-
1
-
-
80052221009
-
-
[Online]. Available
-
SPAMCOP.NET [Online]. Available: http://www.spamcop.net
-
SPAMCOP.NET
-
-
-
2
-
-
84874126880
-
-
[Online]. Available
-
The SPAMHAUS Project [Online]. Available: http://www.spamhaus.org
-
The SPAMHAUS Project
-
-
-
3
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
Washington, DC, Aug.
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, "Building a dynamic reputation system for DNS," in Proc. USENIX Security of Symp., Washington, DC, Aug. 2010.
-
(2010)
Proc. USENIX Security of Symp.
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
4
-
-
84863357680
-
-
BotLab, [Online]. Available
-
BotLab. BotLab: A Study in Spam [Online]. Available: http://www.botlab. org
-
BotLab: A Study in Spam
-
-
-
8
-
-
78751554635
-
-
Dshield, [Online]. Available
-
Dshield. All Suspicious Source IPs in Dshield [Online]. Available: http://www.dshield.org/feeds/daily-sources
-
All Suspicious Source IPs in Dshield
-
-
-
10
-
-
84863357678
-
-
[Online]. Available
-
FIRE. Finding Rogue Networks [Online]. Available: http:// maliciousnetworks.org
-
FIRE. Finding Rogue Networks
-
-
-
11
-
-
84863357677
-
-
[Online]. Available
-
Fortune. Fortune 100 companies [Online]. Available: http://money. cnn.com/magazines/fortune
-
Fortune. Fortune 100 Companies
-
-
-
13
-
-
51349154278
-
Misleading and defeating importance- scanning malware propagation
-
Nice, France, Sep.
-
G. Gu, Z. Chen, P. Porras, and W. Lee, "Misleading and defeating importance- scanning malware propagation," in Proc. 3rd Int. Conf. Security and Privacy in Communication Networks (SecureComm'07), Nice, France, Sep. 2007.
-
(2007)
Proc. 3rd Int. Conf. Security and Privacy in Communication Networks (SecureComm'07)
-
-
Gu, G.1
Chen, Z.2
Porras, P.3
Lee, W.4
-
14
-
-
58149145577
-
Detection and mitigation of fast-flux service networks
-
San Diego, CA, Feb.
-
T. Holz, C. Gorecki, and F. Freiling, "Detection and mitigation of fast-flux service networks," in Proc. Network and Distributed System Security Symp. (NDSS), San Diego, CA, Feb. 2008.
-
(2008)
Proc. Network and Distributed System Security Symp. (NDSS)
-
-
Holz, T.1
Gorecki, C.2
Freiling, F.3
-
16
-
-
84863340415
-
Passive identification of Conficker nodes on the Internet University of Minnesota
-
S. Krishnan and Y. Kim, Passive identification of Conficker nodes on the Internet University of Minnesota, Technical Document, 2009.
-
(2009)
Technical Document
-
-
Krishnan, S.1
Kim, Y.2
-
18
-
-
84908620197
-
NAT usage in residential broadband networks
-
Atlanta, GA, Mar.
-
G. Maier, F. Schneider, and A. Feldmann, "NAT usage in residential broadband networks," in Proc. 12th Int. Conf. Passive and active measurement (PAM'11), Atlanta, GA, Mar. 2011.
-
(2011)
Proc. 12th Int. Conf. Passive and active measurement (PAM'11)
-
-
Maier, G.1
Schneider, F.2
Feldmann, A.3
-
19
-
-
0742276097
-
Inside the Slammer worm
-
Oakland, CA, May
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver, "Inside the Slammer worm," in Proc. IEEE Security and Privacy, Oakland, CA,May 2003.
-
(2003)
Proc. IEEE Security and Privacy
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
20
-
-
0141762461
-
Code-red: A case study on the spread and victims of an internet worm
-
Marseille, France, Nov.
-
D. Moore, C. Shannon, and K. Calffy, "Code-red: A case study on the spread and victims of an internet worm," in Proc. ACM SIGCOMM Workshop on Internet Measurement, Marseille, France, Nov. 2002.
-
(2002)
Proc. ACM SIGCOMM Workshop on Internet Measurement
-
-
Moore, D.1
Shannon, C.2
Calffy, K.3
-
22
-
-
85084094918
-
A foray into Conficker's logic and rendezvous points
-
Boston, MA, Apr.
-
P. Porras, H. Saidi, and V. Yegneswaran, "A foray into Conficker's logic and rendezvous points," in Proc. USENIX LEET, Boston, MA, Apr. 2009.
-
(2009)
Proc. USENIX LEET
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
23
-
-
85089726744
-
On network-level clusters for spam detection
-
San Diego, CA, Feb.
-
Z.Qian, Z.Mao, Y. Xie, andF.Yu, "On network-level clusters for spam detection," in Proc. Network and Distributed System Security Symp. (NDSS), San Diego, CA, Feb. 2010.
-
(2010)
Proc. Network and Distributed System Security Symp. (NDSS)
-
-
Qian, Z.1
Mao, Z.2
Xie, Y.3
Yu, F.4
-
24
-
-
84863357676
-
Spam mitigation using spatiotemporal reputations fromblacklist history
-
Austin, TX, Dec.
-
Z. Qian, Z. Mao, Y. Xie, and F. Yu, "Spam mitigation using spatiotemporal reputations fromblacklist history," in Proc. Annual Computer Security Applications Conf. (ACSAC), Austin, TX, Dec. 2010.
-
(2010)
Proc. Annual Computer Security Applications Conf. (ACSAC)
-
-
Qian, Z.1
Mao, Z.2
Xie, Y.3
Yu, F.4
-
25
-
-
33847737144
-
Understanding the network-level behavior of spammers
-
Pisa, Italy, Sep.
-
A. Ramachandran and N. Feamster, "Understanding the network-level behavior of spammers," in Proc. ACM SIGCOMM, Pisa, Italy, Sep. 2006.
-
(2006)
Proc. ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
26
-
-
84863384233
-
-
SecureWorks, [Online]. Available
-
SecureWorks. Ozdok/Mega-D Trojan Analysis [Online]. Available: http://www.secureworks.com/research/threats/ozdok/?threat=ozdok
-
Ozdok/Mega-D Trojan Analysis
-
-
-
29
-
-
84863340416
-
-
SRI-International, [Online]. Available
-
SRI-International. An analysis of Conficker C [Online]. Available: http://mtc.sri.com/Conficker/addendumC
-
An analysis of Conficker C
-
-
-
30
-
-
77954925610
-
Walowdac analysis of a peer-to-peer botnet
-
Milan, Italy, Nov.
-
B. Stock, J. Goebel, M. Engelberth, F. C. Freiling, and T. Holz, "Walowdac analysis of a peer-to-peer botnet," in Proc. Eur. Conf. Computer Network Defense (EC2ND), Milan, Italy, Nov. 2009.
-
(2009)
Proc. Eur. Conf. Computer Network Defense (EC2ND)
-
-
Stock, B.1
Goebel, J.2
Engelberth, M.3
Freiling, F.C.4
Holz, T.5
-
31
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Chicago, IL, Nov.
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in Proc. ACM CCS, Chicago, IL, Nov. 2009.
-
(2009)
Proc. ACM CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kruegel R. Kemmerer6
Kruegel, C.7
Vigna, G.8
-
32
-
-
84863381044
-
-
[Online]. Available
-
Symantec. Trojan.Srizbi [Online]. Available: http://www.symantec.com/ security-response/writeup.jsp?docid=2007-062007-0946-99
-
Symantec. Trojan.Srizbi
-
-
-
33
-
-
84863384281
-
-
[Online]. Available
-
M. S. Techcenter. Conficker worm [Online]. Available: http://technet. microsoft.com/en-us/security/dd452420.aspx
-
Conficker Worm
-
-
Techcenter, M.S.1
-
35
-
-
84857346931
-
-
UPI, [Online]. Available
-
UPI. Virus strikes 15 million PCs [Online]. Available: http://www.upi.com/Top-News/2009/01/26/Virus-strikes-15-million-PCs/UPI- 19421232924206
-
Virus Strikes 15 Million PCs
-
-
-
36
-
-
84863345060
-
-
Verisign, [Online]. Available
-
Verisign. The Domain Name Industry Brief [Online]. Available: http://www.verisign.com/domain-name-services/domain-information- center/domain-name-resources/domain-name-report-sept09.pdf.
-
The Domain Name Industry Brief
-
-
-
38
-
-
36949011812
-
How dynamic are IP addresses?
-
Kyoto, Japan, Aug.
-
Y. Xie, F. Yu, K. Achan, E. Gillum, M. Goldzmidt, and T. Wobber, "How dynamic are IP addresses?," in Proc. ACM SIGCOMM, Kyoto, Japan, Aug. 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Gillum, E.4
Goldzmidt, M.5
Wobber, T.6
-
39
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Seattle, WA, Aug.
-
Y. Xie, F. Yu, K. Achan, R. Panigraphy, G. Hulte, and I. Osipkov, "Spamming botnets: Signatures and characteristics," in Proc. ACM SIGCOMM, Seattle, WA, Aug. 2008.
-
(2008)
Proc. ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigraphy, R.4
Hulte, G.5
Osipkov, I.6
|