-
2
-
-
84870945049
-
-
Cuttlefish. http://www.caida.org/tools/ visualization/cuttlefish/.
-
Cuttlefish
-
-
-
5
-
-
84870946974
-
-
tcpdump. http://www.tcpdump.org.
-
-
-
-
6
-
-
84870948874
-
-
November
-
The asterisk-users mailing-list archives. http://lists.digium.com/ pipermail/asteriskusers/2010-November/thread.html, November 2010.
-
(2010)
The Asterisk-users Mailing-list Archives
-
-
-
7
-
-
82955188378
-
-
UCSD Network Telescope, 2010. http://www.caida.org/data/passive/network- telescope.xml.
-
(2010)
UCSD Network Telescope
-
-
-
8
-
-
84870917070
-
-
November
-
The voipsec mailing-list archives. http://voipsa.org/pipermail/voipsec- voipsa.org/2010-November/thread.html, November 2010.
-
(2010)
The Voipsec Mailing-list Archives
-
-
-
9
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
New York, NY, USA, ACM
-
M. Abu Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC '06, pages 41-52, New York, NY, USA, 2006. ACM.
-
(2006)
Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement, IMC '06
, pp. 41-52
-
-
Abu Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
11
-
-
84882582017
-
An Inside Look at Botnets
-
M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Malware Detection, Springer
-
P. Barford and V. Yegneswaran. An Inside Look at Botnets. In M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, editors, Malware Detection, volume 27 of Advanced in Information Security. Springer, 2006.
-
(2006)
Advanced in Information Security
, vol.27
-
-
Barford, P.1
Yegneswaran, V.2
-
14
-
-
84877759806
-
Geolocalization of proxied services and its application to fast-flux hidden servers
-
New York, NY, USA, ACM
-
C. Castelluccia, M. A. Kaafar, P. Manils, and D. Perito. Geolocalization of proxied services and its application to fast-flux hidden servers. In Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC '09, pages 184-189, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference, IMC '09
, pp. 184-189
-
-
Castelluccia, C.1
Kaafar, M.A.2
Manils, P.3
Perito, D.4
-
16
-
-
78650035884
-
Inference and analysis of formal models of botnet command and control protocols
-
New York, NY, USA, ACM
-
C. Y. Cho, D. Babi ć, E. C. R. Shin, and D. Song. Inference and analysis of formal models of botnet command and control protocols. In Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, pages 426-439, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 426-439
-
-
Cho, C.Y.1
Babi Ć, D.2
Shin, E.C.R.3
Song, D.4
-
17
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Berkeley, CA, USA, USENIX Association
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: understanding, detecting, and disrupting botnets. In Proceedings of the Steps to Reducing Unwanted Traffic on the Internet, SRUTI'05, pages 6-6, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet, SRUTI'05
, pp. 6-6
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
18
-
-
48649089769
-
A taxonomy of botnet structures
-
dec.
-
D. Dagon, G. Gu, C. Lee, and W. Lee. A taxonomy of botnet structures. In Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual, pages 325-339, dec. 2007.
-
(2007)
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third Annual
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.3
Lee, W.4
-
19
-
-
82955161573
-
Analysis of country-wide internet outages caused by censorship
-
New York, NY, USA, ACM
-
A. Dainotti, C. Squarcella, E. Aben, K. C. Claffy, M. Chiesa, M. Russo, and A. Pescapé. Analysis of country-wide internet outages caused by censorship. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC '11, pages 1-18, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11
, pp. 1-18
-
-
Dainotti, A.1
Squarcella, C.2
Aben, E.3
Claffy, K.C.4
Chiesa, M.5
Russo, M.6
Pescapé, A.7
-
27
-
-
84870889445
-
-
June
-
C. W. Group. Conficker working group lessons learned. http://www.confickerworkinggroup.org/wiki/uploads/Conficker-Working-Group- Lessons-Learned-17-June-2010-final.pdf, June 2010.
-
(2010)
Conficker Working Group Lessons Learned
-
-
-
30
-
-
84856206752
-
Security status of voip based on the observation of real-world attacks on a honeynet
-
oct.
-
M. Gruber, F. Fankhauser, S. Taber, C. Schanes, and T. Grechenig. Security status of voip based on the observation of real-world attacks on a honeynet. In Privacy, security, risk and trust (passat), IEEE third international conference on social computing (socialcom), pages 1041-1047, oct. 2011.
-
(2011)
Privacy, Security, Risk and Trust (Passat), IEEE Third International Conference on Social Computing (Socialcom)
, pp. 1041-1047
-
-
Gruber, M.1
Fankhauser, F.2
Taber, S.3
Schanes, C.4
Grechenig, T.5
-
32
-
-
63049115876
-
Census and survey of the visible internet
-
New York, NY, USA, ACM
-
J. Heidemann, Y. Pradkin, R. Govindan, C. Papadopoulos, G. Bartlett, and J. Bannister. Census and survey of the visible internet. In Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, IMC '08, pages 169-182, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 8th ACM SIGCOMM Conference on Internet Measurement, IMC '08
, pp. 169-182
-
-
Heidemann, J.1
Pradkin, Y.2
Govindan, R.3
Papadopoulos, C.4
Bartlett, G.5
Bannister, J.6
-
33
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Berkeley, CA, USA
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm. In Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET'08, pages 9:1-9:9, Berkeley, CA, USA, 2008.
-
(2008)
Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, LEET'08
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
35
-
-
85076490024
-
Show me the money: Characterizing spam-advertised revenue
-
Berkeley, CA, USA, USENIX Association
-
C. Kanich, N. Weavery, D. McCoy, T. Halvorson, C. Kreibichy, K. Levchenko, V. Paxson, G. M. Voelker, and S. Savage. Show me the money: characterizing spam-advertised revenue. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 15-15, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 15-15
-
-
Kanich, C.1
Weavery, N.2
McCoy, D.3
Halvorson, T.4
Kreibichy, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
36
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
Berkeley, CA, USA, USENIX Association
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: an inside look at spam campaign orchestration. In Proceedings of the 2nd USENIX conference on Large-scale exploits and emergent threats: botnets, spyware, worms, and more, LEET'09, pages 4-4, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
Proceedings of the 2nd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More, LEET'09
, pp. 4-4
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
37
-
-
78650916363
-
Demystifying service discovery: Implementing an internet-wide scanner
-
New York, NY, USA, ACM
-
D. Leonard and D. Loguinov. Demystifying service discovery: implementing an internet-wide scanner. In Proceedings of the 10th annual conference on Internet measurement, IMC '10, pages 109-122, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 10th Annual Conference on Internet Measurement, IMC '10
, pp. 109-122
-
-
Leonard, D.1
Loguinov, D.2
-
38
-
-
84881411869
-
Honeynet-based botnet scan traffic analysis
-
W. Lee, C. Wang, and D. Dagon, editors, Botnet Detection, Springer
-
Z. Li, A. Goyal, and Y. Chen. Honeynet-based botnet scan traffic analysis. In W. Lee, C. Wang, and D. Dagon, editors, Botnet Detection, volume 36 of Advances in Information Security, pages 25-44. Springer, 2008.
-
(2008)
Advances in Information Security
, vol.36
, pp. 25-44
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
-
39
-
-
79951817047
-
Towards situational awareness of large-scale botnet probing events
-
march
-
Z. Li, A. Goyal, Y. Chen, and V. Paxson. Towards situational awareness of large-scale botnet probing events. Information Forensics and Security, IEEE Transactions on, 6(1):175-188, march 2011.
-
(2011)
Information Forensics and Security, IEEE Transactions on
, vol.6
, Issue.1
, pp. 175-188
-
-
Li, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
40
-
-
77952376102
-
Automatic discovery of botnet communities on large-scale communication networks
-
New York, NY, USA, ACM
-
W. Lu, M. Tavallaee, and A. A. Ghorbani. Automatic discovery of botnet communities on large-scale communication networks. ASIACCS '09, pages 1-10, New York, NY, USA, 2009. ACM.
-
(2009)
ASIACCS '09
, pp. 1-10
-
-
Lu, W.1
Tavallaee, M.2
Ghorbani, A.A.3
-
44
-
-
84870931909
-
-
M. D. Network. bind function. http://msdn.microsoft.com/enus/library/ ms737550%28VS.85%29.aspx, 2012.
-
(2012)
M. D. Network. Bind Function
-
-
-
45
-
-
70449652587
-
Botnet spam campaigns can be long lasting: Evidence, implications, and analysis
-
New York, NY, USA, ACM
-
A. Pathak, F. Qian, Y. C. Hu, Z. M. Mao, and S. Ranjan. Botnet spam campaigns can be long lasting: evidence, implications, and analysis. SIGMETRICS '09, pages 13-24, New York, NY, USA, 2009. ACM.
-
(2009)
SIGMETRICS '09
, pp. 13-24
-
-
Pathak, A.1
Qian, F.2
Hu, Y.C.3
Mao, Z.M.4
Ranjan, S.5
-
48
-
-
33750365498
-
Understanding the network-level behavior of spammers
-
New York, NY, USA, ACM
-
A. Ramachandran and N. Feamster. Understanding the network-level behavior of spammers. SIGCOMM '06, pages 291-302, New York, NY, USA, 2006. ACM.
-
(2006)
SIGCOMM '06
, pp. 291-302
-
-
Ramachandran, A.1
Feamster, N.2
-
49
-
-
0037984544
-
-
RFC 3261 (Proposed Standard), June
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261 (Proposed Standard), June 2002.
-
(2002)
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
50
-
-
0003596534
-
-
Universitext. New York: Springer-Verlag. DM 54.00; öS 421.20; sFr. 54.00
-
H. Sagan. Space-filling curves. Universitext. New York: Springer-Verlag. xv, 193 p. DM 54.00; öS 421.20; sFr. 54.00 , 1994.
-
(1994)
Space-filling Curves
, vol.15
, pp. 193
-
-
Sagan, H.1
-
54
-
-
78751529749
-
Conficker and beyond: A large-scale empirical study
-
New York, NY, USA, ACM
-
S. Shin and G. Gu. Conficker and beyond: a large-scale empirical study. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10, pages 151-160, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 151-160
-
-
Shin, S.1
Gu, G.2
-
55
-
-
84863368947
-
A large-scale empirical study of conficker
-
april
-
S. Shin, G. Gu, N. Reddy, and C. Lee. A large-scale empirical study of conficker. Information Forensics and Security, IEEE Transactions on, 7(2):676-690, april 2012.
-
(2012)
Information Forensics and Security, IEEE Transactions on
, vol.7
, Issue.2
, pp. 676-690
-
-
Shin, S.1
Gu, G.2
Reddy, N.3
Lee, C.4
-
57
-
-
85084162258
-
How to own the internet in your spare time
-
Berkeley, CA, USA, USENIX Association
-
S. Staniford, V. Paxson, and N. Weaver. How to own the internet in your spare time. In Proceedings of the 11th USENIX Security Symposium, pages 149-167, Berkeley, CA, USA, 2002. USENIX Association.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 149-167
-
-
Staniford, S.1
Paxson, V.2
Weaver, N.3
-
59
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
New York, NY, USA, ACM
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pages 635-647, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
60
-
-
84870865825
-
-
University of Oregon. University of Oregon Route Views project
-
University of Oregon. University of Oregon Route Views project. http://www.routeviews.org.
-
-
-
-
61
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
New York, NY, USA, ACM
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming botnets: signatures and characteristics. In Proceedings of the ACM SIGCOMM 2008 conference on Data communication, SIGCOMM '08, pages 171-182, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication, SIGCOMM '08
, pp. 171-182
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
63
-
-
84870922372
-
-
v3
-
M. Zalewski. p0f v3. http://lcamtuf.coredump.cx/p0f3/, 2012.
-
(2012)
P0f
-
-
Zalewski, M.1
-
65
-
-
16344396406
-
Monitoring and early warning for internet worms
-
New York, NY, USA, ACM
-
C. C. Zou, L. Gao,W. Gong, and D. Towsley. Monitoring and early warning for internet worms. In Proceedings of the 10th ACM conference on Computer and communications security, CCS '03, pages 190-199, New York, NY, USA, 2003. ACM.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS '03
, pp. 190-199
-
-
Zou, C.C.1
Gao, L.2
Gong, W.3
Towsley, D.4
|