-
1
-
-
77958527473
-
A taxonomy of botnet detection techniques
-
july
-
H. Zeidanloo, M. Shooshtari, P. Amoli, M. Safari, and M. Zamani, "A taxonomy of botnet detection techniques," in Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on, vol. 2, july 2010, pp. 158 -162.
-
(2010)
Computer Science and Information Technology (ICCSIT), 2010 3rd IEEE International Conference on
, vol.2
, pp. 158-162
-
-
Zeidanloo, H.1
Shooshtari, M.2
Amoli, P.3
Safari, M.4
Zamani, M.5
-
2
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
A. Ramachandran, N. Feamster, and G. Tech, "Understanding the network-level behavior of spammers," in Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (2006), 2006, pp. 291-302.
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (2006)
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
Tech, G.3
-
3
-
-
85084161486
-
Inferring internet denial-of-service activity
-
D. Moore, G. Voelker, and S. Savage, "Inferring internet denial-of-service activity," in In Proceedings of the 10th Usenix Security Symposium, 2001, pp. 9-22.
-
In Proceedings of the 10th Usenix Security Symposium, 2001
, pp. 9-22
-
-
Moore, D.1
Voelker, G.2
Savage, S.3
-
4
-
-
38849103391
-
Measurement and analysis of spyware in a university environment
-
USENIX
-
S. Saroiu, S. D. Gribble, and H. M. Levy, "Measurement and analysis of spyware in a university environment." in NSDI. USENIX, 2004, pp. 141-153.
-
(2004)
NSDI
, pp. 141-153
-
-
Saroiu, S.1
Gribble, S.D.2
Levy, H.M.3
-
5
-
-
70350357344
-
Learning more about the underground economy: A case-study of keyloggers and dropzones
-
M. Backes and P. Ning, Eds., Springer
-
T. Holz, M. Engelberth, and F. C. Freiling, "Learning more about the underground economy: A case-study of keyloggers and dropzones." in ESORICS, M. Backes and P. Ning, Eds., vol. 5789. Springer, 2009, pp. 1-18.
-
(2009)
ESORICS
, vol.5789
, pp. 1-18
-
-
Holz, T.1
Engelberth, M.2
Freiling, F.C.3
-
7
-
-
26844548971
-
-
P. Bacher, T. Holz, M. Kotter, and G. Wicherski, "Know your enemy: Tracking botnets," http://www.honeynet.org/papers/bots, 2008.
-
(2008)
Know Your Enemy: Tracking Botnets
-
-
Bacher, P.1
Holz, T.2
Kotter, M.3
Wicherski, G.4
-
9
-
-
77951447962
-
Botnet: Survey and case study
-
C. Li, W. Jiang, and X. Zou, "Botnet: Survey and case study," in Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference on, dec. 2009, pp. 1184-1187.
-
Innovative Computing, Information and Control (ICICIC), 2009 Fourth International Conference On, Dec. 2009
, pp. 1184-1187
-
-
Li, C.1
Jiang, W.2
Zou, X.3
-
11
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
USENIX Association
-
A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007, pp. 7-7.
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 7-7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
12
-
-
70449466618
-
A survey of botnet and botnet detection
-
M. Feily, A. Shahrestani, and S. Ramadass, "A survey of botnet and botnet detection," in Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on, june 2009, pp. 268-273.
-
Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference On, June 2009
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
13
-
-
77957670215
-
Fast-flux attack network identification based on agent lifespan
-
S. Yu, S. Zhou, and S. Wang, "Fast-flux attack network identification based on agent lifespan," in Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference on, june 2010, pp. 658-662.
-
Wireless Communications, Networking and Information Security (WCNIS), 2010 IEEE International Conference On, June 2010
, pp. 658-662
-
-
Yu, S.1
Zhou, S.2
Wang, S.3
-
15
-
-
71749083441
-
Collaborative detection of fast flux phishing domains
-
C. V. Zhou, C. Leckie, and S. Karunasekera, "Collaborative detection of fast flux phishing domains." JNW, vol. 4, no. 1, pp. 75-84, 2009.
-
(2009)
JNW
, vol.4
, Issue.1
, pp. 75-84
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
-
19
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
ACM
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. A. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: analysis of a botnet takeover." in ACM Conference on Computer and Communications Security. ACM, 2009, pp. 635-647.
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.A.6
Kruegel, C.7
Vigna, G.8
-
20
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. C. Freiling, "Measuring and detecting fast-flux service networks," in NDSS, 2008.
-
(2008)
NDSS
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
21
-
-
51149084743
-
A Self-healing, Self-protecting, Collaborative Intrusion Detection Architecture to Traceback Fast-flux Phishing Domains
-
C. V. Zhou, C. Leckie, S. Karunasekera, and T. Peng, "A Self-healing, Self-protecting, Collaborative Intrusion Detection Architecture to Traceback Fast-flux Phishing Domains," in Proceedings of the 2nd IEEE Workshop on Autonomic Communication and Network Management, Apr. 2008.
-
Proceedings of the 2nd IEEE Workshop on Autonomic Communication and Network Management, Apr. 2008
-
-
Zhou, C.V.1
Leckie, C.2
Karunasekera, S.3
Peng, T.4
-
22
-
-
66249126278
-
Real-time detection of fast flux service networks
-
A. Caglayan, M. Toothaker, D. Drapeau, D. Burke, and G. Eaton, "Real-time detection of fast flux service networks," in Conference For Homeland Security, 2009. CATCH '09., 2009, pp. 285-292.
-
Conference for Homeland Security, 2009. CATCH '09., 2009
, pp. 285-292
-
-
Caglayan, A.1
Toothaker, M.2
Drapeau, D.3
Burke, D.4
Eaton, G.5
-
23
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive dns traces
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive dns traces," in Computer Security Applications Conference, 2009. ACSAC '09. Annual, 2009, pp. 311 -320.
-
Computer Security Applications Conference, 2009. ACSAC '09. Annual, 2009
, pp. 311-320
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
24
-
-
85000701895
-
My botnet is bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnet is bigger than yours (maybe, better than yours): why size estimates remain challenging," in Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007.
-
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
25
-
-
85084096724
-
The heisenbot uncertainty problem: Challenges in separating bots from chaff
-
USENIX Association
-
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage, "The heisenbot uncertainty problem: Challenges in separating bots from chaff." in LEET. USENIX Association, 2008.
-
(2008)
LEET
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
26
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious web sites from suspicious urls
-
ACM
-
J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, "Beyond blacklists: learning to detect malicious web sites from suspicious urls," in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 1245-1254.
-
(2009)
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 1245-1254
-
-
Ma, J.1
Saul, L.K.2
Savage, S.3
Voelker, G.M.4
-
28
-
-
79957629730
-
Identifying suspicious activities through dns failure graph analysis
-
N. Jiang, J. Cao, Y. Jin, L. Li, and Z.-L. Zhang, "Identifying suspicious activities through dns failure graph analysis," in Network Protocols (ICNP), 2010 18th IEEE International Conference on, oct. 2010, pp. 144-153.
-
Network Protocols (ICNP), 2010 18th IEEE International Conference On, Oct. 2010
, pp. 144-153
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
Li, L.4
Zhang, Z.-L.5
-
29
-
-
64249095150
-
Impact of configuration errors on dns robustness
-
V. Pappas, D. Wessels, D. Massey, S. Lu, A. Terzis, and L. Zhang, "Impact of configuration errors on dns robustness," Selected Areas in Communications, IEEE Journal, vol. 27, pp. 275-290, 2009.
-
(2009)
Selected Areas in Communications, IEEE Journal
, vol.27
, pp. 275-290
-
-
Pappas, V.1
Wessels, D.2
Massey, D.3
Lu, S.4
Terzis, A.5
Zhang, L.6
-
30
-
-
84869596416
-
Using failure information analysis to detect enterprise zombies
-
Springer
-
Z. Zhu, V. Yegneswaran, and Y. Chen, "Using failure information analysis to detect enterprise zombies." in SecureComm, vol. 19. Springer, 2009, pp. 185-206.
-
(2009)
SecureComm
, vol.19
, pp. 185-206
-
-
Zhu, Z.1
Yegneswaran, V.2
Chen, Y.3
-
32
-
-
70449686700
-
Unveiling core network-wide communication patterns through application traffic activity graph decomposition
-
ACM
-
Y. Jin, E. Sharafuddin, and Z. L. Zhang, "Unveiling core network-wide communication patterns through application traffic activity graph decomposition,"in Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems. ACM, 2009, pp. 49-60.
-
(2009)
Proceedings of the Eleventh International Joint Conference on Measurement and Modeling of Computer Systems
, pp. 49-60
-
-
Jin, Y.1
Sharafuddin, E.2
Zhang, Z.L.3
-
33
-
-
77953329477
-
Phishnet: Predictive blacklisting to detect phishing attacks
-
P. Prakash, M. Kumar, R. Kompella, and M. Gupta, "Phishnet: Predictive blacklisting to detect phishing attacks," in INFOCOM, 2010 Proceedings IEEE, 2010, pp. 1-5.
-
INFOCOM, 2010 Proceedings IEEE, 2010
, pp. 1-5
-
-
Prakash, P.1
Kumar, M.2
Kompella, R.3
Gupta, M.4
-
34
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
ACM
-
S. Yadav, A. K. K. Reddy, A. N. Reddy, and S. Ranjan, "Detecting algorithmically generated malicious domain names," in Proceedings of the 10th annual conference on Internet measurement. ACM, 2010, pp. 48-61.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement
, pp. 48-61
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.N.3
Ranjan, S.4
-
36
-
-
0003585297
-
-
San Francisco, CA, USA: Morgan Kaufmann Publishers Inc.
-
J. Han, Data Mining: Concepts and Techniques. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc., 2005.
-
(2005)
Data Mining: Concepts and Techniques
-
-
Han, J.1
-
37
-
-
0022594196
-
An introduction to hidden markov models
-
L. Rabiner and B. Juang, "An introduction to hidden markov models,"ASSP Magazine, IEEE, pp. 4-16, 1986.
-
(1986)
ASSP Magazine, IEEE
, pp. 4-16
-
-
Rabiner, L.1
Juang, B.2
-
38
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
L. Rabiner, "A tutorial on hidden markov models and selected applications in speech recognition," Proceedings of the IEEE, pp. 257-286, 1989.
-
(1989)
Proceedings of the IEEE
, pp. 257-286
-
-
Rabiner, L.1
|