-
1
-
-
85043201839
-
Scalable, behavior-based malware clustering
-
U. Bayer, P. M. Comparetti, C. Hlauschek, C. Kruegel, and E. Kirda. Scalable, Behavior-Based Malware Clustering. In NDSS, 2009.
-
(2009)
NDSS
-
-
Bayer, U.1
Comparetti, P.M.2
Hlauschek, C.3
Kruegel, C.4
Kirda, E.5
-
3
-
-
85080378133
-
An algorithm for anomaly-based botnet detection
-
J. R. Binkley. An algorithm for anomaly-based botnet detection. In SRUTI, 2006.
-
(2006)
SRUTI
-
-
Binkley, J.R.1
-
4
-
-
77953146322
-
Clues: An R package for nonparametric clustering based on local shrinking
-
2
-
F. Chang, W. Qiu, R. H. Zamar, R. Lazarus, and X. Wang. clues: An R Package for Nonparametric Clustering Based on Local Shrinking. Journal of Statistical Software, 33(4):1-16, 2 2010.
-
(2010)
Journal of Statistical Software
, vol.33
, Issue.4
, pp. 1-16
-
-
Chang, F.1
Qiu, W.2
Zamar, R.H.3
Lazarus, R.4
Wang, X.5
-
5
-
-
77955158454
-
Cisco systems netflow services export version 9
-
Oct.
-
B. Claise. Cisco systems netflow services export version 9. RFC 3954, IETF, Oct. 2004.
-
(2004)
RFC 3954, IETF
-
-
Claise, B.1
-
6
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson. The Zombie roundup: understanding, detecting, and disrupting botnets. In SRUTI, 2005.
-
(2005)
SRUTI
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
7
-
-
78751473146
-
Friends of an enemy: Identifying local members of peer-to-peer botnets using mutual contacts
-
B. Coskun, S. Dietrich, and N. Memon. Friends of An Enemy: Identifying Local Members of Peer-to-Peer Botnets Using Mutual Contacts. In ACSAC, 2010.
-
(2010)
ACSAC
-
-
Coskun, B.1
Dietrich, S.2
Memon, N.3
-
8
-
-
70349240080
-
Ether: Malware analysis via hardware virtualization extensions
-
A. Dinaburg, P. Royal, M. Sharif, and W. Lee. Ether: malware analysis via hardware virtualization extensions. In ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Dinaburg, A.1
Royal, P.2
Sharif, M.3
Lee, W.4
-
9
-
-
34547359214
-
Evading network anomaly detection systems: Formal reasoning and practical techniques
-
P. Fogla and W. Lee. Evading network anomaly detection systems: formal reasoning and practical techniques. In ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Fogla, P.1
Lee, W.2
-
10
-
-
85077703150
-
Polymorphic blending attacks
-
P. Fogla, M. Sharif, R. Perdisci, O. Kolesnikov, and W. Lee. Polymorphic blending attacks. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Fogla, P.1
Sharif, M.2
Perdisci, R.3
Kolesnikov, O.4
Lee, W.5
-
11
-
-
77952415099
-
An inquiry into the nature and causes of the wealth of internet miscreants
-
J. Franklin, V. Paxson, A. Perrig, and S. Savage. An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants. In ACM CCS, 2007.
-
(2007)
ACM CCS
-
-
Franklin, J.1
Paxson, V.2
Perrig, A.3
Savage, S.4
-
13
-
-
33746632334
-
Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks
-
F. Freiling, T. Holz, and G. Wicherski. Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks. In ESORICS, 2005.
-
(2005)
ESORICS
-
-
Freiling, F.1
Holz, T.2
Wicherski, G.3
-
14
-
-
80051950220
-
Exploiting temporal persistence to detect covert botnet channels
-
F. Giroire, J. Chandrashekar, N. Taft, E. M. Schooler, and D. Papagiannaki. Exploiting Temporal Persistence to Detect Covert Botnet Channels. In RAID, 2009.
-
(2009)
RAID
-
-
Giroire, F.1
Chandrashekar, J.2
Taft, N.3
Schooler, E.M.4
Papagiannaki, D.5
-
15
-
-
85093871360
-
Rishi: Identify bot contaminated hosts by IRC nickname evaluation
-
J. Goebel and T. Holz. Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation. In USENIX HotBots, 2007.
-
(2007)
USENIX HotBots
-
-
Goebel, J.1
Holz, T.2
-
16
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. BotMiner: Clustering Analysis of Network Traffic for Protocol-and Structure-Independent Botnet Detection. In USENIX Security, 2008.
-
(2008)
USENIX Security
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
17
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation. In USENIX Security, 2007.
-
(2007)
USENIX Security
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
18
-
-
85175133385
-
BotSniffer: Detecting botnet command and control channels in network traffic
-
G. Gu, J. Zhang, and W. Lee. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. In NDSS, 2008.
-
(2008)
NDSS
-
-
Gu, G.1
Zhang, J.2
Lee, W.3
-
21
-
-
84888316706
-
Jackstraws: Picking command and control connections from bot traffic
-
G. Jacob, R. Hund, C. Kruegel, and T. Holz. Jackstraws: Picking Command and Control Connections from Bot Traffic. USENIX Security, 2011.
-
(2011)
USENIX Security
-
-
Jacob, G.1
Hund, R.2
Kruegel, C.3
Holz, T.4
-
23
-
-
0033167362
-
Gravitational clustering: A new approach based on the spatial distribution of the points
-
S. Kundu. Gravitational clustering: a new approach based on the spatial distribution of the points. Pattern Recognition, 32(7):1149-1160, 1999.
-
(1999)
Pattern Recognition
, vol.32
, Issue.7
, pp. 1149-1160
-
-
Kundu, S.1
-
24
-
-
85059753615
-
Botgrep: Finding p2p bots with structured graph analysis
-
S. Nagaraja, P. Mittal, C.-Y. Hong, M. Caesar, and N. Borisov. Botgrep: finding p2p bots with structured graph analysis. In USENIX Security, 2010.
-
(2010)
USENIX Security
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.-Y.3
Caesar, M.4
Borisov, N.5
-
25
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: a System for Detecting Network Intruders in Real-Time. Computer Networks, 31(23-24):2435-2463, 1999.
-
(1999)
Computer Networks
, vol.31
, Issue.23-24
, pp. 2435-2463
-
-
Paxson, V.1
-
26
-
-
84871993969
-
Misleading worm signature generators using deliberate noise injection
-
R. Perdisci, D. Dagon, P. Fogla, and M. Sharif. Misleading worm signature generators using deliberate noise injection. In IEEE S&P, 2006.
-
(2006)
IEEE S&P
-
-
Perdisci, R.1
Dagon, D.2
Fogla, P.3
Sharif, M.4
-
27
-
-
84855844576
-
Behavioral clustering of http-based malware and signature generation using malicious network traces
-
R. Perdisci, W. Lee, and N. Feamster. Behavioral clustering of http-based malware and signature generation using malicious network traces. In USENIX NSDI, 2010.
-
(2010)
USENIX NSDI
-
-
Perdisci, R.1
Lee, W.2
Feamster, N.3
-
28
-
-
79951480123
-
-
R Development Core Team R Foundation for Statistical Computing, Vienna, Austria
-
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2010.
-
(2010)
R: A Language and Environment for Statistical Computing
-
-
-
29
-
-
84871999581
-
A multifaceted approach to understanding the botnet phenomenon
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A Multifaceted Approach to Understanding the Botnet Phenomenon. In ACM IMC, 2006.
-
(2006)
ACM IMC
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
30
-
-
70449684394
-
BitBlaze: A new approach to computer security via binary analysis
-
D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. Kang, Z. Liang, J. Newsome, P. Poosankam, and P. Saxena. BitBlaze: A New Approach to Computer Security via Binary Analysis. In ICISS. 2008.
-
(2008)
ICISS
-
-
Song, D.1
Brumley, D.2
Yin, H.3
Caballero, J.4
Jager, I.5
Kang, M.6
Liang, Z.7
Newsome, J.8
Poosankam, P.9
Saxena, P.10
-
31
-
-
85084162557
-
Towards systematic evaluation of the evadability of bot/botnet detection methods
-
E. Stinson and J. C. Mitchell. Towards systematic evaluation of the evadability of bot/botnet detection methods. In USENIX WOOT, 2008.
-
(2008)
USENIX WOOT
-
-
Stinson, E.1
Mitchell, J.C.2
-
32
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
33
-
-
41949115980
-
Detecting botnets with tight command and control
-
W. T. Strayer, R. Walsh, C. Livadas, and D. Lapsley. Detecting botnets with tight command and control. In Proceedings of the 31st IEEE Conference on Local Computer Networks, pages 195-202, 2006.
-
(2006)
Proceedings of the 31st IEEE Conference on Local Computer Networks
, pp. 195-202
-
-
Strayer, W.T.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
34
-
-
34548255908
-
Clues: A non-parametric clustering method based on local shrinking
-
X. Wang, W. Qiu, and R. H. Zamar. Clues: A non-parametric clustering method based on local shrinking. Computational Statistics and Data Analysis, 52(1):286-298, 2007.
-
(2007)
Computational Statistics and Data Analysis
, vol.52
, Issue.1
, pp. 286-298
-
-
Wang, X.1
Qiu, W.2
Zamar, R.H.3
-
35
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
C. Willems, T. Holz, and F. Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE S&P, 2007.
-
(2007)
IEEE S&P
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
36
-
-
78650896043
-
Automatically generating models for botnet detection
-
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda. Automatically Generating Models for Botnet Detection. In ESORICS, 2009.
-
(2009)
ESORICS
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
37
-
-
58449108281
-
Traffic aggregation for malware detection
-
T.-F. Yen and M. K. Reiter. Traffic Aggregation for Malware Detection. In DIMVA, 2008.
-
(2008)
DIMVA
-
-
Yen, T.-F.1
Reiter, M.K.2
|