-
1
-
-
84860543665
-
-
Arbor
-
Arbor, "IP Flow-Based Technology," http://www.arbornetworks. com, 2011.
-
(2011)
IP Flow-based Technology
-
-
-
2
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your Botnet Is My Botnet: Analysis of a Botnet Takeover," Proc. ACM Conf. Computer Comm. Security, 2009.
-
(2009)
Proc. ACM Conf. Computer Comm. Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
4
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
C.Y. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song, "Insights from the Inside: A View of Botnet Management from Infiltration," Proc. Third USENIX Conf. Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (USENIX LEET), 2010.
-
(2010)
Proc. Third USENIX Conf. Large-Scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More (USENIX LEET
-
-
Cho, C.Y.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
5
-
-
36249008514
-
A survey of bots used for distributed denial of service attacks
-
V.L.L. Thing, M. Sloman, and N. Dulay, "A Survey of Bots Used for Distributed Denial of Service Attacks," Proc. SEC, pp. 229-240, 2007.
-
(2007)
Proc. SEC
, pp. 229-240
-
-
Thing, V.L.L.1
Sloman, M.2
Dulay, N.3
-
6
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F.C. Freiling, "Measurements and Mitigation of Peer-to-Peer-Based Botnets: A Case Study on Storm Worm," Proc. First Usenix Workshop Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
Proc. First Usenix Workshop Large-Scale Exploits and Emergent Threats (LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.C.5
-
7
-
-
66249147541
-
A survey of botnet technology and defenses
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, "A Survey of Botnet Technology and Defenses," Proc. Cybersecurity Applications and Technology Conf. for Homeland Security, 2009.
-
(2009)
Proc. Cybersecurity Applications and Technology Conf. for Homeland Security
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
8
-
-
77953077374
-
Flash crowds and denial of service attacks: Characterization and implications for cdns and web sites
-
252-262
-
J. Jung, B. Krishnamurthy, and M. Rabinovich, "Flash Crowds and Denial of Service Attacks: Characterization and Implications for CDNs and Web Sites," Proc. 11th Int'l Conf. World Wide Web (WWW), pp. 252-262, 2002.
-
(2002)
Proc. 11th Int'l Conf. World Wide Web (WWW
-
-
Jung, J.1
Krishnamurthy, B.2
Rabinovich, M.3
-
9
-
-
33847761464
-
Non-Gaussian and long memory statistical characterizations for Internet traffic with anomalies
-
DOI 10.1109/TDSC.2007.12
-
A. Scherrer, N. Larrieu, P. Owezarski, P. Borgnat, and P. Abry, "Non-Gaussian and Long Memory Statistical Characterizations for Internet Traffic with Anomalies," IEEE Trans. Dependable Secure Computing, vol. 4, no. 1, pp. 56-70, Jan.-Mar. 2007. (Pubitemid 46384621)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.1
, pp. 56-70
-
-
Scherrer, A.1
Larrieu, N.2
Owezarski, P.3
Borgnat, P.4
Abry, P.5
-
10
-
-
31544436627
-
Denial-of-service attack-detection techniques
-
DOI 10.1109/MIC.2006.5
-
G. Carl, G. Kesidis, R. Brooks, and S. Rai, "Denial-of-Service Attack-Detection Techniques," IEEE Internet Computing, vol. 10, no. 1, pp. 82-89, Jan./Feb. 2006. (Pubitemid 43159617)
-
(2006)
IEEE Internet Computing
, vol.10
, Issue.1
, pp. 82-89
-
-
Carl, G.1
Kesidis, G.2
Brooks, R.R.3
Rai, S.4
-
11
-
-
33746985496
-
Collaborative detection and filtering of shrew DDoS attacks using spectral analysis
-
DOI 10.1016/j.jpdc.2006.04.007, PII S0743731506000852
-
Y. Chen and K. Hwang, "Collaborative Detection and Filtering of Shrew DDoS Attacks Using Spectral Analysis," J. Parallel Distributed Computing, vol. 66, no. 9, pp. 1137-1151, 2006. (Pubitemid 44205394)
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1137-1151
-
-
Chen, Y.1
Hwang, K.2
-
12
-
-
84924375780
-
Botz-4-sale: Surviving organized ddos attacks that mimic flash crowds (awarded best student paper
-
S. Kandula, D. Katabi, M. Jacob, and A. Berger, "Botz-4-Sale: Surviving Organized DDoS Attacks that Mimic Flash Crowds (Awarded Best Student Paper)," Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05), 2005.
-
(2005)
Proc. Second Symp. Networked Systems Design and Implementation (NSDI '05
-
-
Kandula, S.1
Katabi, D.2
Jacob, M.3
Berger, A.4
-
13
-
-
61449197774
-
A large-scale hidden semi-markov model for anomaly detection on user browsing behaviors
-
Feb
-
Y. Xie and S.-Z. Yu, "A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on User Browsing Behaviors," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 54-65, Feb. 2009.
-
(2009)
IEEE/ ACM Trans. Networking
, vol.17
, Issue.1
, pp. 54-65
-
-
Xie, Y.1
Yu, S.-Z.2
-
14
-
-
61449135082
-
Monitoring the application-layer ddos attacks for popular websites
-
Feb
-
Y. Xie and S.-Z. Yu, "Monitoring the Application-Layer DDoS Attacks for Popular Websites," IEEE/ACM Trans. Networking, vol. 17, no. 1, pp. 15-25, Feb. 2009.
-
(2009)
IEEE/ ACM Trans. Networking
, vol.17
, Issue.1
, pp. 15-25
-
-
Xie, Y.1
Yu, S.-Z.2
-
16
-
-
33847730651
-
Distributed denial of service attacks
-
C. Patrikakis, M. Masikos, and O. Zouraraki, "Distributed Denial of Service Attacks," The Internet Protocol J., vol. 7, no. 4, pp. 13-35, 2004.
-
(2004)
The Internet Protocol J.
, vol.7
, Issue.4
, pp. 13-35
-
-
Patrikakis, C.1
Masikos, M.2
Zouraraki, O.3
-
17
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems," ACM Computing Survey, vol. 39, no. 1, pp. 123-128, 2007.
-
(2007)
ACM Computing Survey
, vol.39
, Issue.1
, pp. 123-128
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
19
-
-
77952687808
-
An advanced hybrid peer-to-peer botnet
-
Apr.-June
-
P. Wang, S. Sparks, and C.C. Zou, "An Advanced Hybrid Peer-to-Peer Botnet," IEEE Trans. Dependable and Secure Computing, vol. 7, no. 2, pp. 113-127, Apr.-June 2010.
-
(2010)
IEEE Trans. Dependable and Secure Computing
, vol.7
, Issue.2
, pp. 113-127
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
20
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My Botnet is Bigger than Yours (Maybe, Better than Yours): Why Size Estimates Remain Challenging," Proc. First Conf. First Workshop Hot Topics in Understanding Botnets (HotBots '07), 2007.
-
(2007)
Proc. First Conf. First Workshop Hot Topics in Understanding Botnets (HotBots '07
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
21
-
-
84969280632
-
-
WorldCup98, http://ita.ee.lbl.gov/html/contrib/WorldCup. html. 2011.
-
(2011)
WorldCup98
-
-
-
22
-
-
0029323403
-
Wide area traffic: The failure of poisson modeling
-
June
-
V. Paxson and S. Floyd, "Wide Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Trans. Networking, vol. 3, no. 3, pp. 226-244, June 1995.
-
(1995)
IEEE/ ACM Trans. Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
23
-
-
0031383380
-
Self-similarity in world wide web traffic: Evidence and possible causes
-
PII S1063669297087827
-
M.E. Crovella and A. Bestavros, "Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes," IEEE/ACM Trans. Networking, vol. 5, no. 6, pp. 835-846, Dec. 1997. (Pubitemid 127768491)
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
25
-
-
33745205813
-
Inferring internet denial-of-service activity
-
D. Moore, C. Shannon, D.J. Brown, G.M. Voelker, and S. Savage, "Inferring Internet Denial-of-Service Activity," ACM Trans. Computer Systems, vol. 24, no. 2, pp. 115-139, 2006.
-
(2006)
ACM Trans. Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.J.3
Voelker, G.M.4
Savage, S.5
|