-
1
-
-
85068676628
-
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware
-
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon. From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In Proceedings of the 21st USENIX Security Symposium, 2012.
-
Proceedings of the 21st USENIX Security Symposium, 2012
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
3
-
-
84881229885
-
Same Botnet, Same Guys, New Code: Win32/Kelihos
-
P.-M. Bureau. Same Botnet, Same Guys, New Code: Win32/Kelihos. In VirusBulletin, 2011.
-
(2011)
VirusBulletin
-
-
Bureau, P.-M.1
-
5
-
-
77950117001
-
Structured Peer-to-Peer Overlay Networks: Ideal Botnet Command and Control Infrastructures?
-
C. R. Davis, S. Neville, J. M. Fernandez, J.-M. Robert, and J. McHugh. Structured Peer-to-Peer Overlay Networks: Ideal Botnet Command and Control Infrastructures? In Proceedings of the 13th European Symposium on Research in Computer Security, 2008.
-
Proceedings of the 13th European Symposium on Research in Computer Security, 2008
-
-
Davis, C.R.1
Neville, S.2
Fernandez, J.M.3
Robert, J.-M.4
McHugh, J.5
-
8
-
-
41349120887
-
Attack Vulnerability of Complex Networks
-
P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack Vulnerability of Complex Networks. Physical Review E, vol. 65, 2002.
-
(2002)
Physical Review E
, vol.65
-
-
Holme, P.1
Kim, B.J.2
Yoon, C.N.3
Han, S.K.4
-
9
-
-
85084097128
-
Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and Mitigation of Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freiling, F.5
-
11
-
-
77952351261
-
Towards Complete Node Enumeration in a Peer-to-Peer Botnet
-
B. Kang, E. Chan-Tin, C. P. Lee, J. Tyra, H. J. Kang, C. Nunnery, Z. Wadler, G. Sinclair, N. Hopper, D. Dagon, and Y. Kim. Towards Complete Node Enumeration in a Peer-to-Peer Botnet. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, 2009.
-
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, 2009
-
-
Kang, B.1
Chan-Tin, E.2
Lee, C.P.3
Tyra, J.4
Kang, H.J.5
Nunnery, C.6
Wadler, Z.7
Sinclair, G.8
Hopper, N.9
Dagon, D.10
Kim, Y.11
-
13
-
-
85084096724
-
The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff
-
C. Kanich, K. Levchenko, B. Enright, G. M. Voelker, and S. Savage. The Heisenbot Uncertainty Problem: Challenges in Separating Bots from Chaff. In Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
Proceedings of the 1st USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008
-
-
Kanich, C.1
Levchenko, K.2
Enright, B.3
Voelker, G.M.4
Savage, S.5
-
19
-
-
79958728571
-
Sandnet: Network Traffic Analysis of Malicious Software
-
C. Rossow, C. J. Dietrich, H. Bos, L. Cavallaro, M. van Steen, F. C. Freiling, and N. Pohlmann. Sandnet: Network Traffic Analysis of Malicious Software. In ACM EuroSys BADGERS, 2011.
-
ACM EuroSys BADGERS, 2011
-
-
Rossow, C.1
Dietrich, C.J.2
Bos, H.3
Cavallaro, L.4
Van Steen, M.5
Freiling, F.C.6
Pohlmann, N.7
-
20
-
-
84881237496
-
-
Technical Report
-
V. R. Sergey Golovanov. TDSS, 2010. Technical Report: http://www.securelist.com/en/analysis/204792131/.
-
(2010)
TDSS
-
-
Sergey Golovanov, V.R.1
-
24
-
-
74049154670
-
Your Botnet is My Botnet: Analysis of a Botnet Takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009.
-
Proceedings of the 16th ACM Conference on Computer and Communications Security, 2009
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
25
-
-
49049107082
-
Analysis of the Storm and Nugache Trojans: P2P is here
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich. Analysis of the Storm and Nugache Trojans: P2P is here. In USENIX; login, vol. 32, no. 6, 2007.
-
(2007)
USENIX; Login
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
29
-
-
84881244431
-
-
Blog article by CrowdStrike
-
T. Werner. Kelihos.C: Same Code, New Botnet, 2012. Blog article by CrowdStrike: http://blog.crowdstrike.com/2012/03/kelihosc-same-code-new-botnet. html.
-
(2012)
Kelihos.C: Same Code, New Botnet
-
-
Werner, T.1
-
30
-
-
84881227788
-
-
Technical Report by SophosLabs
-
J. Wyke. ZeroAccess, 2012. Technical Report by SophosLabs.
-
(2012)
ZeroAccess
-
-
Wyke, J.1
|