-
1
-
-
84905223717
-
Towards efficient and privacy-preserving network-based botnet detection using netflow data
-
Abt, S., Baier, H.: Towards efficient and privacy-preserving network-based botnet detection using netflow data. In: Proceedings of 9th International Network Conference, INC 2012, Port Elizabeth, South Africa (July 2012)
-
Proceedings of 9th International Network Conference, INC 2012, Port Elizabeth, South Africa (July 2012)
-
-
Abt, S.1
Baier, H.2
-
2
-
-
84879649927
-
A Survey of Botnet and Botnet Detection
-
Maryam, F., Alireza, S., Sureswaran, R.: A Survey of Botnet and Botnet Detection. In: Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, Washington DC, USA (2009)
-
Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, Washington DC, USA (2009)
-
-
Maryam, F.1
Alireza, S.2
Sureswaran, R.3
-
3
-
-
70449412215
-
Botnet: Classification, attacks, detection, tracing, and preventive measures
-
February
-
Jing, L., Yang, X., Kaveh, G., Hongmei, D., Jingyuan, Z.: Botnet: classification, attacks, detection, tracing, and preventive measures. EURASIP Journal on Wireless Communications and Networking (February 2009)
-
(2009)
EURASIP Journal on Wireless Communications and Networking
-
-
Jing, L.1
Yang, X.2
Kaveh, G.3
Hongmei, D.4
Jingyuan, Z.5
-
4
-
-
42449117164
-
-
Technical report, National Institute of Standards & Technology, Gaithersburg, MD, United States February
-
Karen, S., Peter, M.: SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS). Technical report, National Institute of Standards & Technology, Gaithersburg, MD, United States (February 2007)
-
(2007)
SP 800-94. Guide to Intrusion Detection and Prevention Systems (IDPS)
-
-
Karen, S.1
Peter, M.2
-
5
-
-
84880998910
-
The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data
-
van Eeten, M., Bauer, J.M., Asghari, H., Tabatabaie, S., Rand, D.: The Role of Internet Service Providers in Botnet Mitigation: An Empirical Analysis Based on Spam Data. In: The Tenth Workshop on the Economics of Information Security, WEIS 2010 (2010)
-
The Tenth Workshop on the Economics of Information Security, WEIS 2010 (2010)
-
-
Van Eeten, M.1
Bauer, J.M.2
Asghari, H.3
Tabatabaie, S.4
Rand, D.5
-
6
-
-
84871726679
-
RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms
-
March
-
Prez, M.G., Mrmol, F.G., Prez, G.M., Gmez-Skarmeta, A.F.: RepCIDN: A Reputation-based Collaborative Intrusion Detection Network to Lessen the Impact of Malicious Alarms. Journal of Network and Systems Management 21(1) (March 2013)
-
(2013)
Journal of Network and Systems Management
, vol.21
, Issue.1
-
-
Prez, M.G.1
Mrmol, F.G.2
Prez, G.M.3
Gmez-Skarmeta, A.F.4
-
7
-
-
67649996622
-
-
January
-
Cisco Systems, Inc.: Netflow services solutions guide (January 2007), http://www.cisco.com/en/US/docs/ios/solutions docs/netflow/nfwhite.html
-
(2007)
Netflow Services Solutions Guide
-
-
-
8
-
-
79956034020
-
BotTrack: Tracking botnets using Net- Flow and PageRank
-
Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. Springer, Heidelberg
-
François, J., Wang, S., State, R., Engel, T.: BotTrack: tracking botnets using Net- Flow and PageRank. In: Domingo-Pascual, J., Manzoni, P., Palazzo, S., Pont, A., Scoglio, C. (eds.) NETWORKING 2011, Part I. LNCS, vol. 6640, pp. 1-14. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6640
, pp. 1-14
-
-
François, J.1
Wang, S.2
State, R.3
Engel, T.4
-
9
-
-
84872102390
-
DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis
-
Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: DISCLOSURE: Detecting Botnet Command and Control Servers Through Large-Scale NetFlow Analysis. In: Proceedings of the Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL USA (December 2012)
-
Proceedings of the Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL USA (December 2012)
-
-
Bilge, L.1
Balzarotti, D.2
Robertson, W.3
Kirda, E.4
Kruegel, C.5
-
12
-
-
84879627397
-
-
Technical Report VII, January
-
Anstee, D., Bussiere, D., Sockrider, G., Morales, C.: Worldwide Infrastructure Security Report. Technical Report VII, Arbor Networks Inc. (January 2012), http://www.arbornetworks.com/research/infrastructure-security- report
-
(2012)
Worldwide Infrastructure Security Report
-
-
Anstee, D.1
Bussiere, D.2
Sockrider, G.3
Morales, C.4
-
13
-
-
84879652112
-
-
RFC 5153 (Informational) April
-
Boschi, E., Mark, L., Quittek, J., Stiemerling, M., Aitken, P.: IP Flow Information Export (IPFIX) Implementation Guidelines. RFC 5153 (Informational) (April 2008), http://www.ietf.org/rfc/rfc5153.txt
-
(2008)
IP Flow Information Export (IPFIX) Implementation Guidelines
-
-
Boschi, E.1
Mark, L.2
Quittek, J.3
Stiemerling, M.4
Aitken, P.5
-
14
-
-
84865535893
-
-
Version 5 July
-
Phaal, P., Lavine, M.: sFlow Version 5 (July 2004), http://www.sflow.org/ sflow-version-5.txt
-
(2004)
sFlow
-
-
Phaal, P.1
Lavine, M.2
-
15
-
-
84882582909
-
-
Technical report, ENISA December
-
ENISA - European Network and Information Security Agency: Cert cooperation and its further facilitation by relevant stakeholders. Technical report, ENISA (December 2006), http://www.enisa.europa.eu/activities/cert/ background/coop/files/cert-cooperation-and-its-further-facilitation-by-relevant- stakeholders/at-download/fullReport
-
(2006)
Cert Cooperation and Its Further Facilitation by Relevant Stakeholders
-
-
-
16
-
-
84859419746
-
Operational experiences with anomaly detection in backbone networks
-
Molina, M., Paredes-Oliva, I., Routly, W., Barlet-Ros, P.: Operational experiences with anomaly detection in backbone networks. Computers & Security 31(3), 273-285 (2012)
-
(2012)
Computers & Security
, vol.31
, Issue.3
, pp. 273-285
-
-
Molina, M.1
Paredes-Oliva, I.2
Routly, W.3
Barlet-Ros, P.4
|