-
1
-
-
84867796906
-
-
BotLab
-
BotLab, "BotLab: A study in spam," 2011 [Online]. Available: http://botlab.org
-
(2011)
BotLab: A Study in Spam
-
-
-
2
-
-
84867817051
-
-
McAfee
-
McAfee, "McAfee Site Advisor," 2011 [Online]. Available: http://www.siteadvisor.com
-
(2011)
McAfee Site Advisor
-
-
-
3
-
-
60349090690
-
-
Damballa, Inc., Atlanta, GA
-
P. Royal, "On Kraken and Bobax botnets," Damballa, Inc., Atlanta, GA, 2008 [Online]. Available: http://www.damballa.com/downloads/r-pubs/ Kraken-Response.pdf
-
(2008)
On Kraken and Bobax Botnets
-
-
Royal, P.1
-
4
-
-
60349090690
-
-
Damballa, Inc., Atlanta, GA
-
P. Royal, "On Kraken and Bobax botnets," Damballa, Inc., Atlanta, GA, 2008 [Online]. Available: http://www.damballa.com/downloads/r-pubs/ Kraken-Response.pdf
-
(2008)
On Kraken and Bobax Botnets
-
-
Royal, P.1
-
5
-
-
84867833362
-
-
PC Tools
-
PC Tools, "PC Tools experts crack new Kraken," 2008 [Online]. Available: http://www.pctools.com/news/view/id/202/
-
(2008)
PC Tools Experts Crack New Kraken
-
-
-
6
-
-
84867833361
-
Twitter API still attracts hackers
-
"Twitter API still attracts hackers," Unmask Parasites blog, 2009 [Online]. Available: http://blog.unmaskparasites.com/2009/12/09/twitterapi- still-attracts-hackers/
-
(2009)
Unmask Parasites Blog
-
-
-
7
-
-
84867824972
-
-
WOT
-
WOT, "Web of Trust," 2011 [Online]. Available: http://mywot.com
-
(2011)
Web of Trust
-
-
-
8
-
-
84867802728
-
-
Microsoft
-
Microsoft, "Win32/Hamewq," 2009 [Online]. Available: http://www.microsoft.com/security/portal/Threat/Encyclopedia/Entry. aspx?Name=Win32/Hamweq
-
(2009)
Win32/Hamewq
-
-
-
9
-
-
84867757379
-
-
Yahoo! Research
-
Yahoo! Research, "Yahoo! Webspam database," [Online]. Available: http://barcelona.research.yahoo.net/webspam/datasets/uk2007/
-
Yahoo! Webspam Database
-
-
-
10
-
-
85068725031
-
Building a dynamic reputation system for DNS
-
M. Antonakakis, R. Perdisci, D. Dagon, W. Lee, and N. Feamster, "Building a dynamic reputation system for DNS," in Proc. USENIX Security Symp., 2010, p. 18.
-
(2010)
Proc. USENIX Security Symp.
, pp. 18
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
11
-
-
33845807843
-
Spam filtering using statistical data compression models
-
A. Bratko, G. V. Cormack, B. Filipic, T. R. Lynam, and B. Zupan, "Spam filtering using statistical data compression models," J. Mach. Learning Res., vol. 7, pp. 2673-2698, 2006. (Pubitemid 46011492)
-
(2006)
Journal of Machine Learning Research
, vol.7
, pp. 2673-2698
-
-
Bratko, A.1
Filipic, B.2
Cormack, G.V.3
Lynam, T.R.4
Zupan, B.5
-
14
-
-
78751511305
-
Measurement and classification of humans and bots in internet chat
-
S. Gianvecchio,M. Xie, Z.Wu, and H.Wang, "Measurement and classification of humans and bots in internet chat," in Proc. 17th USENIX Security, 2008, pp. 155-169.
-
(2008)
Proc. 17th USENIX Security
, pp. 155-169
-
-
Gianvecchio, S.1
Xie, M.2
Wu, Z.3
Wang, H.4
-
15
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection," in Proc. 17th USENIX Security, 2008, pp. 139-154.
-
(2008)
Proc. 17th USENIX Security
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
16
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
Feb.
-
G. Gu, J. Zhang, and W. Lee, "BotSniffer: Detecting botnet command and control channels in network traffic," presented at the 15th Annu. NDSS, Feb. 2008.
-
(2008)
The 15th Annu. NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
17
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Apr. Article no. 9
-
T. Holz, M. Steiner, F. Dahl, E. W. Biersack, and F. Freiling, "Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm," in Proc. 1st USENIX LEET, Apr. 2008, Article no. 9.
-
(2008)
Proc. 1st USENIX LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.W.4
Freiling, F.5
-
18
-
-
70350630557
-
Beyond blacklists: Learning to detect malicious Web sites from suspicious URLs
-
Jul.
-
S. Savage, J. Ma, L. K. Saul, and G. Voelker, "Beyond blacklists: Learning to detect malicious Web sites from suspicious URLs," in Proc. ACM KDD, Jul. 2009, pp. 1245-1254.
-
(2009)
Proc. ACM KDD
, pp. 1245-1254
-
-
Savage, S.1
Ma, J.2
Saul, L.K.3
Voelker, G.4
-
20
-
-
85076932663
-
Studying spamming botnets using botlab
-
J. P. John, A. MoshChuck, S. D. Gribble, and A. Krishnamurthy, "Studying spamming botnets using botlab," in Proc. NSDI, 2009, pp. 291-306.
-
(2009)
Proc. NSDI
, pp. 291-306
-
-
John, J.P.1
Moshchuck, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
21
-
-
67649946711
-
Dynamics of online scam hosting infrastructure
-
M. Konte, N. Feamster, and J. Jung, "Dynamics of online scam hosting infrastructure," in Proc. Passive Active Meas. Conf., 2009, pp. 219-228.
-
(2009)
Proc. Passive Active Meas. Conf.
, pp. 219-228
-
-
Konte, M.1
Feamster, N.2
Jung, J.3
-
23
-
-
85084094635
-
Behind phishing: An examination of phisher modi operandi
-
Apr. Article no. 4
-
D. K. McGrath and M. Gupta, "Behind phishing: An examination of phisher modi operandi," in Proc. USENIX LEET, Apr. 2008, Article no. 4.
-
(2008)
Proc. USENIX LEET
-
-
McGrath, D.K.1
Gupta, M.2
-
24
-
-
49949091964
-
Fluxor: Detecting and monitoring fast-flux service networks
-
E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi, "Fluxor: Detecting and monitoring fast-flux service networks," in Proc. Detection Intrusions Malware, Vulnerability Assess., 2008, pp. 186-206.
-
(2008)
Proc. Detection Intrusions Malware, Vulnerability Assess
, pp. 186-206
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
25
-
-
77950795817
-
Detecting malicious flux service networks through passive analysis of recursive DNS traces
-
Dec.
-
R. Perdisci, I. Corona, D. Dagon, and W. Lee, "Detecting malicious flux service networks through passive analysis of recursive DNS traces," in Proc. ACSAC, Dec. 2009, pp. 311-320.
-
(2009)
Proc. ACSAC
, pp. 311-320
-
-
Perdisci, R.1
Corona, I.2
Dagon, D.3
Lee, W.4
-
26
-
-
60349101742
-
Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems
-
DOI 10.1109/ICDM.2006.165, 4053075, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
-
R. Perdisci, G. Gu, and W. Lee, "Using an ensemble of one-class SVM classifiers to harden payload-based anomaly detection systems," in Proc. IEEE ICDM, 2006, pp. 488-498. (Pubitemid 47485828)
-
(2007)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 488-498
-
-
Perdisci, R.1
Gu, O.2
Lee, W.3
-
27
-
-
77956153922
-
Conficker C P2P protocol and implementation
-
Menlo Park, CA, Tech. Rep. Sep.
-
P. Porras, H. Saidi, and V. Yegneswaran, "Conficker C P2P protocol and implementation," SRI International, Menlo Park, CA, Tech. Rep., Sep. 2009.
-
(2009)
SRI International
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
30
-
-
80052735307
-
Inside the storm: Protocols and encryption of the storm botnet
-
J. Stewart, "Inside the storm: Protocols and encryption of the storm botnet," presented at the Black Hat Tech. Security Conf., 2008.
-
(2008)
The Black Hat Tech. Security Conf.
-
-
Stewart, J.1
-
31
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Nov.
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in Proc. ACM CCS, Nov. 2009, pp. 635-647.
-
(2009)
Proc. ACM CCS
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
33
-
-
65249141597
-
Unconstrained endpoint profiling: Googling the internet
-
Aug.
-
I. Trestian, S. Ranjan, A. Kuzmanovic, and A. Nucci, "Unconstrained endpoint profiling: Googling the internet," in Proc. ACM SIGCOMM, Aug. 2008, pp. 279-290.
-
(2008)
Proc. ACM SIGCOMM
, pp. 279-290
-
-
Trestian, I.1
Ranjan, S.2
Kuzmanovic, A.3
Nucci, A.4
-
34
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov, "Spamming botnets: Signatures and characteristics," Comput. Commun. Rev., vol. 38, no. 4, pp. 171-182, 2008.
-
(2008)
Comput. Commun. Rev.
, vol.38
, Issue.4
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
35
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum, "Botgraph: Large scale spamming botnet detection," in Proc. USENIX NSDI, 2009, pp. 321-334.
-
(2009)
Proc. USENIX NSDI
, pp. 321-334
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|