastava, J. Giffin, and W. Lee, "Evaluating Email's Feasibility for Botnet Command and Control, " Proc. 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), USA, 2008, pp. 376-385.
-
(2008)
Proc. 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008)
, pp. 376-385
-
-
Singh, K.1
Srivastava, A.2
Giffin, J.3
Lee, W.4
-
3
-
-
75249105893
-
-
WIRED MAGZINE: ISSUE 15.09 [Online], Available
-
J. Davis, "Hackers take down the most wired country in europe, " WIRED MAGZINE: ISSUE 15.09 [Online], 2007, Available: http://www.wired.com/politics/security/magazine/15-09/ff_estonia.
-
(2007)
Hackers take down the most wired country in europe
-
-
Davis, J.1
-
9
-
-
17844404852
-
Malicious bots threaten network security
-
D. Geer, "Malicious bots threaten network security, " IEEE Computer, vol. 38, no. 1, pp. 18-20, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.1
, pp. 18-20
-
-
Geer, D.1
-
11
-
-
67349187725
-
Information fusion in computer security
-
G. Giorgio, R. Fabio, and S. Carlo, "Information fusion in computer security, " Information Fusion, vol. 10, no. 4, pp. 272-273, 2009.
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 272-273
-
-
Giorgio, G.1
Fabio, R.2
Carlo, S.3
-
12
-
-
41949123110
-
Research and Development of Botnets
-
J. Zhuge, X. Han, Y. Zhou, Z. Ye, and W. Zou, "Research and Development of Botnets, " Journal of Software, vol. 19, no. 3, pp. 702-715, 2008.
-
(2008)
Journal of Software
, vol.19
, Issue.3
, pp. 702-715
-
-
Zhuge, J.1
Han, X.2
Zhou, Y.3
Ye, Z.4
Zou, W.5
-
13
-
-
39749168868
-
Discover and track botnets
-
Beijing
-
J. Zhuge, X. Han, Z. Ye, and W. Zou, "Discover and track botnets, " Proc. Chinese Symposium on Network and Information Security (NetSec), Beijing, 2005.
-
(2005)
Proc. Chinese Symposium on Network and Information Security (NetSec)
-
-
Zhuge, J.1
Han, X.2
Ye, Z.3
Zou, W.4
-
14
-
-
71949131077
-
Advances in the Honeypot and Honeynet Technologies
-
J. Cheng, J. Yin, Y. Liu, and J. Zhong, "Advances in the Honeypot and Honeynet Technologies, " Journal of Computer Research and Development, vol. 45, no. 1, pp. 375-378, 2008.
-
(2008)
Journal of Computer Research and Development
, vol.45
, Issue.1
, pp. 375-378
-
-
Cheng, J.1
Yin, J.2
Liu, Y.3
Zhong, J.4
-
15
-
-
85061529860
-
BotHunter: Detecting malware infection through idsdriven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "BotHunter: Detecting malware infection through idsdriven dialog correlation, " Proc. 16th USENIX Security Symposium (Security' 07), 2007.
-
(2007)
Proc. 16th USENIX Security Symposium (Security' 07)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
16
-
-
85080378133
-
An algorithm for anomalybased Botnet detection
-
J. R. Binkley and S. Singh, "An algorithm for anomalybased Botnet detection, " Proc. USENIX SRUTI'06, 2006, pp. 43-48.
-
(2006)
Proc. USENIX SRUTI'06
, pp. 43-48
-
-
Binkley, J.R.1
Singh, S.2
-
17
-
-
60349104800
-
The activity analysis of malicious http-based botnets using degree of periodic repeatability
-
J. Lee, H. Jeong, J. Park, M. Kim, and B. Noh, "The activity analysis of malicious http-based botnets using degree of periodic repeatability, " Proc. 2008 International Conference on Security Technology, 2008, pp. 83-86.
-
(2008)
Proc. 2008 International Conference on Security Technology
, pp. 83-86
-
-
Lee, J.1
Jeong, H.2
Park, J.3
Kim, M.4
Noh, B.5
-
18
-
-
38049035805
-
Botnet detection by monitoring group activities in DNS traffic
-
Aizu-Wakamatsu City, Japan
-
H. Choi, H. Lee, and H. Lee, "Botnet detection by monitoring group activities in DNS traffic, " Proc. 7th IEEE International Conference on Computer and Information Technology, Aizu-Wakamatsu City, Japan, 2007.
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology
-
-
Choi, H.1
Lee, H.2
Lee, H.3
-
21
-
-
70349655439
-
Detecting Spam Zombies by Monitoring Outgoing Messages
-
Brazil
-
Z. Duan, P. Chen, F. Sanchez, Y. Dong, M. Stephenson, and J. Barker, "Detecting Spam Zombies by Monitoring Outgoing Messages, " Proc. IEEE INFOCOM'09 Conference, Brazil, 2009.
-
(2009)
Proc. IEEE INFOCOM'09 Conference
-
-
Duan, Z.1
Chen, P.2
Sanchez, F.3
Dong, Y.4
Stephenson, M.5
Barker, J.6
-
24
-
-
58449125799
-
A holistic perspective on understanding and breaking botnets: Challenges and countermeasures
-
Z. Zhang and Y. Kadobayashi, "A holistic perspective on understanding and breaking botnets: Challenges and countermeasures, " Journal of the National Institute of Information and Communications Technology, vol. 55, no. 2, pp. 43-59, 2008.
-
(2008)
Journal of the National Institute of Information and Communications Technology
, vol.55
, Issue.2
, pp. 43-59
-
-
Zhang, Z.1
Kadobayashi, Y.2
-
25
-
-
77951130249
-
Architecture for applying data mining and visualization on network flow for botnet traffic detection
-
Cairo, Egypt
-
S. Alireza, F. Maryam, and A. Rodina, "Architecture for applying data mining and visualization on network flow for botnet traffic detection, " Proc. 2009 International Conference on Computer Technology and Development, Cairo, Egypt, 2009.
-
(2009)
Proc. 2009 International Conference on Computer Technology and Development
-
-
Alireza, S.1
Maryam, F.2
Rodina, A.3
-
27
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol-and structureindependent Botnet detection
-
USA
-
G. Gu, J. Zhang, and R. Perdisci, "Botminer: Clustering analysis of network traffic for protocol-and structureindependent Botnet detection, " Proc. 17th USENIX Security Symposium (Security'08), USA, 2008.
-
(2008)
Proc. 17th USENIX Security Symposium (Security'08)
-
-
Gu, G.1
Zhang, J.2
Perdisci, R.3
-
29
-
-
67349098438
-
A special issue on information fusion in computer security
-
B.V. Dasarathy, "A special issue on information fusion in computer security, " Information Fusion, vol. 10, no. 4, pp. 271, 2009.
-
(2009)
Information Fusion
, vol.10
, Issue.4
, pp. 271
-
-
Dasarathy, B.V.1
-
33
-
-
0000516376
-
Upper and lower probabilities induced by a multivalued mapping
-
A.P. Dempster, "Upper and lower probabilities induced by a multivalued mapping, " Ann. Math. Statist., 1967, pp. 325-339.
-
(1967)
Ann. Math. Statist.
, pp. 325-339
-
-
Dempster, A.P.1
-
35
-
-
78049486291
-
Dempster-Shafer for Anomaly Detection
-
Las Vegas, USA
-
Qi Chen, Uwe Aickelin, "Dempster-Shafer for Anomaly Detection, " Proc. the International Conference on Data Mining (DMIN 2006), Las Vegas, USA, 2006, pp. 232-238.
-
(2006)
Proc. the International Conference on Data Mining (DMIN 2006)
, pp. 232-238
-
-
Chen, Q.1
Aickelin, U.2
-
36
-
-
40949153949
-
Research on Security Information Fusion from Multiple Heterogeneous Sensors
-
L. Ma, L. Yang, and J. Wang, "Research on Security Information Fusion from Multiple Heterogeneous Sensors, " Journal of System Simulation, vol. 20, no. 4, pp. 181-187, 2008.
-
(2008)
Journal of System Simulation
, vol.20
, Issue.4
, pp. 181-187
-
-
Ma, L.1
Yang, L.2
Wang, J.3
-
38
-
-
77954499290
-
Botnet traffic detection techniques by C&C session classification using SVM
-
Japan
-
S. Kondo and N. Sato, "Botnet traffic detection techniques by C&C session classification using SVM, " Proc. 2nd International Workshop on Security, Japan, 2007.
-
(2007)
Proc. 2nd International Workshop on Security
-
-
Kondo, S.1
Sato, N.2
-
39
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
rded, Oxford: Clarendon
-
rded., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
-
(1892)
Proc. 1st Workshop on Hot Topics in Understanding Botnets (HotBots 2007)
, vol.2
, pp. 68-73
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
|