-
3
-
-
66249147541
-
-
Paper presented at the 2009 Cyber-security Applications \& Technology Conference for Homeland Security
-
Bailey, M., Cooke, E., Jahanian, F., Xu, Y., & Karir, M. (2009). A survey of botnet technology and defenses. Paper presented at the 2009 Cyber-security Applications \& Technology Conference for Homeland Security.
-
(2009)
A Survey of Botnet Technology and Defenses
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
4
-
-
84899381719
-
-
Botnets: Hijacked computers in Sweden (No. PTS-ER, 2009, 11
-
Bergstrand, P., Borryd, K., Lindmark, S., & Slama, A. (2009). Botnets: Hijacked computers in Sweden (No. PTS-ER, 2009, 11.
-
(2009)
-
-
Bergstrand, P.1
Borryd, K.2
Lindmark, S.3
Slama, A.4
-
5
-
-
84899311752
-
How big is the botnet problem?
-
Retrieved March 27, 2010, from
-
Bort, J. (2007). How big is the botnet problem? Network World. Retrieved March 27, 2010, from http://www.networkworld.com/research/2007/070607-botnets-side.html
-
(2007)
Network World
-
-
Bort, J.1
-
7
-
-
84899322768
-
-
CERT Coordination Center, Retrieved from
-
CERT Coordination Center. (2006). List of CSIRTs with national responsibility. Retrieved from http://www.cert.org/csirts/national/contact.html
-
(2006)
List of CSIRTs with National Responsibility
-
-
-
8
-
-
84899176772
-
-
Cisco, Cisco ASA botnet traffic filter. Retrieved March 27, 2010, from
-
Cisco. (2009). Cisco ASA botnet traffic filter. Retrieved March 27, 2010, from http://www.cisco.com/en/US/prod/vpndevc/ps6032/ps6094/ps6120/botnet_index.html
-
(2009)
-
-
-
9
-
-
84881722592
-
-
Cisco, Retrieved March 27, 2010, from
-
Cisco. (2009). Infiltrating a botnet. Retrieved March 27, 2010, from http://www.cisco.com/web/about/security/intelligence/bots.html
-
(2009)
Infiltrating a Botnet
-
-
-
10
-
-
84899335108
-
-
CNet News, Jan, InSecurity complex, Behind the China attacks on Google (FAQ). Retrieved from
-
CNet News. (Jan 2010). InSecurity complex, Behind the China attacks on Google (FAQ). Retrieved from http://news.cnet.com/8301-27080_3-10434721-245.html?tag=mncol;txt
-
(2010)
-
-
-
11
-
-
84899247699
-
-
Paper presented at the 6th Annual Security Research Associates Spring Growth Conference
-
Cole, A., Mellor, M., & Noyes, D. (2007). Botnets: The rise of the machines. Paper presented at the 6th Annual Security Research Associates Spring Growth Conference.
-
(2007)
Botnets: The Rise of the Machines
-
-
Cole, A.1
Mellor, M.2
Noyes, D.3
-
12
-
-
85032598499
-
-
Common Malware Enumeration (CME), Retrieved from
-
Common Malware Enumeration (CME). (2007). Data list. Retrieved from http://cme.mitre.org/data/list.html
-
(2007)
Data List
-
-
-
13
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
Cooke, E., Jahanian, F., & Mcpherson, D. (2005). The zombie roundup: Understanding, detecting, and disrupting botnets. In Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), (pp. 39-44).
-
(2005)
In Workshop on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
14
-
-
84868140159
-
-
Retrieved March 27, 2010, from
-
Cranton, T. (2010). Cracking down on botnets. Retrieved March 27, 2010, from http://microsoftontheissues.com/cs/blogs/mscorp/archive/2010/02/24/cracking-down-on-botnets.aspx
-
(2010)
Cracking Down on Botnets
-
-
Cranton, T.1
-
15
-
-
84899211610
-
-
Paper presented at the CAIDA DNS-OARC Workshop
-
Dagon, D., Gu, G., Zou, C., Grizzard, J., Dwivedi, S., Lee, W., et al. (2005). A taxonomy of botnets. Paper presented at the CAIDA DNS-OARC Workshop.
-
(2005)
A Taxonomy of Botnets
-
-
Dagon, D.1
Gu, G.2
Zou, C.3
Grizzard, J.4
Dwivedi, S.5
Lee, W.6
-
16
-
-
84899260303
-
-
DKIM, Retrieved March 27, 2010, from
-
DKIM. (2009). DomainKeys identified mail (DKIM). Retrieved March 27, 2010, from http://www.dkim.org/
-
(2009)
DomainKeys Identified Mail (DKIM)
-
-
-
17
-
-
84899367370
-
-
EU, Retrieved March 27, 2010, from
-
EU. (2008). About European Union. Retrieved March 27, 2010, from http://europa.eu/index_en.htm
-
(2008)
About European Union
-
-
-
18
-
-
84899191997
-
-
F-Secure, Retrieved March 27, 2010, from
-
F-Secure. (2009). Email-Worm: W32/Waledac.A. Retrieved March 27, 2010, from http://www.f-se-cure.com/v-descs/email-worm_w32_waledac_a.shtml
-
(2009)
Email-Worm: W32/Waledac.A
-
-
-
19
-
-
84899327027
-
-
F-Secure, Mydoom.M, Retrieved April 07, 2010, from
-
F-Secure. (2009). Mydoom.M. Retrieved April 07, 2010, from http://www.f-secure.com/v-descs/mydoom_m.shtml
-
(2009)
-
-
-
20
-
-
84899381383
-
-
freed0., Retrieved March 27, 2010, from
-
freed0. (2007). ASN/GeoLoc reports and what to do about them. Retrieved March 27, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Calendar/20070111
-
(2007)
ASN/GeoLoc Reports and What to Do About Them
-
-
-
21
-
-
38149073177
-
Badvertisements: Stealthy click-fraud with unwitting accessories
-
doi:10.1080/15567280601015598
-
Gandhi, M., Jakobsson, M., & Ratkiewicz, J. (2006). Badvertisements: Stealthy click-fraud with unwitting accessories. Journal of Digital Forensic Practice, 1(2). doi:10.1080/15567280601015598
-
(2006)
Journal of Digital Forensic Practice
, vol.1
, Issue.2
-
-
Gandhi, M.1
Jakobsson, M.2
Ratkiewicz, J.3
-
22
-
-
67649650450
-
-
Paper presented at the Intrusion Detection and Network Monitoring, Santa Clara, California, USA
-
Green, J.Marchette, D., Northcutt, S., & Ralph, B. (1999). Analysis techniques for detecting coordinated attacks and probes. Paper presented at the Intrusion Detection and Network Monitoring, Santa Clara, California, USA.
-
(1999)
Analysis Techniques for Detecting Coordinated Attacks and Probes
-
-
Green, J.1
Marchette, D.2
Northcutt, S.3
-
24
-
-
26844548971
-
-
Honeynet Project, Retrieved from
-
Honeynet Project. (2005). Know your enemy: GenII honeynets. Retrieved from http://old.hon-eynet.org/papers/gen2/
-
(2005)
Know Your Enemy: GenII Honeynets
-
-
-
25
-
-
30644463214
-
-
Honeynet Project, Retrieved March 27, 2010, from
-
Honeynet Project. (2006). Know your enemy: Honeynets. Retrieved March 27, 2010, from http://old.honeynet.org/papers/honeynet/
-
(2006)
Know Your Enemy: Honeynets
-
-
-
26
-
-
84899293407
-
-
IAB, Retrieved March 27, 2010, from
-
IAB. (2008). IAB documents and current activities. Retrieved March 27, 2010, from http://www.iab.org/documents/index.html
-
(2008)
IAB Documents and Current Activities
-
-
-
29
-
-
84899263762
-
-
ITU, Retrieved March 27, 2010, from
-
ITU. (2010). About ITU. Retrieved March 27, 2010, from http://www.itu.int/net/about/#
-
(2010)
About ITU
-
-
-
30
-
-
84899294835
-
Estonia gets respite from web attacks
-
Retrieved from
-
Lemos, R. (2007). Estonia gets respite from web attacks. Security Focus. Retrieved from http://www.securityfocus.com/brief/504
-
(2007)
Security Focus
-
-
Lemos, R.1
-
31
-
-
77951447962
-
-
Paper presented at the Fourth International Conference on Innovative Computing, Information and Control (ICICIC)
-
Li, C., Jiang, W., & Zou, X. (2009). Botnet: Survey and case study. Paper presented at the Fourth International Conference on Innovative Computing, Information and Control (ICICIC).
-
(2009)
Botnet: Survey and Case Study
-
-
Li, C.1
Jiang, W.2
Zou, X.3
-
32
-
-
84899223915
-
-
MAAWG, Retrieved March 27, 2010, from
-
MAAWG. (2010). MAAWG published documents. Retrieved March 27, 2010, from http://www.maawg.org/published-documents
-
(2010)
MAAWG Published Documents
-
-
-
33
-
-
84875214953
-
-
Retrieved March 27, 2010, from
-
Messmer, E. (2009). America's 10 most wanted botnets. Retrieved March 27, 2010, from http://www.networkworld.com/news/2009/072209-botnets.html
-
(2009)
America's 10 Most Wanted Botnets
-
-
Messmer, E.1
-
35
-
-
84899220688
-
-
Microsoft, Sender ID. Retrieved March 27, 2010, from
-
Microsoft. (2006). Sender ID. Retrieved March 27, 2010, from http://www.microsoft.com/mscorp/safety/technologies/senderid/default.mspx
-
(2006)
-
-
-
36
-
-
84899384053
-
-
Microsoft, (n.d.), Retrieved March 27, 2010, from
-
Microsoft. (n.d.). Windows products. Retrieved March 27, 2010, from http://www.microsoft.com/windows/products/
-
Windows Products
-
-
-
38
-
-
84899396885
-
-
October, Paper presented at 2006 Virus Bulletin Conference (VB2006)
-
Myers, L. (2006, October). Aim for bot coordination. Paper presented at 2006 Virus Bulletin Conference (VB2006).
-
(2006)
Aim for Bot Coordination
-
-
Myers, L.1
-
39
-
-
84899210650
-
-
National Infrastructure Security Co-Ordination Centre
-
National Infrastructure Security Co-Ordination Centre. (2004). Border gateway protocol.
-
(2004)
Border Gateway Protocol
-
-
-
40
-
-
47849098249
-
-
Paper presented at 41st Annual IEEE International Carnahan Conference on Security Technology
-
Ono, K., Kawaishi, I., & Kamon, T. (2007). Trend of botnet activities. Paper presented at 41st Annual IEEE International Carnahan Conference on Security Technology.
-
(2007)
Trend of Botnet Activities
-
-
Ono, K.1
Kawaishi, I.2
Kamon, T.3
-
42
-
-
34547399387
-
-
Paper presented at 6th ACM SIGCOMM conference on Internet measurement
-
Rajab, M. A., Zarfoss, J., Monrose, F., & Terzis, A. (2006). A multifaceted approach to understanding the botnet phenomenon. Paper presented at 6th ACM SIGCOMM conference on Internet measurement.
-
(2006)
A Multifaceted Approach to Understanding the Botnet Phenomenon
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
46
-
-
84899398963
-
-
Symantec, Retrieved March 27, 2010, from
-
Symantec. (2007). W32.Randex.E. Retrieved March 27, 2010, from http://www.symantec.com/security_response/writeup.jsp?docid=2003-081213-3232-99
-
(2007)
W32.Randex.E
-
-
-
50
-
-
85013740783
-
-
The Shadowserver Foundation, Retrieved March 27, 2010, from
-
The Shadowserver Foundation. (2007). Botnets. Retrieved March 27, 2010, from http://www.shadowserver.org/wiki/pmwiki.php/Information/Botnets#toc
-
(2007)
Botnets
-
-
-
51
-
-
84899384543
-
-
The Sydney Morning Herald, Retrieved from
-
The Sydney Morning Herald. (2007). Cyber attacks force Estonian bank to close website. Retrieved from http://www.smh.com.au/news/breaking-news/cyber-attacks-force-estonian-bank-to-close-website/2007/05/16/1178995171916.html
-
(2007)
Cyber Attacks Force Estonian Bank to Close Website
-
-
-
52
-
-
84899286926
-
-
Trendmicro, Retrieved from
-
Trendmicro. (2003). POLYBOOT-B*. Retrieved from http://threatinfo.trendmicro.com/vinfo/vi-rusencyclo/default5.asp?VName=POLYBOOT-B*
-
(2003)
POLYBOOT-B*
-
-
|