-
1
-
-
66249147541
-
A Survey of Botnet Technology and Defenses
-
March
-
Bailey, M., Cooke, E., Jahanian, F., Xu, Y., Karir, M.: A Survey of Botnet Technology and Defenses. In: Proc. Cybersecurity Applications & Technology Conference for Homeland Security, Washington, DC, USA, pp. 299-304 (March 2009)
-
(2009)
Proc. Cybersecurity Applications & Technology Conference for Homeland Security, Washington, DC, USA
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
2
-
-
84871360611
-
-
Mcafee Co., http://www.mcafee.com
-
-
-
-
3
-
-
84871392438
-
-
Symantec Co., http://www.symantec.com
-
-
-
-
4
-
-
42549102280
-
On the Impact of Low-Rate Attacks
-
June
-
Guirguis, M., Bestavros, A., Matta, I.: On the Impact of Low-Rate Attacks. In: IEEE International Conference and Communications, vol. 5, pp. 2316-2321 (June 2006)
-
(2006)
IEEE International Conference and Communications
, vol.5
, pp. 2316-2321
-
-
Guirguis, M.1
Bestavros, A.2
Matta, I.3
-
5
-
-
80054118821
-
A Network Activity Classification Schema and Its Application to Scan Detection
-
Treurniet, J.: A Network Activity Classification Schema and Its Application to Scan Detection. IEEE/ACM Transactions on Networking 19(5), 1396-1404 (2011)
-
(2011)
IEEE/ACM Transactions on Networking
, vol.19
, Issue.5
, pp. 1396-1404
-
-
Treurniet, J.1
-
6
-
-
79957530146
-
Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics
-
Xiang, Y., Li, K., Zhou, W.: Low-Rate DDoS Attacks Detection and Traceback by Using New Information Metrics. IEEE Transactions on Information Forensics and Security 6(2), 426-437 (2011)
-
(2011)
IEEE Transactions on Information Forensics and Security
, vol.6
, Issue.2
, pp. 426-437
-
-
Xiang, Y.1
Li, K.2
Zhou, W.3
-
7
-
-
4544268957
-
A Flow-based Method for Abnormal Network Traffic Detection
-
Kim, M.-S., Kang, H.-J., Hong, S.-C., Chung, S.-H., Hong, J.W.: A Flow-based Method for Abnormal Network Traffic Detection. In: IEEE/IFIP Network Operations and Management Symposium 2004 (2004)
-
(2004)
IEEE/IFIP Network Operations and Management Symposium 2004
-
-
Kim, M.-S.1
Kang, H.-J.2
Hong, S.-C.3
Chung, S.-H.4
Hong, J.W.5
-
8
-
-
79958707632
-
Nicter: A Large-Scale Network Incident Analysis System
-
Eto, M., Inoue, D., Song, J., Nakazato, J., Ohtaka, K., Nakao, K.: Nicter: A Large- Scale Network Incident Analysis System. In: Proc. First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp. 37-45 (2011)
-
(2011)
Proc. First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security
, pp. 37-45
-
-
Eto, M.1
Inoue, D.2
Song, J.3
Nakazato, J.4
Ohtaka, K.5
Nakao, K.6
-
9
-
-
80053137767
-
A Rule-based Approach for Port Scanning Detection
-
Kanlayasiri, U., Sanguanpong, S., Jaratmanachot, W.: A Rule-based Approach for Port Scanning Detection. In: Proc. 23rd Electrical Engineering Conference, Thailand, pp. 148-153 (2000)
-
(2000)
Proc. 23rd Electrical Engineering Conference, Thailand
, pp. 148-153
-
-
Kanlayasiri, U.1
Sanguanpong, S.2
Jaratmanachot, W.3
-
11
-
-
33745205813
-
Inferring Internet Denial-of-Service Activity
-
Moore, D., Shannon, C., Brown, D., Voelker, G.M., Savage, S.: Inferring Internet Denial-of-Service Activity. ACM Transactions on Computer Systems 24(2), 115-139 (2006)
-
(2006)
ACM Transactions on Computer Systems
, vol.24
, Issue.2
, pp. 115-139
-
-
Moore, D.1
Shannon, C.2
Brown, D.3
Voelker, G.M.4
Savage, S.5
-
12
-
-
14944363571
-
Toward Understanding Distributed Blackhole Placement
-
ACM Press October
-
Cooke, E., Bailey, M., Mao, Z.M., Watson, D., Jahanian, F., McPherson, D.: Toward Understanding Distributed Blackhole Placement. In: Proc. ACM CCS Workshop on Rapid Malcode, pp. 54-64. ACM Press (October 2004)
-
(2004)
Proc. ACM CCS Workshop on Rapid Malcode
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Mao, Z.M.3
Watson, D.4
Jahanian, F.5
McPherson, D.6
-
14
-
-
38049035805
-
Botnet Detection by Monitoring Group Activities in DNS Traffic
-
Choi, H., Lee, H., Lee, H., Kim, H.: Botnet Detection by Monitoring Group Activities in DNS Traffic. In: Proc. 7th IEEE International Conference on Computer and Information Technology, pp. 715-720 (2007)
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology
, pp. 715-720
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
15
-
-
34547399387
-
A Multifaceted Approach to Understanding the Botnet Phenomenon
-
Rajab, M.A., Zarfoss, J., Monrose, F., Terzis, A.: A Multifaceted Approach to Understanding the Botnet Phenomenon. In: Proc. 6th ACM SIGCOMM Conference on Internet Measurement, pp. 41-42 (2006)
-
(2006)
Proc. 6th ACM SIGCOMM Conference on Internet Measurement
, pp. 41-42
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
|