-
4
-
-
70449466618
-
A Survey of Botnet and Botnet Detection
-
Faily, M., Shahrestani, A., Ramadass, S.: A Survey of Botnet and Botnet Detection. In: Third International Conference on Emerging Security Information, Systems and Technologies (2009)
-
Third International Conference on Emerging Security Information, Systems and Technologies (2009)
-
-
Faily, M.1
Shahrestani, A.2
Ramadass, S.3
-
5
-
-
70349680893
-
A Framework for Understanding Botnets
-
Leonard, J., Shouhuai, X., Sandhu, R.: A Framework for Understanding Botnets. In: International Workshop on Advances in Information Security. Fukuoka Institute of Technology, Fukuoka (2009)
-
International Workshop on Advances in Information Security. Fukuoka Institute of Technology, Fukuoka (2009)
-
-
Leonard, J.1
Shouhuai, X.2
Sandhu, R.3
-
6
-
-
77955469676
-
An Overview of IP Flow-Based Intrusion Detection
-
Sperotto, A., et al.: An Overview of IP Flow-Based Intrusion Detection. IEEE Communications Surveys & Tutorial 12(3) (2010)
-
(2010)
IEEE Communications Surveys & Tutorial
, vol.12
, Issue.3
-
-
Sperotto, A.1
-
7
-
-
85061529860
-
BotHunter: Deteting Malware Infection Through IDS-Driven Dialog Correlation
-
Gu, G., et al.: BotHunter: Deteting Malware Infection Through IDS-Driven Dialog Correlation. In: Proceedings of the 16th USENIX Security Symposium, pp. 167-182 (2007)
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 167-182
-
-
Gu, G.1
-
8
-
-
58149102597
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
Gu, G., et al.: BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th Conference on Security Symposium, San Jose (2008)
-
Proceedings of the 17th Conference on Security Symposium, San Jose (2008)
-
-
Gu, G.1
-
9
-
-
78651593637
-
Online Botnet Detection Based on Incremental Discrete Fourier Transform
-
Yu, X., et al.: Online Botnet Detection Based on Incremental Discrete Fourier Transform. Journal of Networks 5(5) (2010)
-
(2010)
Journal of Networks
, vol.5
, Issue.5
-
-
Yu, X.1
-
10
-
-
46149123241
-
Using Machine Learning Techniques to Identify Botnet Traffic
-
Livadas, C., et al.: Using Machine Learning Techniques to Identify Botnet Traffic. In: 2nd IEEE LCN Workshop on Network Security, pp. 967-974 (2006)
-
(2006)
2nd IEEE LCN Workshop on Network Security
, pp. 967-974
-
-
Livadas, C.1
-
11
-
-
70349669421
-
Measuring Peer-to-Peer Botnets Using Control Flow Stability
-
978-1-4244-3572-2
-
Wang, B., et al.: Measuring Peer-to-Peer Botnets Using Control Flow Stability. In: International Conference on Availability, Reliability and Security, Fukuoka, p. 663 (2009), 978-1-4244-3572-2
-
(2009)
International Conference on Availability, Reliability and Security, Fukuoka
, pp. 663
-
-
Wang, B.1
-
14
-
-
72949095419
-
Bayesian Bot Detection Based on DNS Traffic Similarity
-
ACM, Honolulu 978-1-60558-166-8
-
Ricardo, V.-S., José, B.C.: Bayesian Bot Detection Based on DNS Traffic Similarity. In: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 2035-2041. ACM, Honolulu (2009), 978-1-60558-166-8
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 2035-2041
-
-
Ricardo, V.-S.1
José, B.C.2
-
17
-
-
84863949448
-
-
French Chapter | The Honeynet Project. The Honeynet Project
-
The Honeynet Project, French Chapter | The Honeynet Project. The Honeynet Project, http://www.honeynet.org/chapters/france
-
-
-
-
18
-
-
43949108876
-
On the Validation of Traffic Classification Algorithms
-
Claypool, M., Uhlig, S. (eds.) PAM 2008. Springer, Heidelberg
-
Szabó, G., Orincsay, D., Malomsoky, S., Szabó, I.: On the Validation of Traffic Classification Algorithms. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 72-81. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4979
, pp. 72-81
-
-
Szabó, G.1
Orincsay, D.2
Malomsoky, S.3
Szabó, I.4
-
19
-
-
84863949449
-
-
Lawrence Berkeley National Laboratory and ICSI., LBNL/ICSI Enterprise Tracing Project. LBNL Enterprise Trace Repository
-
Lawrence Berkeley National Laboratory and ICSI., LBNL/ICSI Enterprise Tracing Project. LBNL Enterprise Trace Repository (2005), http://www.icir.org/ enterprise-tracing
-
(2005)
-
-
-
21
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of USENIX LISA 1999 (1999)
-
(1999)
Proceedings of USENIX LISA 1999
-
-
Roesch, M.1
|