-
4
-
-
76649107873
-
Exploiting temporal persistence to detect covert botnet channels
-
Springer-Verlag
-
F. Giroire, J. Chandrashekar, N. Taft, E. Schooler, and D. Papagiannaki Exploiting temporal persistence to detect covert botnet channels Proceedings of the 12th international symposium on recent advances in intrusion detection (RAID'09) 2009 Springer-Verlag 326 345
-
(2009)
Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection (RAID'09)
, pp. 326-345
-
-
Giroire, F.1
Chandrashekar, J.2
Taft, N.3
Schooler, E.4
Papagiannaki, D.5
-
5
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
USENIX Association Berkeley
-
J.B. Grizzard, V. Sharma, C. Nunnery, B. ByungHoon Kang, and D. Dagon Peer-to-peer botnets: overview and case study Proceedings of the first workshop on hot topics in understanding botnet (HotBots'07), Cambridge, MA, April 2007 2007 USENIX Association Berkeley
-
(2007)
Proceedings of the First Workshop on Hot Topics in Understanding Botnet (HotBots'07), Cambridge, MA, April 2007
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Byunghoon Kang, B.4
Dagon, D.5
-
6
-
-
85061529860
-
BotHunter: Detecting malware infection through IDS-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee BotHunter: detecting malware infection through IDS-driven dialog correlation Proceedings of the 16th USENIX security symposium, Boston, MA, USA 2007 167 182
-
(2007)
Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA
, pp. 167-182
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
8
-
-
85075837457
-
BotMiner: Clustering analysis of network traffic for protocol- and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee BotMiner: clustering analysis of network traffic for protocol- and structure-independent botnet detection Proceedings of the 17th USENIX security symposium, San Jose, CA, USA 2008
-
(2008)
Proceedings of the 17th USENIX Security Symposium, San Jose, CA, USA
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
12
-
-
48349108578
-
P2P traffic identification technique
-
J. Li, S. Zhang, S. Liu, and Y. Xuan P2P traffic identification technique Proceedings of the international conference on computational intelligence and security, Harbin, China, 15-19 Dec. 2007 2007 37 41
-
(2007)
Proceedings of the International Conference on Computational Intelligence and Security, Harbin, China, 15-19 Dec. 2007
, pp. 37-41
-
-
Li, J.1
Zhang, S.2
Liu, S.3
Xuan, Y.4
-
15
-
-
51949113131
-
-
Technical Report Arbor Networks Available at
-
J. Nazario BlackEnergy DDoS bot analysis Technical Report October 2007 Arbor Networks 11 Available at http://atlas-public.ec2.arbor.net/docs/ BlackEnergy+DDoS+Bot+Analysis.pdf
-
(2007)
BlackEnergy DDoS Bot Analysis
, pp. 11
-
-
Nazario, J.1
-
16
-
-
84888286730
-
-
openpacket.org. Zeus/Zbot sample traffic and C& C traffic. Retrieved October 29
-
openpacket.org. Zeus/Zbot sample traffic and C& C traffic. Retrieved October 29, 2012, from www.openpacket.org.
-
(2012)
-
-
-
18
-
-
80052095850
-
Detecting P2P botnets through network behavior analysis and machine learning
-
S. Saad, I. Traore, A. Ghorbani, B. Sayed, D. Zhao, and W. Lu Detecting P2P botnets through network behavior analysis and machine learning Proceedings of 9th annual conference on privacy, security and trust (PST2011), July 19-21, 2011, Montreal, Canada 2011
-
(2011)
Proceedings of 9th Annual Conference on Privacy, Security and Trust (PST2011), July 19-21, 2011, Montreal, Canada
-
-
Saad, S.1
Traore, I.2
Ghorbani, A.3
Sayed, B.4
Zhao, D.5
Lu, W.6
-
19
-
-
84859430323
-
Toward developing a systematic approach to generate benchmark datasets for intrusion detection
-
A. Shiravi, H. Shiravi, M. Tavallaee, and A. Ghorbani Toward developing a systematic approach to generate benchmark datasets for intrusion detection Computers & Security, Elsevier 31 3 2012 357 374
-
(2012)
Computers & Security, Elsevier
, vol.31
, Issue.3
, pp. 357-374
-
-
Shiravi, A.1
Shiravi, H.2
Tavallaee, M.3
Ghorbani, A.4
-
22
-
-
77955469676
-
An overview of IP flow-based intrusion detection
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller An overview of IP flow-based intrusion detection IEEE Communications Surveys & Tutorial 12 3 2010 343 356
-
(2010)
IEEE Communications Surveys & Tutorial
, vol.12
, Issue.3
, pp. 343-356
-
-
Sperotto, A.1
Schaffrath, G.2
Sadre, R.3
Morariu, C.4
Pras, A.5
Stiller, B.6
-
23
-
-
43949108876
-
On the validation of traffic classification algorithms
-
DOI 10.1007/978-3-540-79232-1-8, Passive and Active Network Measurement - 9th International Conference, PAM 2008, Proceedings
-
A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and B. Stiller An overview of IP flow-based intrusion detection IEEE Communications Surveys & Tutorial 12 3 2010 343 356 (Pubitemid 351702280)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4979
, pp. 72-81
-
-
Szabo, G.1
Orincsay, D.2
Malomsoky, S.3
Szabo, I.4
-
24
-
-
84888289312
-
-
The Honeynet Project. French Chapter [Online]
-
The Honeynet Project. French Chapter [Online] http://www.honeynet.org/ chapters/france.
-
-
-
-
27
-
-
70349669421
-
Measuring peer-to-peer botnets using control flow stability
-
B. Wang, Z. Li, H. Tu, and J. MaWang Measuring peer-to-peer botnets using control flow stability Proceedings of the fourth international conference on availability, reliability and security, March 16-19, 2009, Fukuoka, Japan 2009 663 669
-
(2009)
Proceedings of the Fourth International Conference on Availability, Reliability and Security, March 16-19, 2009, Fukuoka, Japan
, pp. 663-669
-
-
Wang, B.1
Li, Z.2
Tu, H.3
Mawang, J.4
-
28
-
-
84861334189
-
-
(Working paper 99/11) University of Waikato, Department of Computer Science Hamilton, New Zealand
-
I.H. Witten, E. Frank, L. Trigg, M. Hall, G. Holmes, and S.J. Cunningham Weka: practical machine learning tools and techniques (Working paper 99/11) 1999 University of Waikato, Department of Computer Science Hamilton, New Zealand
-
(1999)
Weka: Practical Machine Learning Tools and Techniques
-
-
Witten, I.H.1
Frank, E.2
Trigg, L.3
Hall, M.4
Holmes, G.5
Cunningham, S.J.6
-
29
-
-
70350374367
-
Automatically generating models for botnet detection
-
Lecture Notes in Computer Science Springer Verlag
-
P. Wurzinger, L. Bilge, T. Holz, J. Goebel, C. Kruegel, and E. Kirda Automatically generating models for botnet detection Proceedings of the 14th European conference on research in computer security (ESORICS 2009) Lecture Notes in Computer Science vol. 5789 2009 Springer Verlag 232 249
-
(2009)
Proceedings of the 14th European Conference on Research in Computer Security (ESORICS 2009)
, vol.5789 VOL.
, pp. 232-249
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Goebel, J.4
Kruegel, C.5
Kirda, E.6
-
30
-
-
78651593637
-
Online botnet detection based on incremental discrete Fourier transform
-
X. Yu, X. Dong, G. Yu, Y. Qin, D. Yue, and Y. Zhao Online botnet detection based on incremental discrete Fourier transform Journal of Networks 5 5 2010
-
(2010)
Journal of Networks
, vol.5
, Issue.5
-
-
Yu, X.1
Dong, X.2
Yu, G.3
Qin, Y.4
Yue, D.5
Zhao, Y.6
-
32
-
-
84863885019
-
Peer-to-peer botnet detection based on flow intervals
-
D. Zhao, I. Traore, A. Ghorbani, B. Sayed, S. Saad, and W. Lu Peer-to-peer botnet detection based on flow intervals Proceedings of IFIP international information security and privacy conference (SEC 2012), 4-6 June 2012, Crete, Greece 2012
-
(2012)
Proceedings of IFIP International Information Security and Privacy Conference (SEC 2012), 4-6 June 2012, Crete, Greece
-
-
Zhao, D.1
Traore, I.2
Ghorbani, A.3
Sayed, B.4
Saad, S.5
Lu, W.6
|