-
1
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
USENIX Association August
-
Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for DNS. In: Proceedings of the 19th USENIX Security Symposium (Security 2010). USENIX Association (August 2010)
-
(2010)
Proceedings of the 19th USENIX Security Symposium (Security 2010)
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
2
-
-
84655163180
-
Identifying botnets by capturing group activities in DNS traffic
-
Choi, H., Lee, H.: Identifying botnets by capturing group activities in DNS traffic. Journal of Computer Networks 56, 20-33 (2011)
-
(2011)
Journal of Computer Networks
, vol.56
, pp. 20-33
-
-
Choi, H.1
Lee, H.2
-
4
-
-
82455194720
-
Identifying malware using cross-evidence correlation
-
Peterson, G., Shenoi, S. (eds.) IFIP ACIT, ch.13, Springer, Boston
-
Flaglien, A., Franke, K., Årnes, A.: Identifying malware using cross-evidence correlation. In: Peterson, G., Shenoi, S. (eds.) Advances in Digital Forensics VII. IFIP ACIT, ch.13, vol. 361, pp. 169-182. Springer, Boston (2011)
-
(2011)
Advances in Digital Forensics VII
, vol.361
, pp. 169-182
-
-
Flaglien, A.1
Franke, K.2
Årnes, A.3
-
6
-
-
85093847546
-
Peer-to-peer botnets; Overview and case study
-
USENIX Association June
-
Grizzard, J.B., Sharma, V., Nunnery, C., Kang, B.B., Dagon, D.: Peer-to-peer botnets; Overview and case study. In: HotBots 2007: Proceedings of the First USENIXWorkshop on Hot Topics in Understanding Botnets, Cambridge, Mass. USENIX Association (June 2007)
-
(2007)
HotBots 2007: Proceedings of the First USENIXWorkshop on Hot Topics in Understanding Botnets, Cambridge, Mass.
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
7
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
Internet Society February
-
Gu, G., Zhang, J., Lee, W.: BotSniffer: Detecting botnet command and control channels in network traffic. In: NDSS 2008: Proceedings of the 15th Annual Network and Distributed System Security Symposium, San Diego. Internet Society (February 2008)
-
(2008)
NDSS 2008: Proceedings of the 15th Annual Network and Distributed System Security Symposium, San Diego
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
8
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
Gu, G., Perdisci, R., Zhang, J., Lee, W.: Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In: Proceedings of the 17th Conference on Security Symposium, pp. 139-154 (2008)
-
(2008)
Proceedings of the 17th Conference on Security Symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
9
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
USENIX Association July
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting malware infection through IDS-driven dialog correlation. In: Proceedings of the 16th USENIX Security Symposium, San Jose, California, pp. 167-182. USENIX Association (July 2007)
-
(2007)
Proceedings of the 16th USENIX Security Symposium, San Jose, California
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
11
-
-
58049157642
-
Dynamics of trust evolution: Auto-configuration of disposiional trust dynamics
-
July
-
Jensen, C., Korsgaard, T.: Dynamics of trust evolution: Auto-configuration of disposiional trust dynamics. In: Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal, pp. 509-517 (July 2008)
-
(2008)
Proceedings of the International Conference on Security and Cryptography (SECRYPT 2008), Porto, Portugal
, pp. 509-517
-
-
Jensen, C.1
Korsgaard, T.2
-
12
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
USENIX Association June
-
Karasaridis, A., Rexroad, B., Hoeflin, D.: Wide-scale botnet detection and characterization. In: HotBots 2007: Proceedings of the First USENIXWorkshop on Hot Topics in Understanding Botnets, Cambridge, Mass. USENIX Association (June 2007)
-
(2007)
HotBots 2007: Proceedings of the First USENIXWorkshop on Hot Topics in Understanding Botnets, Cambridge, Mass.
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
13
-
-
78751649445
-
Clustering botnet communication traffic based on n-gram feature selection
-
Lu, W., Rammidi, G., Ghorbani, A.A.: Clustering botnet communication traffic based on n-gram feature selection. Computer Communications 34, 502-514 (2011)
-
(2011)
Computer Communications
, vol.34
, pp. 502-514
-
-
Lu, W.1
Rammidi, G.2
Ghorbani, A.A.3
-
14
-
-
0003839495
-
-
PhD thesis, University of Stirling, Dept. of Computer Science and Mathematics
-
Marsh, S.: Formalizing Trust as a Computational Concept, PhD thesis, University of Stirling, Dept. of Computer Science and Mathematics (1994)
-
(1994)
Formalizing Trust As a Computational Concept
-
-
Marsh, S.1
-
15
-
-
63749106613
-
Flow-based identification of botnet traffic by mining multiple log file
-
Masud, M.M., Al-Khateeb, T., Khan, L., Turaisingham, B., Hamlen, K.W.: Flow-based identification of botnet traffic by mining multiple log file. In: Proceedings of the International Conference on Distributed Frameworks and Applications (DFMA), Penang, Malaysia (2008)
-
Proceedings of the International Conference on Distributed Frameworks and Applications (DFMA), Penang, Malaysia (2008)
-
-
Masud, M.M.1
Al-Khateeb, T.2
Khan, L.3
Turaisingham, B.4
Hamlen, K.W.5
-
16
-
-
0038011185
-
Constructing attack scenarios through correlation of intrusion alerts
-
ACM November
-
Ning, P., Cui, Y., Reeves, D.S.: Constructing attack scenarios through correlation of intrusion alerts. In: Proceedings of CCS 2002, pp. 245-254. ACM (November 2002)
-
(2002)
Proceedings of CCS 2002
, pp. 245-254
-
-
Ning, P.1
Cui, Y.2
Reeves, D.S.3
-
17
-
-
78249256060
-
Community Epidemic Detection Using Time-Correlated Anomalies
-
Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
-
Oliner, A.J., Kulkarni, A.V., Aiken, A.: Community Epidemic Detection Using Time-Correlated Anomalies. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 360-381. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6307
, pp. 360-381
-
-
Oliner, A.J.1
Kulkarni, A.V.2
Aiken, A.3
-
18
-
-
44649128920
-
-
Tech. rep., SRI International
-
Porras, P., Saidi, H., Yegneswaran, V.: A multi-perspective analysis of the Storm (peacomm) worm. Tech. rep., SRI International (2007), http://www.cyber-ta.org/pubs/StormWorm/report
-
(2007)
A Multi-perspective Analysis of the Storm (Peacomm) Worm
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
19
-
-
77956435872
-
-
Tech. rep., SRI International
-
Porras, P., Saidi, H., Yegneswaran, V.: Conficker C analysis. Tech. rep., SRI International (2009), http://mtc.sri.com/Conficker/addendumC/index.html
-
(2009)
Conficker C Analysis
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
20
-
-
77952717608
-
Revealing botnet membership using DNSBL counter-intelligence
-
USENIX Association June
-
Ramachandran, A., Feamster, N., Dagon, D.: Revealing botnet membership using DNSBL counter-intelligence. In: SRUTI 2006: Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, San Jose, California, pp. 49-54. USENIX Association (June 2006)
-
(2006)
SRUTI 2006: Proceedings of the 2nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, San Jose, California
, pp. 49-54
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
21
-
-
85090433665
-
Snort - Lightweight intrusion detection for networks
-
USENIX Association
-
Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of Usenix LISA 1999. USENIX Association (1999)
-
(1999)
Proceedings of Usenix LISA 1999
-
-
Roesch, M.1
-
22
-
-
80052095850
-
Detecting P2P botnets through network behavior analysis and machine learning
-
IEEE July
-
Saad, S., Traore, I., Ghorbani, A., Sayed, B., Zhao, D., Lu, W., Felix, J., Hakimian, P.: Detecting P2P botnets through network behavior analysis and machine learning. In: 2011 Ninth Annual International Conference on Privacy, Security and Trust,Montreal. IEEE (July 2011)
-
(2011)
2011 Ninth Annual International Conference on Privacy, Security and Trust,Montreal
-
-
Saad, S.1
Traore, I.2
Ghorbani, A.3
Sayed, B.4
Zhao, D.5
Lu, W.6
Felix, J.7
Hakimian, P.8
-
23
-
-
84857300906
-
Secure data aggregation in wireless sensor networks
-
Lopez, Zhou (eds.)
-
Setia, S., Roy, S., Jajodia, S.: Secure data aggregation in wireless sensor networks. In: Lopez, Zhou (eds.) Wireless Sensor Networks Security (2008)
-
(2008)
Wireless Sensor Networks Security
-
-
Setia, S.1
Roy, S.2
Jajodia, S.3
-
24
-
-
84861616193
-
EFFORT: Efficient and effective bot malware detection
-
IEEE March
-
Shin, S., Xu, Z., Gu, G.: EFFORT: Efficient and effective bot malware detection. In: Proceedings of 31st Annual IEEE Conference on Computer Communications (INFOCOM 2012), Orlando, Florida. IEEE (March 2012)
-
(2012)
Proceedings of 31st Annual IEEE Conference on Computer Communications (INFOCOM 2012), Orlando, Florida
-
-
Shin, S.1
Xu, Z.2
Gu, G.3
-
25
-
-
77950106995
-
TheWaledac protocol: The how and why
-
Sinclair, G., Nunnery, C., Kang, B.B.: TheWaledac protocol: The how and why. In: Proceedings of International Conference on Malicious and Unwanted Software, MALWARE (2009)
-
(2009)
Proceedings of International Conference on Malicious and Unwanted Software, MALWARE
-
-
Sinclair, G.1
Nunnery, C.2
Kang, B.B.3
-
26
-
-
84865618856
-
Characterizing bots' remote control behavior
-
Lee, W., Wang, C., Dagon, D. (eds.) Springer
-
Stinson, E., Mitchell, J.C.: Characterizing bots' remote control behavior. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection, Advances in Information Security, vol. 36, pp. 45-64. Springer (2008)
-
(2008)
Botnet Detection, Advances in Information Security
, vol.36
, pp. 45-64
-
-
Stinson, E.1
Mitchell, J.C.2
-
27
-
-
84882753373
-
Botnet detection based on network behaviour
-
Lee, W., Wang, C., Dagon, D. (eds.) Springer
-
Strayer, W.T., Lapsely, D., Walsh, R., Livadas, C.: Botnet detection based on network behaviour. In: Lee, W., Wang, C., Dagon, D. (eds.) Botnet Detection, Advances in Information Security, vol. 36, pp. 1-24. Springer (2008)
-
(2008)
Botnet Detection, Advances in Information Security
, vol.36
, pp. 1-24
-
-
Strayer, W.T.1
Lapsely, D.2
Walsh, R.3
Livadas, C.4
-
28
-
-
84865626535
-
Symantec global internet security threat report, trends for 2010
-
Symantec Inc.: Symantec Inc. April
-
Symantec Inc.: Symantec global internet security threat report, trends for 2010. Security Report XVI, Symantec Inc. (April 2011)
-
(2011)
Security Report
, vol.16
-
-
-
29
-
-
84865645121
-
-
Symantec Inc. Tech. rep., Symantec Inc.
-
Symantec Inc.: Counterclank bot. Tech. rep., Symantec Inc. (2012), http://www.symantec.com/security-response/writeup.jsp?docid=2012-012709-4046-99
-
(2012)
Counterclank Bot
-
-
-
32
-
-
83455200739
-
Botnet detection architecture based on heterogeneous multi-sensor information fusion
-
Wang, H., Hou, J., Gong, Z.: Botnet detection architecture based on heterogeneous multi-sensor information fusion. Journal of Networks 6(12), 1655-1661 (2011)
-
(2011)
Journal of Networks
, vol.6
, Issue.12
, pp. 1655-1661
-
-
Wang, H.1
Hou, J.2
Gong, Z.3
-
33
-
-
41949089847
-
An advanced hybrid peer-to-peer botnet
-
USENIX Association June
-
Wang, P., Sparks, S., Zou, C.C.: An advanced hybrid peer-to-peer botnet. In: HotBots 2007: Proceedings of the First USENIXWorkshop on Hot Topics in Understanding Botnets, Cambridge, Mass. USENIX Association (June 2007)
-
(2007)
HotBots 2007: Proceedings of the First USENIXWorkshop on Hot Topics in Understanding Botnets, Cambridge, Mass.
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
34
-
-
33751040346
-
Improving collaborative filtering with trust-based metrics
-
ACM, New York
-
Weng, J., Miao, C., Goh, A.: Improving collaborative filtering with trust-based metrics. In: Proceedings of ACMSymposium on Applied Computing (SAC), pp. 1860-1864. ACM, New York (2006)
-
(2006)
Proceedings of ACMSymposium on Applied Computing (SAC)
, pp. 1860-1864
-
-
Weng, J.1
Miao, C.2
Goh, A.3
-
35
-
-
77956602969
-
Detection of botnets using combined host- And network-level information
-
Zeng, Y., Hu, X., Shin, K.G.: Detection of botnets using combined host- and network-level information. In: Proceedings of 40th International Conference on Dependable Systems and Networks, DSN (2010)
-
Proceedings of 40th International Conference on Dependable Systems and Networks, DSN (2010)
-
-
Zeng, Y.1
Hu, X.2
Shin, K.G.3
-
36
-
-
80051935855
-
Detecting stealthy P2P botnets using statistical traffic fingerprints
-
IEEE/IFIP June
-
Zhang, J., Perdisci, R., Lee, W., Sarfraz, U., Luo, X.: Detecting stealthy P2P botnets using statistical traffic fingerprints. In: 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks (DSN), Hong Kong, pp. 121-132. IEEE/IFIP (June 2011)
-
(2011)
2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks (DSN), Hong Kong
, pp. 121-132
-
-
Zhang, J.1
Perdisci, R.2
Lee, W.3
Sarfraz, U.4
Luo, X.5
|