-
1
-
-
84888174169
-
-
article available online: Accessed on 1stJuly 2013
-
Citadel and zeus. article available online:. https://www.botnets.fr/ index.php/Citadel-ZeuS-bot. Accessed on 1stJuly 2013.
-
Citadel and Zeus
-
-
-
2
-
-
84888184171
-
-
http:// Accessed on 10 May 2013
-
Open malware website:. http://http://openmalware.org/. Accessed on 10 May 2013.
-
-
-
-
3
-
-
84888160789
-
-
available online at:. Accessed on 18th April 2013
-
Wordpress botnet attack. available online at:. http://security. stackexchange.com/q/34482/9778. Accessed on 18th April 2013.
-
Wordpress Botnet Attack
-
-
-
4
-
-
66249147541
-
A survey of botnet technology and defenses
-
IEEE
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir. A survey of botnet technology and defenses. In Conference For Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology, pages 299-304. IEEE, 2009.
-
(2009)
Conference for Homeland Security, 2009. CATCH'09. Cybersecurity Applications & Technology
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
5
-
-
84888169996
-
-
available online:. Accessed on 09 June 2013
-
BBC. Anonymous wikileaks supporters mull change in tactics. available online:. http://www.bbc.co.uk/news/mobile/technology-11968605. Accessed on 09 June 2013.
-
Anonymous Wikileaks Supporters Mull Change in Tactics
-
-
-
6
-
-
84888170939
-
-
website. Accessed on 7 May 2013
-
M. Bednarczyk. jnetpcap website. http://jnetpcap.com. Accessed on 7 May 2013.
-
-
-
Bednarczyk, M.1
-
9
-
-
19944364877
-
Feature deduction and ensemble design of intrusion detection systems
-
S. Chebrolu, A. Abraham, and J. P. Thomas. Feature deduction and ensemble design of intrusion detection systems. Computers & Security, 24(4):295-307, 2005.
-
(2005)
Computers & Security
, vol.24
, Issue.4
, pp. 295-307
-
-
Chebrolu, S.1
Abraham, A.2
Thomas, J.P.3
-
10
-
-
0242302657
-
Consistency-based search in feature selection
-
M. Dash and H. Liu. Consistency-based search in feature selection. Artificial intelligence, 151(1):155-176, 2003.
-
(2003)
Artificial Intelligence
, vol.151
, Issue.1
, pp. 155-176
-
-
Dash, M.1
Liu, H.2
-
11
-
-
84888183065
-
-
article on citadel botnet, available online:. Accessed on 09 June 2013
-
J. Finkle. Microsoft, fbi take aim at global cybercrime ring. article on citadel botnet, available online:. http://www.smh.com.au. Accessed on 09 June 2013.
-
Microsoft, Fbi Take Aim at Global Cybercrime Ring
-
-
Finkle, J.1
-
12
-
-
51349131500
-
Flexible and high-performance anonymization of netflow records using anontool
-
IEEE
-
M. Foukarakis, D. Antoniades, S. Antonatos, and E. P. Markatos. Flexible and high-performance anonymization of netflow records using anontool. In Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on, pages 33-38. IEEE, 2007.
-
(2007)
Security and Privacy in Communications Networks and the Workshops, 2007. SecureComm 2007. Third International Conference on
, pp. 33-38
-
-
Foukarakis, M.1
Antoniades, D.2
Antonatos, S.3
Markatos, E.P.4
-
14
-
-
76749092270
-
The weka data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The weka data mining software: an update. ACM SIGKDD Explorations Newsletter, 11(1):10-18, 2009.
-
(2009)
ACM SIGKDD Explorations Newsletter
, vol.11
, Issue.1
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
18
-
-
84888172814
-
-
available online at:. Accessed on 18th April 2013
-
J. LeClaire. Wordpress sites attacked; may be prep for ddos barrage. available online at:. http://www.cio-today.com/news/WordPress-Web-Sites-Under- Attack/story.xhtml?story-id=033003176VMR. Accessed on 18th April 2013.
-
Wordpress Sites Attacked; May Be Prep for Ddos Barrage
-
-
LeClaire, J.1
-
19
-
-
46149123241
-
Using machine learning techniques to identify botnet traffic
-
IEEE
-
C. Livadas, R. Walsh, D. Lapsley, and W. T. Strayer. Using machine learning techniques to identify botnet traffic. In Local Computer Networks, Proceedings 2006 31st IEEE Conference on, pages 967-974. IEEE, 2006.
-
(2006)
Local Computer Networks, Proceedings 2006 31st IEEE Conference on
, pp. 967-974
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
20
-
-
35248857893
-
An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection
-
Springer
-
M. V. Mahoney and P. K. Chan. An analysis of the 1999 darpa/lincoln laboratory evaluation data for network anomaly detection. In Recent Advances in Intrusion Detection, pages 220-237. Springer, 2003.
-
(2003)
Recent Advances in Intrusion Detection
, pp. 220-237
-
-
Mahoney, M.V.1
Chan, P.K.2
-
21
-
-
84888166992
-
-
Mila. Contagio-dump blog. Accessed on 10 May 2013
-
Mila. Contagio-dump blog. http://www.contagiodump.blogspot.in. Accessed on 10 May 2013.
-
-
-
-
22
-
-
78149487429
-
Towards a generic feature-selection measure for intrusion detection
-
IEEE
-
H. T. Nguyen, K. Franke, and S. Petrovic. Towards a generic feature-selection measure for intrusion detection. In Pattern Recognition (ICPR), 2010 20th International Conference on, pages 1529-1532. IEEE, 2010.
-
(2010)
Pattern Recognition (ICPR), 2010 20th International Conference on
, pp. 1529-1532
-
-
Nguyen, H.T.1
Franke, K.2
Petrovic, S.3
-
23
-
-
63749095692
-
Detecting p2p botnets using a multi-phased flow model
-
IEEE
-
S.-K. Noh, J.-H. Oh, J.-S. Lee, B.-N. Noh, and H.-C. Jeong. Detecting p2p botnets using a multi-phased flow model. In Digital Society, 2009. ICDS'09. Third International Conference on, pages 247-253. IEEE, 2009.
-
(2009)
Digital Society, 2009. ICDS'09. Third International Conference on
, pp. 247-253
-
-
Noh, S.-K.1
Oh, J.-H.2
Lee, J.-S.3
Noh, B.-N.4
Jeong, H.-C.5
-
24
-
-
84881154550
-
Peerrush: Mining for unwanted p2p traffic
-
Detection of Intrusions and Malware, and Vulnerability Assessment, Springer Berlin Heidelberg
-
B. Rahbarinia, R. Perdisci, A. Lanzi, and K. Li. Peerrush: Mining for unwanted p2p traffic. In Detection of Intrusions and Malware, and Vulnerability Assessment, volume 7967 of Lecture Notes in Computer Science, pages 62-82. Springer Berlin Heidelberg, 2013.
-
(2013)
Lecture Notes in Computer Science
, vol.7967
, pp. 62-82
-
-
Rahbarinia, B.1
Perdisci, R.2
Lanzi, A.3
Li, K.4
-
25
-
-
80052095850
-
Detecting p2p botnets through network behavior analysis and machine learning
-
IEEE
-
S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, W. Lu, J. Felix, and P. Hakimian. Detecting p2p botnets through network behavior analysis and machine learning. In Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on, pages 174-180. IEEE, 2011.
-
(2011)
Privacy, Security and Trust (PST), 2011 Ninth Annual International Conference on
, pp. 174-180
-
-
Saad, S.1
Traore, I.2
Ghorbani, A.3
Sayed, B.4
Zhao, D.5
Lu, W.6
Felix, J.7
Hakimian, P.8
-
29
-
-
3242765279
-
A bias-variance analysis of a real world learning problem: The coil challenge 2000
-
P. Van Der Putten and M. Van Someren. A bias-variance analysis of a real world learning problem: The coil challenge 2000. Machine Learning, 57(1-2):177-195, 2004.
-
(2004)
Machine Learning
, vol.57
, Issue.1-2
, pp. 177-195
-
-
Van Der Putten, P.1
Van Someren, M.2
-
30
-
-
33750283653
-
A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification
-
N. Williams, S. Zander, and G. Armitage. A preliminary performance comparison of five machine learning algorithms for practical ip traffic flow classification. ACM SIGCOMM Computer Communication Review, 36(5):5-16, 2006.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.5
, pp. 5-16
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
-
34
-
-
84888148987
-
-
available online at:. Accessed on 18th April 2013
-
C. York. Wordpress attacked by botnet in massive ddos onslaught. available online at:. http://www.huffingtonpost.co.uk/2013/04/15/wordpress- botnet-attack-n-3083819.html. Accessed on 18th April 2013.
-
Wordpress Attacked by Botnet in Massive Ddos Onslaught
-
-
York, C.1
|