-
2
-
-
84871510702
-
-
Mawi traffic archive. http://mawi.wide.ad.jp/mawi/samplepoint-B/20060303/ .
-
Mawi Traffic Archive
-
-
-
3
-
-
35348850600
-
An algorithm for anomaly-based botnet detection
-
July
-
BINKLEY, J. R., AND SINGH, S. An algorithm for anomaly-based botnet detection. In Proc. of USENIX SRUTl (July 2006).
-
(2006)
Proc. of USENIX SRUTl
-
-
Binkley, J.R.1
Singh, S.2
-
4
-
-
56349094785
-
Fast unfolding of communities in large networks
-
BLONDEL, v., GUILLAUME, J., LAMBIOTTE, R., AND LEFEBVRE, E. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment (2008).
-
(2008)
Journal of Statistical Mechanics: Theory and Experiment
-
-
Blondel, V.1
Guillaume, J.2
Lambiotte, R.3
Lefebvre, E.4
-
5
-
-
78751473146
-
Friends of an enemy: Identifying local members of peer-to-peer botnets using mutual contacts
-
ACM
-
COSKUN, B ., DIETRICH, S., AND MEMON, N. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. In Proc. of ACSAC 2010, ACM, pp. 131-140.
-
Proc. of ACSAC 2010
, pp. 131-140
-
-
Coskun, B.1
Dietrich, S.2
Memon, N.3
-
6
-
-
74049087026
-
Community detection in graphs
-
FORTUNATO, S. Community detection in graphs. Physics Reports 486, 3 (2010).
-
(2010)
Physics Reports
, vol.486
, pp. 3
-
-
Fortunato, S.1
-
7
-
-
85075837457
-
Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
USENIX Association
-
Gu, G., PERDISCI, R., ZHANG, J., AND LEE, W. Botminer: Clustering analysis of network traffic for protocol-and structure-independent botnet detection. In Proc. of Usenix Security 2008, USENIX Association, pp. 139-154.
-
Proc. of Usenix Security 2008
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
8
-
-
85061529860
-
Bothunter: Detecting mal ware infection through ids-driven dialog correlation
-
USENIX Association
-
Gu, G., PORRAS, P., YEGNESWARAN, V., FONG, M., AND LEE, W. Bothunter: Detecting mal ware infection through ids-driven dialog correlation. In Proc. of 16th USENIX Security Symposium (2007), USENIX Association, p. 12.
-
thUSENIX Security Symposium (2007)
, pp. 12
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
9
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
HOLZ, T., STEINER, M., DAHL, F., BIERSACK, E., AND FREILlNG, F. Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm. In Proc. of LEET 2008.
-
(2008)
Proc. of LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freillng, F.5
-
11
-
-
79955775579
-
Profiling-by-association: A resilient traffic profiling solution for the internet backbone
-
Dec
-
ILiOFOTOU, M., GALLAGHER, B ., ELiASSI-RAD, T., G., X., AND M., F. Profiling-by-association: A resilient traffic profiling solution for the internet backbone. In Proc. of ACM CoNEXT (Dec. 2010).
-
(2010)
Proc. of ACM CoNEXT
-
-
Iliofotou, M.1
Gallagher, B.2
Eliassi-Rad, T.3
-
12
-
-
79955760469
-
Graption: A graph-based p2p traffic classification framework for the internet backbone
-
ILiOFOTOU, M., KIM, H., FALOUTSOS, M., MITZENMACHER, M., PAPPU, P., AND VARGHESE, G. Graption: A graph-based p2p traffic classification framework for the internet backbone. Computer Networks (2011).
-
(2011)
Computer Networks
-
-
Iliofotou, M.1
Kim, H.2
Faloutsos, M.3
Mitzenmacher, M.4
Pappu, P.5
Varghese, G.6
-
13
-
-
70349686731
-
Network monitoring using traffic dispersion graphs
-
ILiOFOTOU, M., PAPPU, P., FALOUTSOS, M., MITZENMACHER, M., SINGH, S., AND VARGHESE, G. Network Monitoring using Traffic Dispersion Graphs. In Proc. of IMC (2007).
-
(2007)
Proc. of IMC
-
-
Iliofotou, M.1
Pappu, P.2
Faloutsos, M.3
Mitzenmacher, M.4
Singh, S.5
Varghese, G.6
-
14
-
-
70449686700
-
Unveiling core networkwide communication patterns through application traffic activity graph decomposition
-
ACM
-
JIN, Y., SHARAFUDDIN, E., AND ZHANG, Z. Unveiling core networkwide communication patterns through application traffic activity graph decomposition. In Proc. of SIGMETRICS 2009 (2009), ACM, pp. 49-60.
-
(2009)
Proc. of SIGMETRICS 2009
, pp. 49-60
-
-
Jin, Y.1
Sharafuddin, E.2
Zhang, Z.3
-
15
-
-
78649292639
-
Studying spamming botnets using botlab
-
JOHN, J. P., MOSHCHUK, A., GRIBBLE, S. D ., AND KRISHNAMURTHY, A. Studying spamming botnets using botlab. In Proc. of NSDI 2008.
-
(2008)
Proc. of NSDI
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
16
-
-
79951817047
-
Towards situational awareness of large-scale botnet probing events
-
March
-
Lt, Z., GOYAL, A., CHEN, Y., AND PAXSON, V. Towards situational awareness of large-scale botnet probing events. In IEEE Transactions on Information Forensics & Security (March 2011).
-
(2011)
IEEE Transactions on Information Forensics & Security
-
-
Lt, Z.1
Goyal, A.2
Chen, Y.3
Paxson, V.4
-
17
-
-
84890815886
-
Using machine learning techniques to identify botnet traffic
-
LtvADAS, C., WALSH, R., LAPSLEY, D ., AND STRAYER, W. T. Using machine learning techniques to identify botnet traffic. In Proc. of WoNS (2006).
-
(2006)
Proc. of WoNS
-
-
Ltvadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.T.4
-
18
-
-
85059753615
-
Botgrep: Finding p2p bots with structured graph analysis
-
USENIX Association
-
NAGARAJA, S., MITTAL, P., HONG, c., CAESAR, M., AND BORISOV, N. Botgrep: Finding p2p bots with structured graph analysis. In Proc. of the 19th USENIX conference on Security (2010), USENIX Association.
-
(2010)
th USENIX Conference on Security
-
-
Nagaraja, S.1
Mittal, P.2
Hong, C.3
Caesar, M.4
Borisov, N.5
-
19
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
ROESCH, M. ET AL. Snort: Lightweight intrusion detection for networks. In Proc. of LISA (1999), pp. 229-238.
-
(1999)
Proc. of LISA
, pp. 229-238
-
-
Roesch, M.1
-
20
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2p is here
-
STOVER, S., DITTRICH, D ., HERNANDEZ, J., AND DIETRICH, S. Analysis of the storm and nugache trojans: P2p is here. USENIX;login 32, 6 (2007), 2007-12.
-
(2007)
USENIX;login
, vol.32
, Issue.6
, pp. 2007-2012
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
21
-
-
84876254320
-
Botmagnifier: Locating spambots on the internet
-
STRINGHINI, G., HOLZ, T., STONE-GROSS, B ., KRUEGEL, c., AND VIGNA, G. Botmagnifier: Locating spambots on the internet. In Proc. of Usenix Security 2011.
-
(2011)
Proc. of Usenix Security
-
-
Stringhini, G.1
Holz, T.2
Stone-gross, B.3
Kruegel, C.4
Vigna, G.5
-
25
-
-
77955861102
-
Are your hosts trading or plotting? Telling p2p file-sharing and bots apart
-
IEEE
-
YEN, T., AND REITER, M. Are your hosts trading or plotting? Telling p2p file-sharing and bots apart. In Proc. of ICDCS 2010, IEEE, pp. 241- 252.
-
(2010)
Proc. of ICDCS
, pp. 241-252
-
-
Yen, T.1
Reiter, M.2
-
26
-
-
80051935855
-
Detecting stealthy p2p botnets using statistical traffic fingerprints
-
IEEE
-
ZHANG, J., PERDISCI, R., LEE, W., SARFRAZ, U., AND Luo, X. Detecting stealthy p2p botnets using statistical traffic fingerprints. In Proc. of DSN (2011), IEEE.
-
(2011)
Proc. of DSN
-
-
Zhang, J.1
Perdisci, R.2
Lee, W.3
Sarfraz, U.4
Luo, X.5
-
27
-
-
79954733367
-
Botgraph: Large scale spamming botnet detection
-
ZHAO, Y., XIE, Y., Yu, F., KE, Q., Yu, Y., CHEN, Y., AND GILLUM, E. Botgraph: Large scale spamming botnet detection. In Proc. of NSDI 2009.
-
(2009)
Proc. of NSDI
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|