-
4
-
-
84857358597
-
-
Route Views project, University of Oregon Advanced Network Technology Center, Eugene, OR Online
-
"Route Views project," University of Oregon Advanced Network Technology Center, Eugene, OR Online. Available: http://www.routeviews.org/
-
-
-
-
5
-
-
84857358598
-
-
APWG, Anti-Phishing Working Group Online
-
"APWG," Anti-Phishing Working Group Online. Available: http://www.antiphishing.org/
-
-
-
-
6
-
-
84857372108
-
-
PhishTank, OpenDNS, San Francisco, CA Online. Available:
-
"PhishTank," OpenDNS, San Francisco, CA Online. Available: http://www.phishtank.com/
-
-
-
-
7
-
-
84857362476
-
-
Support Intelligence, LLC, Support Intelligence, LLC, San Francisco, CA Online
-
"Support Intelligence, LLC," Support Intelligence, LLC, San Francisco, CA Online. Available: http://www.support-intelligence.com/
-
-
-
-
8
-
-
84857362477
-
-
SURBL
-
"SURBL," Online. Available: http://www.surbl.org/
-
-
-
-
9
-
-
84857360435
-
-
Spamhaus block list (SBL). Spamhaus Project Online
-
"Spamhaus block list (SBL)," Spamhaus Project Online. Available: http://www.spamhaus.org/sbl/index.lasso
-
-
-
-
10
-
-
84857372110
-
-
Exploits block list (XBL), Spamhaus Project Online
-
"Exploits block list (XBL)," Spamhaus Project Online. Available: http://www.spamhaus.org/xbl/index.lasso
-
-
-
-
11
-
-
84857372111
-
-
Viruswatch mailing list, NETpilot GmbH, Munich, Germany Online
-
"Viruswatch mailing list," NETpilot GmbH, Munich, Germany Online. Available: http://lists.clean-mx.com/cgi-bin/mailman/listinfo/viruswatch
-
-
-
-
12
-
-
84857372109
-
-
eSoft Inc., eSoft Inc., Broomfield, CO Online
-
"eSoft Inc.," eSoft Inc., Broomfield, CO Online. Available: http://www.esoft.com/
-
-
-
-
13
-
-
84857362479
-
-
Malware block list, Malware Patrol Online
-
"Malware block list,"Malware Patrol Online. Available: http://www.malwarepatrol.net/lists.shtml
-
-
-
-
14
-
-
84857358599
-
-
ShadowServer Foundation
-
"ShadowServer Foundation," Online. Available: http://www.shadowserver.org/wiki/
-
-
-
-
15
-
-
0035704351
-
On inferring autonomous system relationships in the Internet
-
DOI 10.1109/90.974527, PII S1063669201105480
-
L.Gao, "On inferring autonomous system relationships in the internet," IEEE/ACM Trans. Netw., vol. 9, no. 6, pp. 733-745, Dec. 2001. (Pubitemid 34099653)
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, Issue.6
, pp. 733-745
-
-
Gao, L.1
-
16
-
-
0042934007
-
Computing the types of the relationships between autonomous systems
-
G. D. Battista, M. Patrignani, and M. Pizzonia, "Computing the types of the relationships between autonomous systems," in Proc. IEEE INFOCOM, 2003, vol. 1, pp. 156-165.
-
(2003)
Proc. IEEE INFOCOM
, vol.1
, pp. 156-165
-
-
Battista, G.D.1
Patrignani, M.2
Pizzonia, M.3
-
17
-
-
84876393159
-
AS relationships: Inference and validation
-
Jan.
-
X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, K. C. Claffy, and G. Riley, "AS relationships: Inference and validation," Comput. Commun. Rev., vol. 37, no. 1, pp. 29-40, Jan. 2007.
-
(2007)
Comput. Commun. Rev.
, vol.37
, Issue.1
, pp. 29-40
-
-
Dimitropoulos, X.1
Krioukov, D.2
Fomenkov, M.3
Huffaker, B.4
Hyun, Y.5
Claffy, K.C.6
Riley, G.7
-
18
-
-
0036346301
-
Characterizing the internet hierarchy from multiple vantage points
-
L. Subramanian, S. Agarwal, J. Rexford, and R. H. Katz, "Characterizing the internet hierarchy from multiple vantage points," in Proc. IEEE INFOCOM, 2002, vol. 2, pp. 618-627.
-
(2002)
Proc. IEEE INFOCOM
, vol.2
, pp. 618-627
-
-
Subramanian, L.1
Agarwal, S.2
Rexford, J.3
Katz, R.H.4
-
19
-
-
0141920459
-
BGP routing stability of popular destinations
-
J. Rexford, J. Wang, Z. Xiao, and Y. Zhang, "BGP routing stability of popular destinations," in Proc. ACM SIGCOMM IMW, 2002, pp. 197-202.
-
(2002)
Proc. ACM SIGCOMM IMW
, pp. 197-202
-
-
Rexford, J.1
Wang, J.2
Xiao, Z.3
Zhang, Y.4
-
20
-
-
21844445354
-
Locating Internet routing instabilities
-
DOI 10.1145/1030194.1015491, Computer Communication Review - Proceedings of ACM SIGCOMM 2004: Conference on Computer Communications
-
A. Feldmann, O. Maennel, Z.M. Mao, A. Berger, and B. Maggs, "Locating internet routing instabilities," in Proc. ACM SIGCOMM, 2004, pp. 205-218. (Pubitemid 40954881)
-
(2004)
Computer Communication Review
, vol.34
, Issue.4
, pp. 205-218
-
-
Feldmann, A.1
Maennel, O.2
Mao, Z.M.3
Berger, A.4
Maggs, B.5
-
21
-
-
65249154022
-
ISPY: Detecting IP prefix hijacking on my own
-
Z. Zhang, Y. Zhang, Y. C. Hu, and Z. M. Mao, "iSPY: Detecting IP prefix hijacking on my own," in Proc. ACM SIGCOMM, 2008, pp. 327-338.
-
(2008)
Proc. ACM SIGCOMM
, pp. 327-338
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
-
22
-
-
56749151567
-
Practical defenses against BGP prefix hijacking
-
Article no. 3
-
Z. Zhang, Y. Zhang, Y. C. Hu, and Z. M. Mao, "Practical defenses against BGP prefix hijacking," in Proc. CoNEXT, 2007, Article no. 3.
-
(2007)
Proc. CoNEXT
-
-
Zhang, Z.1
Zhang, Y.2
Hu, Y.C.3
Mao, Z.M.4
-
23
-
-
0033743163
-
Secure border gateway protocol (S-BGP)
-
Apr.
-
S. Kent, C. Lynn, and K. Seo, "Secure border gateway protocol (S-BGP)," IEEE J. Sel. Areas Commun., vol. 18, no. 4, pp. 582-592, Apr. 2000.
-
(2000)
IEEE J. Sel. Areas Commun.
, vol.18
, Issue.4
, pp. 582-592
-
-
Kent, S.1
Lynn, C.2
Seo, K.3
-
24
-
-
27544500277
-
Securing BGP through secure origin BGP (soBGP)
-
R. White, "Securing BGP through secure origin BGP (soBGP)," Internet Protocol J., vol. 6, no. 3, pp. 15-22, 2003.
-
(2003)
Internet Protocol J.
, vol.6
, Issue.3
, pp. 15-22
-
-
White, R.1
-
26
-
-
40249106140
-
A crawler-based study of spyware on the Web
-
A. Moushchuk, T. Bragin, S. Gribble, and H. Levy, "A crawler-based study of spyware on the Web," in Proc. NDSS, 2006, pp. 17-33.
-
(2006)
Proc. NDSS
, pp. 17-33
-
-
Moushchuk, A.1
Bragin, T.2
Gribble, S.3
Levy, H.4
-
27
-
-
80053650188
-
All your iFRAMEs point to us
-
N. Provos, P. Mavrommatis, M. Rajab, and F. Monrose, "All your iFRAMEs point to us," in Proc. USENIX Security Symp., 2008, pp. 1-15.
-
(2008)
Proc. USENIX Security Symp.
, pp. 1-15
-
-
Provos, N.1
Mavrommatis, P.2
Rajab, M.3
Monrose, F.4
-
28
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
DOI 10.1145/1151659.1159947
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, 2006, pp. 291-302. (Pubitemid 44623735)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
29
-
-
67649946711
-
Dynamics of online scam hosting infrastructure
-
M. Konte, N. Feamster, and J. Jung, "Dynamics of online scam hosting infrastructure," in Proc. Passive Active Meas. Conf., 2009, pp. 219-228.
-
(2009)
Proc. Passive Active Meas. Conf.
, pp. 219-228
-
-
Konte, M.1
Feamster, N.2
Jung, J.3
-
30
-
-
77950794331
-
FIRE: FInding Rogue nEtworks
-
B. Stone-Gross, C. Kruegel, K. Almeroth, A. Moser, and E. Kirda, "FIRE: FInding Rogue nEtworks," in Proc. ACSAC, 2009, pp. 231-240.
-
(2009)
Proc. ACSAC
, pp. 231-240
-
-
Stone-Gross, B.1
Kruegel, C.2
Almeroth, K.3
Moser, A.4
Kirda, E.5
-
31
-
-
49949109773
-
-
The Honeynet Project, Naperville, IL, Whitepaper, Jul.
-
"Know your enemy: Fast-flux service networks," The Honeynet Project, Naperville, IL, Whitepaper, Jul. 2007 Online. Available: http://www.honeynet.org/papers/ff
-
(2007)
Know Your Enemy: Fast-flux Service Networks
-
-
-
32
-
-
70350145115
-
Phishing infrastructure fluxes all the way
-
Sep.-Oct.
-
D. K. McGrath, A. Kalafut, and M. Gupta, "Phishing infrastructure fluxes all the way," IEEE Security Privacy, vol. 7, no. 5, pp. 21-28, Sep.-Oct. 2009.
-
(2009)
IEEE Security Privacy
, vol.7
, Issue.5
, pp. 21-28
-
-
McGrath, D.K.1
Kalafut, A.2
Gupta, M.3
-
33
-
-
34548704917
-
Accurate real-time identification of IP prefix hijacking
-
DOI 10.1109/SP.2007.7, 4223210, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
X. Hu and Z. M. Mao, "Accurate real-time identification of IP prefix hijacking," in Proc. IEEE Symp. Security Privacy, 2007, pp. 3-17. (Pubitemid 47432512)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Hu, X.1
Mao, Z.M.2
-
34
-
-
84857362478
-
-
"National Council of ISACS," 2010 Online. Available: http://www.isaccouncil.org/
-
(2010)
National Council of ISACS
-
-
|