-
1
-
-
84870720286
-
-
Conficker Working Group, http://www.confickerworkinggroup.org/wiki/ pmwiki.php/ANY/FAQ#toc5
-
-
-
-
2
-
-
84870665870
-
-
New Technique Spots Sneaky Botnets, http://mobile.darkreading.com/9292/ show/4711c9403b772e7281ae08cee69758cc&t=461a4a89abc0a0c761234d11086f5003
-
New Technique Spots Sneaky Botnets
-
-
-
3
-
-
85061529860
-
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
-
Gu, G., Porras, P., Yegneswaran, V., Fong, M., Lee, W.: BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In: Proc. of the 16th USENIX Security Symposium (Security 2007) (August 2007)
-
Proc. of the 16th USENIX Security Symposium (Security 2007) (August 2007)
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
4
-
-
79957629730
-
Identifying Suspicious Activities Through DNS Failure Graph Analysis
-
Jiang, N., Cao, J., Jin, Y., Li, L.E., Zhang, Z.-L.: Identifying Suspicious Activities Through DNS Failure Graph Analysis. In: IEEE Conference on Network Protocols (2010)
-
IEEE Conference on Network Protocols (2010)
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
Li, L.E.4
Zhang, Z.-L.5
-
7
-
-
0003509661
-
-
Rekhter, Y., Moskowitz, B., Karrenberg, D., de Groot, G., Lear, E.: Address Allocation for Private Internets (1996), http://www.ietf.org/rfc/ rfc1918.txt
-
(1996)
Address Allocation for Private Internets
-
-
Rekhter, Y.1
Moskowitz, B.2
Karrenberg, D.3
De Groot, G.4
Lear, E.5
-
8
-
-
74049154670
-
Your Botnet is My Botnet: Analysis of a Botnet Takeover
-
November
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your Botnet is My Botnet: Analysis of a Botnet Takeover. In: ACM Conference on Computer and Communications Security (CCS) (November 2009)
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
10
-
-
72949095419
-
Bayesian Bot Detection Based on DNS Traffic Similarity
-
ACM, New York
-
Villamarín-Salomón, R., Brustoloni, J.C.: Bayesian Bot Detection Based on DNS Traffic Similarity. In: Proceedings of the 2009 ACMSymposium on Applied Computing, SAC 2009, pp. 2035-2041. ACM, New York (2009)
-
(2009)
Proceedings of the 2009 ACMSymposium on Applied Computing, SAC 2009
, pp. 2035-2041
-
-
Villamarín-Salomón, R.1
Brustoloni, J.C.2
-
11
-
-
78650869579
-
Detecting Algorithmically Generated Malicious Domain Names
-
Yadav, S., Reddy, A.K.K., Reddy, A.L.N., Ranjan, S.: Detecting Algorithmically Generated Malicious Domain Names. In: Internet Measurement Conference (2010)
-
Internet Measurement Conference (2010)
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.N.3
Ranjan, S.4
-
13
-
-
84869596416
-
Using Failure Information Analysis to Detect Enterprise Zombies
-
Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. Springer, Heidelberg
-
Zhu, Z., Yegneswaran, V., Chen, Y.: Using Failure Information Analysis to Detect Enterprise Zombies. In: Chen, Y., Dimitriou, T.D., Zhou, J. (eds.) SecureComm 2009. LNICST, vol. 19, pp. 185-206. Springer, Heidelberg (2009)
-
(2009)
LNICST
, vol.19
, pp. 185-206
-
-
Zhu, Z.1
Yegneswaran, V.2
Chen, Y.3
|