-
1
-
-
84864742852
-
-
SSAC, SAC 025 -SSAC Advisory on Fast Flux Hosting and DNS
-
SSAC, "SAC 025 -SSAC Advisory on Fast Flux Hosting and DNS," http://www.icann.org/en/committees/security/sac025. pdf, 2008.
-
(2008)
-
-
-
2
-
-
84864747709
-
-
The Honeynet Project,Know Your Enemy: Fast-Flux Service Networks
-
The Honeynet Project,Know Your Enemy: Fast-Flux Service Networks, http://old.honeynet.org/papers/ff/fast-flux.html,2007.
-
(2007)
-
-
-
3
-
-
84928140517
-
Measuring and detecting fast-flux service networks
-
T. Holz, C. Gorecki, K. Rieck, and F. Freiling, "Measuring and Detecting Fast-Flux Service Networks," Proc. Network and Distributed System Security Symp. (NDSS '08), 2008.
-
(2008)
Proc. Network and Distributed System Security Symp. (NDSS '08)
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.4
-
4
-
-
67649971754
-
Fluxor: Detecting and monitoring fast-flux service networks
-
E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi, "Fluxor: Detecting and Monitoring Fast-Flux Service Networks," Proc. Fifth Int'l Conf. Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA '08), 2008.
-
(2008)
Proc. Fifth Int'l Conf. Detection of Intrusions and Malware, and Vulnerability Assessment (DIMVA '08)
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
7
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive dns traces
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting Malicious Flux Service Networks through Passive Analysis of Recursive DNS Traces," Proc. Ann. Computer Security Applications Conf. (ACSAC), 2009.
-
(2009)
Proc. Ann. Computer Security Applications Conf. (ACSAC)
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
8
-
-
84864747711
-
-
ISC Security Information Exchange
-
ISC Security Information Exchange, https://sie.isc.org,, 2012.
-
(2012)
-
-
-
11
-
-
85068725031
-
Building a dynamic reputation system for dns
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, "Building a Dynamic Reputation System for dns," Proc. 19th USENIX Conf. Security, 2010.
-
(2010)
Proc. 19th USENIX Conf. Security
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
12
-
-
84879219725
-
Building a dynamic reputation system for dns
-
L. Bilge, E. Kirda, C. Kruegel, and M. Balduzzi, "Building a Dynamic Reputation System for DNS," Proc. 18th Ann. Network and Distributed System Security Symp. (NDSS), 2011.
-
(2011)
Proc. 18th Ann. Network and Distributed System Security Symp. (NDSS)
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
-
13
-
-
85068675731
-
Detecting malware domains at the upper dns hierarchy
-
M. Antonakakis, R. Perdisci, W. Lee, N. Vasiloglou, and D. Dagon, "Detecting Malware Domains at the Upper DNS Hierarchy," Proc. 20th USENIX Conf. Security, 2011.
-
(2011)
Proc. 20th USENIX Conf. Security
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
15
-
-
84893405732
-
Data clustering: A review
-
A.K. Jain, M.N. Murty, and P.J. Flynn, "Data Clustering: A Review," ACM Computing Surveys, vol. 31, no. 3, pp. 264-323, 1999.
-
(1999)
ACM Computing Surveys
, vol.31
, Issue.3
, pp. 264-323
-
-
Jain, A.K.1
Murty, M.N.2
Flynn, P.J.3
-
18
-
-
84864749621
-
-
Zeus Tracker
-
Zeus Tracker,https://zeustracker.abuse.ch/,2012.
-
(2012)
-
-
-
19
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your Botnet is My Botnet: Analysis of a Botnet Takeover," Proc. ACM Conf. Computer and Comm. Security, 2009.
-
(2009)
Proc.ACM Conf. Computer and Comm. Security
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
20
-
-
79960855165
-
Good guys vs. Bot guise: Mimicry attacks against fast-flux detection systems
-
M. Knysz, X. Hu, and K.G. Shin, "Good Guys vs. Bot Guise: Mimicry Attacks against Fast-Flux Detection Systems," Proc. IEEE INFOCOM, 2011.
-
(2011)
Proc.IEEE INFOCOM
-
-
Knysz, M.1
Hu, X.2
Shin, K.G.3
|