-
3
-
-
78649407428
-
-
Apache Foundation
-
Apache Foundation. Spamassassin. http:// spamassassin.apache.org.
-
Spamassassin
-
-
-
6
-
-
85084097075
-
Insights from the inside: A view of botnet management from infiltration
-
C. Cho, J. Caballero, C. Grier, V. Paxson, and D. Song. Insights from the Inside: A View of Botnet Management from Infiltration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2010.
-
(2010)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Cho, C.1
Caballero, J.2
Grier, C.3
Paxson, V.4
Song, D.5
-
7
-
-
56449096542
-
-
Cisco Inc.
-
Cisco Inc. Cisco IOS NetFlow. https: //www.cisco.com/en/US/products/ ps6601/products_ios_protocol_ group_home.html.
-
Cisco IOS NetFlow
-
-
-
9
-
-
85075837457
-
Bot-miner: Clustering analysis of network traffic for protocol- And structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee. Bot-Miner: Clustering Analysis of Network Traffic for Protocol- and Structure-independent Botnet Detection. In USENIX Security Symposium, 2008.
-
(2008)
USENIX Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
10
-
-
85041447270
-
Detecting spammers with snare: Spatio-temporal network-level automatic reputation engine
-
S. Hao, N. A. Syed, N. Feamster, A. G. Gray, and S. Krasser. Detecting Spammers with SNARE: Spatio-temporal Network-level Automatic Reputation Engine. In USENIX Security Symposium, 2009.
-
(2009)
USENIX Security Symposium
-
-
Hao, S.1
Syed, N.A.2
Feamster, N.3
Gray, A.G.4
Krasser, S.5
-
12
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. Voelker, V. Paxson, and S. Savage. Spamalytics: An Empirical Analysis of Spam Marketing Conversion. In ACM Conference on Computer and Communications Security (CCS), 2008.
-
(2008)
ACM Conference on Computer and Communications Security (CCS)
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.5
Paxson, V.6
Savage, S.7
-
13
-
-
85076500242
-
-
M. Khmartseva. Email Statistics Report. http://www.radicati.com/wp/wpcontent/ uploads/2009/05/emailstats-report-exec-summary.pdf, 2009.
-
(2009)
Email Statistics Report
-
-
Khmartseva, M.1
-
15
-
-
85084096033
-
On the spam campaign trail
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. On the Spam Campaign Trail. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
16
-
-
85084095449
-
Spamcraft: An inside look at spam campaign orchestration
-
C. Kreibich, C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamcraft: An Inside Look at Spam Campaign Orchestration. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2009.
-
(2009)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Kreibich, C.1
Kanich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
18
-
-
85076479609
-
-
M86. July
-
M86. Rustock, the king of spam. http://www.m86security.com/labs/ traceitem.asp?article=1362, July 2010.
-
(2010)
Rustock, the King of Spam
-
-
-
19
-
-
85076486445
-
-
GeoIP
-
MaxMind. GeoIP. http://www.maxmind. com/app/ip-location.
-
MaxMind
-
-
-
22
-
-
82955238527
-
Botnet judo: Fighting spam with itself
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. M. Voelker, V. Paxson, N. Weaver, and S. Savage. Botnet Judo: Fighting Spam with Itself. In Symposium on Network and Distributed System Security (NDSS), 2010.
-
(2010)
Symposium on Network and Distributed System Security (NDSS)
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.M.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
23
-
-
85076498422
-
-
Project Honeypot. http://www. projecthoneypot.org/.
-
Project Honeypot
-
-
-
30
-
-
85076478826
-
-
SC Magazine
-
SC Magazine. Accused MegaD operator arrested. http://www.scmagazineus.com/ accused-mega-d-botnet-operatorarrested, 2011.
-
(2011)
Accused MegaD Operator Arrested
-
-
-
31
-
-
85076453738
-
-
Shadowserver
-
Shadowserver. New fast flux botnet for the holidays. http://www.shadowserver.org/ wiki/pmwiki.php/Calendar/20101230, 2011.
-
(2011)
New Fast Flux Botnet for the Holidays
-
-
-
32
-
-
77954925610
-
Walowdac analysis of a peer-to-peer botnet
-
B. Stock, J. Gobel, M. Engelberth, F. Freiling, and T. Holz. Walowdac Analysis of a Peer-to-Peer Botnet. In European Conference on Computer Network Defense (EC2ND), 2009.
-
(2009)
European Conference on Computer Network Defense (EC2ND)
-
-
Stock, B.1
Gobel, J.2
Engelberth, M.3
Freiling, F.4
Holz, T.5
-
33
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In ACM Conference on Computer and Communications Security (CCS), 2009.
-
(2009)
ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
36
-
-
84890059309
-
-
Symantec Corp
-
Symantec Corp. State of spam & phishing report. http://www.symantec.com/business/ theme.jsp?themeid=state_of_spam, 2010.
-
(2010)
State of Spam & Phishing Report
-
-
-
37
-
-
85076499772
-
-
Symantec. Corp, January
-
Symantec. Corp. Rustock hiatus ends with huge surge of pharma spam. http: //www.symantec.com/connect/blogs/ rustock-hiatus-ends-huge-surgepharma-spam, January 2011.
-
(2011)
Rustock Hiatus Ends with Huge Surge of Pharma Spam
-
-
-
38
-
-
70350215415
-
Exploiting network structure for proactive spam mitigation
-
S. Venkataraman, S. Sen, O. Spatscheck, P. Haffner, and D. Song. Exploiting Network Structure for Proactive Spam Mitigation. In USENIX Security Symposium, 2007.
-
(2007)
USENIX Security Symposium
-
-
Venkataraman, S.1
Sen, S.2
Spatscheck, O.3
Haffner, P.4
Song, D.5
-
39
-
-
78650896043
-
Automatically generating models for botnet detection
-
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda. Automatically Generating Models for Botnet Detection. In European Symposium on Research in Computer Security (ESORICS), 2009.
-
(2009)
European Symposium on Research in Computer Security (ESORICS)
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
40
-
-
65249165325
-
Spamming botnets: Signatures and characteristics
-
38, August
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipkov. Spamming Botnets: Signatures and Characteristics. SIGCOMM Comput. Commun. Rev., 38, August 2008.
-
(2008)
SIGCOMM Comput. Commun. Rev
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipkov, I.6
-
42
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large Scale Spamming Botnet Detection. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2009.
-
(2009)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
-
43
-
-
85084095135
-
Characterizing botnets from email spam records
-
L. Zhuang, J. Dunagan, D. R. Simon, H. J. Wang, and J. D. Tygar. Characterizing Botnets From Email Spam Records. In USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET), 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET)
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.R.3
Wang, H.J.4
Tygar, J.D.5
|