-
2
-
-
47949132450
-
Taxonomy of botnet threats
-
November
-
T. Micro, "Taxonomy of botnet threats," Micro, pp. 1-15, November 2006. [Online]. Available: http://tinyurl.com/c7mlsjo
-
(2006)
Micro
, pp. 1-15
-
-
Micro, T.1
-
3
-
-
48649089769
-
A taxonomy of botnet structures
-
D. Dagon, G. Gu, C. P. Lee, and W. Lee, "A taxonomy of botnet structures," Twenty-Third Annual Computer Security Applications Conference ACSAC 2007, vol. 36, pp. 325-339, 2007. [Online]. Available: http://tinyurl.com/8kxuknw
-
(2007)
Twenty-Third Annual Computer Security Applications Conference ACSAC 2007
, vol.36
, pp. 325-339
-
-
Dagon, D.1
Gu, G.2
Lee, C.P.3
Lee, W.4
-
4
-
-
84901222225
-
-
accessed 15-December-2011
-
J. Nazario, "Bot and botnet taxonomy," http://tinyurl.com/ 6bcthj, 2008, [Online; accessed 15-December-2011].
-
(2008)
Bot and Botnet Taxonomy
-
-
Nazario, J.1
-
6
-
-
84868530248
-
-
European Network and Information Security Agency Tech. Rep.
-
D. Plohmann, E. Gerhards-Padilla, and F. Leder, "Botnets: Detection, measurement, disinfection & defence," European Network and Information Security Agency, Tech. Rep., 2011.
-
(2011)
Botnets: Detection, Measurement, Disinfection & Defence
-
-
Plohmann, D.1
Gerhards-Padilla, E.2
Leder, F.3
-
7
-
-
44649128920
-
-
P. Porras, H. Sadi, V. Yegneswaran, P. Porras, H. Sadi, and V. Yeg-neswaran, "A multi-perspective analysis of the storm (peacomm) worm. available at: http://www.cyber-ta.org/pubs/stormworm/report," 2007.
-
(2007)
A Multi-perspective Analysis of the Storm (Peacomm) Worm. Available at
-
-
Porras, P.1
Sadi, H.2
Yegneswaran, V.3
Porras, P.4
Sadi, H.5
Yeg-Neswaran, V.6
-
8
-
-
41949089847
-
An advanced hybrid peer-to-peer botnet
-
Berkeley, CA, USA: USENIX Association
-
P. Wang, S. Sparks, and C. C. Zou, "An advanced hybrid peer-to-peer botnet," in Proc. first conference on First Workshop on Hot Topics in Understanding Botnets. Berkeley, CA, USA: USENIX Association, 2007, pp. 2-2. [Online]. Available: http://dl.acm.org/citation.cfm?id=1323128.1323130
-
(2007)
Proc. First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 2-2
-
-
Wang, P.1
Sparks, S.2
Zou, C.C.3
-
9
-
-
84870877621
-
Analysis of a "/0" stealth scan from a botnet
-
New York, NY, USA: ACM
-
A. Dainotti, A. King, k. Claffy, F. Papale, and A. Pescapè, "Analysis of a "/0" stealth scan from a botnet," in Proc. 2012 ACM conference on Internet measurement conference, ser. IMC '12. New York, NY, USA: ACM, 2012, pp. 1-14. [Online]. Available: http://doi.acm.org/10.1145/ 2398776.2398778
-
(2012)
Proc. 2012 ACM Conference on Internet Measurement Conference, Ser. IMC '12
, pp. 1-14
-
-
Dainotti, A.1
King, A.2
Claffy, K.3
Papale, F.4
Pescapè, A.5
-
10
-
-
78349299834
-
Stuxnet, the real start of cyber warfare?
-
T. Chen, "Stuxnet, the real start of cyber warfare?" IEEE Network, vol. 24, no. 6, 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.6
-
-
Chen, T.1
-
11
-
-
84855680528
-
The real face of koobface: The largest web 2. 0 botnet explained
-
J. Baltazar, J. Costoya, and R. Flores, "The real face of koobface: The largest web 2. 0 botnet explained," Trend Micro Threat Research, 2009. [Online]. Available: http://tinyurl.com/c95m86f
-
(2009)
Trend Micro Threat Research
-
-
Baltazar, J.1
Costoya, J.2
Flores, R.3
-
12
-
-
84901222226
-
-
threatpost:The Kaspersky Lab Security News Service [Online; accessed 2-December-2011]
-
T. Werner, "The inside story of the kelihos botnet takedown," http://tinyurl.com/3gzmtzd, threatpost:The Kaspersky Lab Security News Service, 2011, [Online; accessed 2-December-2011].
-
(2011)
The Inside Story of the Kelihos Botnet Takedown
-
-
Werner, T.1
-
13
-
-
49049107082
-
Analysis of the storm and nugache trojans: P2P is here
-
S. Stover, D. Dittrich, J. Hernandez, and S. Dietrich, "Analysis of the storm and nugache trojans: P2P is here," in USENIX ;login, vol. 32, no. 6, 2007.
-
(2007)
USENIX ;Login
, vol.32
, Issue.6
-
-
Stover, S.1
Dittrich, D.2
Hernandez, J.3
Dietrich, S.4
-
14
-
-
85084097128
-
Measurements and mitigation of peer-to-peer-based botnets: A case study on storm worm
-
Berkeley, CA, USA
-
T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freilling, "Measurements and mitigation of peer-to-peer-based botnets: a case study on storm worm," in Proc. 1st Usenix Workshop on Large-Scale Exploitsand Emergent Threats (LEET, Berkeley, CA, USA, 2008.
-
(2008)
Proc. 1st Usenix Workshop on Large-Scale Exploitsand Emergent Threats (LEET
-
-
Holz, T.1
Steiner, M.2
Dahl, F.3
Biersack, E.4
Freilling, F.5
-
15
-
-
84882582017
-
An Inside Look at Botnets
-
M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds. Boston, MA: Springer US ch. 8
-
P. Barford and V. Yegneswaran, "An Inside Look at Botnets," in Malware Detection, ser. Advances in Information Security, M. Christodorescu, S. Jha, D. Maughan, D. Song, and C. Wang, Eds. Boston, MA: Springer US, 2007, vol. 27, ch. 8, pp. 171-191. [Online]. Available: http://dx.doi.org/10.1007/978-0- 387-44599-1\-8
-
(2007)
Malware Detection, Ser. Advances in Information Security
, vol.27
, pp. 171-191
-
-
Barford, P.1
Yegneswaran, V.2
-
16
-
-
3042742908
-
An analysis of the slapper worm
-
I. Arce, E. Levy, and E. Levy, "An analysis of the slapper worm," IEEE Security & Privacy, vol. 1, pp. 82-87, 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, pp. 82-87
-
-
Arce, I.1
Levy, E.2
Levy, E.3
-
17
-
-
70249138620
-
-
[Online; accessed 15-December-2011]
-
J. Stewart, "Phatbot trojan analysis," http://tinyurl.com/ 9srw4gh, 2004, [Online; accessed 15-December-2011].
-
(2004)
Phatbot Trojan Analysis
-
-
Stewart, J.1
-
18
-
-
84901227812
-
-
Springer Berlin/Heidelberg ch. Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
-
A. Nappa, A. Fattori, M. Balduzzi, M. Dell'Amico, and L. Cavallaro, Detection of Intrusions and Malware, and Vulnerability Assessment, ser. Lecture Notes in Computer Science. Springer Berlin/Heidelberg, 2010, ch. Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype.
-
(2010)
Detection of Intrusions and Malware, and Vulnerability Assessment, Ser. Lecture Notes in Computer Science
-
-
Nappa, A.1
Fattori, A.2
Balduzzi, M.3
Dell'Amico, M.4
Cavallaro, L.5
-
20
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverseengineering
-
Nov
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song, "Dispatcher: Enabling active botnet infiltration using automatic protocol reverseengineering," in ACM Conference on Computer and Communications Security, Nov 2009.
-
(2009)
ACM Conference on Computer and Communications Security
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
21
-
-
78650035884
-
Inference and analysis of formal models of botnet command and control protocols
-
New York, NY, USA: ACM
-
C. Y. Cho, D. Babi ć, E. C. R. Shin, and D. Song, "Inference and analysis of formal models of botnet command and control protocols," in Proc. 17th ACM conference on Computer and communications security, ser. CCS '10. New York, NY, USA: ACM, 2010, pp. 426-439. [Online]. Available: http://doi.acm.org/10.1145/1866307.1866355
-
(2010)
Proc. 17th ACM Conference on Computer and Communications Security, Ser. CCS '10
, pp. 426-439
-
-
Cho, C.Y.1
Babić, D.2
Shin, E.C.R.3
Song, D.4
-
23
-
-
79956295945
-
Social network-based botnet command-and-control: Emerging threats and countermeasures
-
Berlin, Heidelberg: Springer-Verlag
-
E. J. Kartaltepe, J. A. Morales, S. Xu, and R. Sandhu, "Social network-based botnet command-and-control: emerging threats and countermeasures," in Proc. 8th international conference on Applied cryptography and network security, ser. ACNS'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 511-528. [Online]. Available: http://dl.acm.org/ citation.cfm?id=1894302.1894342
-
(2010)
Proc. 8th International Conference on Applied Cryptography and Network Security, Ser. ACNS'10
, pp. 511-528
-
-
Kartaltepe, E.J.1
Morales, J.A.2
Xu, S.3
Sandhu, R.4
-
25
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
Nov
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szyd-lowski, R. Kemmerer, C. Kruegel, and G. Vigna, "Your botnet is my botnet: Analysis of a botnet takeover," in Proc. 16th ACM conference on Computer and Communications Security (CCS), Nov 2009.
-
(2009)
Proc. 16th ACM Conference on Computer and Communications Security (CCS)
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szyd-Lowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
28
-
-
77950880711
-
Tracking ghostnet: Investigating a cyber espionage network
-
R. Deibert, A. Manchanda, R. Rohozinski, N. Villeneuve, and G. Walton, "Tracking ghostnet: Investigating a cyber espionage network," Network, vol. JR02-2009, no. JR02-2009, p. 53, 2009. [Online]. Available: http://tinyurl.com/d5q3cj
-
(2009)
Network
, vol.JR02-2009
, Issue.JR02-2009
, pp. 53
-
-
Deibert, R.1
Manchanda, A.2
Rohozinski, R.3
Villeneuve, N.4
Walton, G.5
-
30
-
-
84910138572
-
-
NDSS, San Diego, CA USA
-
D. Wang, S. Savage, and G. M. Voelker, "Juice: A longitudinal study of an seo campaign," in NDSS, San Diego, CA, USA, 2013.
-
(2013)
Juice: A Longitudinal Study of An Seo Campaign
-
-
Wang, D.1
Savage, S.2
Voelker, G.M.3
-
32
-
-
84988711502
-
-
TrendMicro Labs Tech. Rep.
-
A. Decker, D. Sancho, L. Kharouni, M. Goncharov, and R. McArdle, "Pushdo/cutwail botnet: A study of the pushdo/cutwail botnet," TrendMicro Labs, Tech. Rep., 2009.
-
(2009)
Pushdo/cutwail Botnet: A Study of the Pushdo/cutwail Botnet
-
-
Decker, A.1
Sancho, D.2
Kharouni, L.3
Goncharov, M.4
McArdle, R.5
-
35
-
-
77950128950
-
Antisocial networks: Turning a social network into a botnet
-
Taipei, Taiwan
-
E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. Anagnostakis, and E. Markatos, "Antisocial networks: turning a social network into a botnet," in Proc. 11th Information Security Conference, Taipei, Taiwan, 2008.
-
(2008)
Proc. 11th Information Security Conference
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Antoniades, D.4
Ioannidis, S.5
Anagnostakis, K.6
Markatos, E.7
-
36
-
-
84901198959
-
-
CWSandBox Online; accessed 15-December-2011]
-
CWSandBox, "Cwsandbox," http://mwanalysis.org/, [Online; accessed 15-December-2011].
-
Cwsandbox
-
-
-
39
-
-
77952225507
-
-
Master's thesis, Technical University of Denmark, Kongens Lyngby, Denmark
-
L. T. Borup, "Peer-to-peer botnets: A case study on waledac," Master's thesis, Technical University of Denmark, Kongens Lyngby, Denmark, 2009.
-
(2009)
Peer-to-peer Botnets: A Case Study on Waledac
-
-
Borup, L.T.1
-
40
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of dga-based malware
-
Berkeley, CA, USA: USENIX Association
-
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon, "From throw-away traffic to bots: detecting the rise of dga-based malware," in Proc. 21st USENIX conference on Security symposium, ser. Security'12. Berkeley, CA, USA: USENIX Association, 2012, pp. 24-24. [Online]. Available: http://dl.acm.org/citation.cfm?id=2362793.2362817
-
(2012)
Proc. 21st USENIX Conference on Security Symposium, Ser. Security'12
, pp. 24-24
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
42
-
-
84872517076
-
-
Tor Online; accessed 20-December-2011]
-
Tor, "Tor: Anonymity online," https://www.torproject.org/, [Online; accessed 20-December-2011].
-
Tor: Anonymity Online
-
-
-
43
-
-
84881239386
-
Resilient botnet command and control with tor
-
Las Vegas, Nevada, USA
-
D. Brown, "Resilient botnet command and control with tor." Presented at DEF CON 18, Las Vegas, Nevada, USA, 2010.
-
(2010)
Presented at DEF CON 18
-
-
Brown, D.1
-
44
-
-
84901222223
-
-
Tor Online; accessed 12-November-2012]
-
Tor, "Tor hidden services," https://www.torproject.org/docs/ hidden-services.html.en, [Online; accessed 12-November-2012].
-
Tor Hidden Services
-
-
-
46
-
-
84901222224
-
-
US-Cert Online; accessed 15-December-2011]
-
US-Cert, "Malware tunneling in ipv6." http://tinyurl.com/ 6zvv568, 2005, [Online; accessed 15-December-2011].
-
(2005)
Malware Tunneling in ipv6
-
-
-
47
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
E. Cooke, F. Jahanian, and D. McPherson, "The zombie roundup: Understanding, detecting, and disrupting botnets," ACM USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet SRUTI, vol. 7, pp. 39-44, 2005. [Online]. Available: http://tinyurl.com/8h94o9u
-
(2005)
ACM USENIX Workshop on Steps to Reducing Unwanted Traffic on the Internet SRUTI
, vol.7
, pp. 39-44
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
48
-
-
85075837457
-
Botminer: Clustering analysis of network trafficfor protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, and W. Lee, "Botminer: Clustering analysis of network trafficfor protocol-and structure-independent botnet detection," in Usenix Security Symposium, 2008.
-
(2008)
Usenix Security Symposium
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
49
-
-
78650896043
-
Automatically generating models for botnet detection
-
P. Wurzinger, L. Bilge, T. Holz, J. Gobel, C. Kruegel, and E. Kirda, "Automatically generating models for botnet detection," in European Symposium on Research in Computer Security (ESORICS), 2009.
-
(2009)
European Symposium on Research in Computer Security (ESORICS)
-
-
Wurzinger, P.1
Bilge, L.2
Holz, T.3
Gobel, J.4
Kruegel, C.5
Kirda, E.6
-
51
-
-
0003539116
-
Snort-lightweight intrusion detection fornetworks
-
M. Roesch, "Snort-lightweight intrusion detection fornetworks," in Proc. USENIX LISA'99), 1999.
-
(1999)
Proc. USENIX LISA'99)
-
-
Roesch, M.1
-
52
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, "Bothunter: Detecting malware infection through ids-driven dialog correlation," in Usenix Security Symposium, 2007.
-
(2007)
Usenix Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
53
-
-
85084095135
-
Characterizing botnets from email spam records
-
L. Zhuang, J. Dunagan, D. Simon, H. Wang, I. Osipkov, G. Hulten, and J. Tygar, "Characterizing botnets from email spam records," in USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008.
-
(2008)
USENIX Workshop on Large-Scale Exploits and Emergent Threats
-
-
Zhuang, L.1
Dunagan, J.2
Simon, D.3
Wang, H.4
Osipkov, I.5
Hulten, G.6
Tygar, J.7
-
56
-
-
38049035805
-
Botnet detection by monitoring group activities in dns traffic
-
H. Choi, H. Lee, H. Lee, and H. Kim, "Botnet detection by monitoring group activities in dns traffic," in Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007), 2007.
-
(2007)
Proc. 7th IEEE International Conference on Computer and Information Technology (CIT 2007)
-
-
Choi, H.1
Lee, H.2
Lee, H.3
Kim, H.4
-
57
-
-
84901222216
-
-
to appear in NDSS
-
J. Zhang, Y. Xie, F. Yu, D. Soukal, and W. Lee, "Intention and origination: An inside look at large-scale bot queries," in to appear in NDSS, 2013.
-
(2013)
Intention and Origination: An Inside Look at Large-scale Bot Queries
-
-
Zhang, J.1
Xie, Y.2
Yu, F.3
Soukal, D.4
Lee, W.5
-
58
-
-
79958741784
-
Inter-domain stealthy port scan detection through complex event processing
-
New York, NY, USA: ACM
-
L. Aniello, G. Lodi, and R. Baldoni, "Inter-domain stealthy port scan detection through complex event processing," in Proc. the 13th European Workshop on Dependable Computing, ser. EWDC '11. New York, NY, USA: ACM, 2011, pp. 67-72. [Online]. Available: http://doi.acm.org/10.1145/1978582. 1978597
-
(2011)
Proc the 13th European Workshop on Dependable Computing, Ser. EWDC '11
, pp. 67-72
-
-
Aniello, L.1
Lodi, G.2
Baldoni, R.3
-
59
-
-
80052991883
-
A collaborative event processing system for protection of critical infrastructures from cyber attacks
-
Berlin, Heidelberg: Springer-Verlag
-
L. Aniello, G. A. Di Luna, G. Lodi, and R. Baldoni, "A collaborative event processing system for protection of critical infrastructures from cyber attacks," in Proc. 30th international conference on Computer safety, reliability, and security, ser. SAFECOMP'11. Berlin, Heidelberg: Springer-Verlag, 2011, pp. 310-323. [Online]. Available: http://dl.acm.org/ citation.cfm?id=2041619.2041651
-
(2011)
Proc. 30th International Conference on Computer Safety, Reliability, and Security, Ser. SAFECOMP'11
, pp. 310-323
-
-
Aniello, L.1
Di Luna, G.A.2
Lodi, G.3
Baldoni, R.4
-
60
-
-
84885931616
-
Incident detection for cloud environments
-
Nov
-
F. Doelitzscher, C. Reich, M. Knahl, and N. Clarke, "Incident detection for cloud environments," in Proc. Third International Conference on Emerging Network Intelligence (EMERGING 2011), Nov 2011.
-
(2011)
Proc. Third International Conference on Emerging Network Intelligence (EMERGING 2011)
-
-
Doelitzscher, F.1
Reich, C.2
Knahl, M.3
Clarke, N.4
-
63
-
-
41949115980
-
Detecting botnets with tight command and control
-
T. Strayer, R. Walsh, C. Livadas, and D. Lapsley, "Detecting botnets with tight command and control," in Proc. 2006 31st IEEE Conference on Local Computer Network, 2006.
-
(2006)
Proc. 2006 31st IEEE Conference on Local Computer Network
-
-
Strayer, T.1
Walsh, R.2
Livadas, C.3
Lapsley, D.4
-
64
-
-
84882753373
-
-
Springer
-
T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, Botnet detection based on network behavior, ser. Advances in Information Security. Springer, 2008, vol. 36, pp. 1-24.
-
(2008)
Botnet Detection Based on Network Behavior, Ser. Advances in Information Security
, vol.36
, pp. 1-24
-
-
Strayer, T.1
Lapsley, D.2
Walsh, R.3
Livadas, C.4
-
66
-
-
84901222217
-
Bottracer:execution-based bot-like malware detection
-
L. Liu, S. Chen, G. Yan, and Z. Zhang, "Bottracer:execution-based bot-like malware detection," in 11th Information Security Conference, 2008.
-
(2008)
11th Information Security Conference
-
-
Liu, L.1
Chen, S.2
Yan, G.3
Zhang, Z.4
-
68
-
-
77952376102
-
Automatic discovery of botnet communities on large-scale communication networks
-
New York, NY, USA: ACM
-
W. Lu, M. Tavallaee, and A. A. Ghorbani, "Automatic discovery of botnet communities on large-scale communication networks," in Proc. 4th International Symposium on Information, Computer, and Communications Security, ser. ASIACCS '09. New York, NY, USA: ACM, 2009, pp. 1-10. [Online]. Available: http://doi.acm.org/10.1145/1533057.1533062
-
(2009)
Proc. 4th International Symposium on Information, Computer, and Communications Security, Ser. ASIACCS '09
, pp. 1-10
-
-
Lu, W.1
Tavallaee, M.2
Ghorbani, A.A.3
-
72
-
-
49949091964
-
Fluxor: Detecting and monitoring fast-flux service networks
-
E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi, "Fluxor: Detecting and monitoring fast-flux service networks," Detection of Intrusions and Malware and Vulnerability Assessment, pp. 186-206, 2008. [Online]. Available: http://tinyurl.com/c735zn9
-
(2008)
Detection of Intrusions and Malware and Vulnerability Assessment
, pp. 186-206
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
73
-
-
58149145577
-
Detection and Mitigation of Fast-Flux Service Networks
-
San Diego, CA, USA, Feb.
-
T. Holz, C. Gorecki, K. Rieck, and F. Freiling, "Detection and Mitigation of Fast-Flux Service Networks," in Proc. NDSS 2008, San Diego, CA, USA, Feb. 2008. [Online]. Available: http://tinyurl.com/9q64vk5
-
(2008)
Proc. NDSS 2008
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.4
-
74
-
-
77950820631
-
Active botnet probing to identify obscure command and control channels
-
G. Gu, V. Yegneswaran, P. Porras, J. Stoll, and W. Lee, "Active botnet probing to identify obscure command and control channels," in Proc. 26th Annual Computer Security Applications Conference (ACSAC), 2010.
-
(2010)
Proc. 26th Annual Computer Security Applications Conference (ACSAC)
-
-
Gu, G.1
Yegneswaran, V.2
Porras, P.3
Stoll, J.4
Lee, W.5
-
75
-
-
84855658564
-
Detecting malware's failover c&c strategies with squeeze
-
R. H. Zakon, J. P. McDermott, and M. E. Locasto, Eds. ACM
-
M. Neugschwandtner, P. M. Comparetti, and C. Platzer, "Detecting malware's failover c&c strategies with squeeze." in ACSAC, R. H. Zakon, J. P. McDermott, and M. E. Locasto, Eds. ACM, 2011, pp. 21-30. [Online]. Available: http://tinyurl.com/9wz2uvj
-
(2011)
ACSAC
, pp. 21-30
-
-
Neugschwandtner, M.1
Comparetti, P.M.2
Platzer, C.3
-
77
-
-
84881159206
-
Provex: Detecting botnets with encrypted command and control channels
-
C. Rossow and C. J. Dietrich, "Provex: Detecting botnets with encrypted command and control channels," in DIMVA, 2013, pp. 21-40.
-
(2013)
DIMVA
, pp. 21-40
-
-
Rossow, C.1
Dietrich, C.J.2
-
78
-
-
62849120844
-
A survey of techniques for internet traffic classification using machine learning
-
T. Nguyen and G. Armitage, "A survey of techniques for internet traffic classification using machine learning," IEEE Commun. Surveys Tutorials, vol. 10, no. 4, pp. 56-76, 2008. [Online]. Available: http://tinyurl.com/9hpoa3d
-
(2008)
IEEE Commun. Surveys Tutorials
, vol.10
, Issue.4
, pp. 56-76
-
-
Nguyen, T.1
Armitage, G.2
-
79
-
-
46149123241
-
Using machine learning technliques to identifybotnet traffic
-
Nov
-
C. Livadas, R. Walsh, D. Lapsley, and W. Strayer, "Using machine learning technliques to identifybotnet traffic," in Proc. 2nd IEEELCN Workshop on Network Security, Nov 2006.
-
(2006)
Proc. 2nd IEEELCN Workshop on Network Security
-
-
Livadas, C.1
Walsh, R.2
Lapsley, D.3
Strayer, W.4
-
80
-
-
84888316706
-
Jackstraws: Picking command and control connections from bot traffic
-
G. Jacob, R. Hund, T. Holz, and C. Kruegel, "Jackstraws: Picking command and control connections from bot traffic," in USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Jacob, G.1
Hund, R.2
Holz, T.3
Kruegel, C.4
-
81
-
-
0033650584
-
Practical network support for ip traceback
-
S. Savage, D. Wetherall, A. R. Karlin, and T. E. Anderson, "Practical network support for ip traceback," Computer Communication Review, vol. 30, pp. 295-306, 2000.
-
(2000)
Computer Communication Review
, vol.30
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.R.3
Anderson, T.E.4
-
82
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
D. X. Song and A. Perrig, "Advanced and authenticated marking schemes for ip traceback," in IEEE INFOCOM, 2001, pp. 878-886. (Pubitemid 32478418)
-
(2001)
Proceedings - IEEE INFOCOM
, vol.2
, pp. 878-886
-
-
Song, D.X.1
Perrig, A.2
-
84
-
-
84950242640
-
On design and evaluation of intention-driven" icmp traceback
-
A. Mankin, D. Massey, C. long Wu, S. F. Wu, and L. Zhang, "On design and evaluation of "intention-driven" icmp traceback," in International Conference on Computer Communications and Networks, 2001.
-
(2001)
International Conference on Computer Communications and Networks
-
-
Mankin, A.1
Massey, D.2
Long Wu, C.3
Wu, S.F.4
Zhang, L.5
-
86
-
-
0037810705
-
Pi: A path identification mechanism to defend against ddos attacks
-
A. Yaar, A. Perrig, and D. Song, "Pi: A path identification mechanism to defend against ddos attacks," in IEEE Symposium on Security and Privacy, 2003, pp. 93-107.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 93-107
-
-
Yaar, A.1
Perrig, A.2
Song, D.3
-
87
-
-
56549101103
-
A first step towards live botmaster traceback
-
Berlin, Heidelberg: Springer-Verlag
-
D. Ramsbrock, X. Wang, and X. Jiang, "A first step towards live botmaster traceback," in Proc. 11th international symposium on Recent Advances in Intrusion Detection, ser. RAID '08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 59-77. [Online]. Available: http://dx.doi.org/10. 1007/978-3-540-87403-4-4
-
(2008)
Proc. 11th International Symposium on Recent Advances in Intrusion Detection, Ser. RAID '08
, pp. 59-77
-
-
Ramsbrock, D.1
Wang, X.2
Jiang, X.3
-
88
-
-
0034775309
-
Hash-based IP traceback
-
DOI 10.1145/964723.383060
-
A. C. Snoeren, "Hash-based ip traceback," Computer Communication Review, vol. 31, pp. 3-14, 2001. (Pubitemid 32981950)
-
(2001)
Computer Communication Review
, vol.31
, Issue.4
, pp. 3-14
-
-
Snoeren, A.C.1
-
89
-
-
0029232080
-
Holding intruders accountable on the internet
-
Washington, DC, USA: IEEE Computer Society
-
S. Staniford-Chen and L. T. Heberlein, "Holding intruders accountable on the internet," in Proc. 1995 IEEE Symposium on Security and Privacy, ser. SP '95. Washington, DC, USA: IEEE Computer Society, 1995, pp. 39-. [Online]. Available: http://dl.acm.org/citation. cfm?id=882491.884246
-
(1995)
Proc. 1995 IEEE Symposium on Security and Privacy, Ser. SP '95
, pp. 39
-
-
Staniford-Chen, S.1
Heberlein, L.T.2
-
91
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
X. Wang, D. S. Reeves, and S. F. Wu, "Inter-packet delay based correlation for tracing encrypted connections through stepping stones," in European Symposium on Research in Computer Security (ESORICS), 2002, pp. 244-263.
-
(2002)
European Symposium on Research in Computer Security (ESORICS)
, pp. 244-263
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
-
92
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Springer
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. P. J. Coit, S. Stani-ford, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Proc. of The 5th International Symposium on Recent Advances in Intrusion Detection (RAID). Springer, 2002, pp. 17-35.
-
(2002)
Proc. of the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
, pp. 17-35
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Coit, V.P.J.4
Stani-Ford, S.5
Coit, J.6
Staniford, S.7
-
93
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera. Springer, 2004, pp. 258-277. (Pubitemid 39741898)
-
(2004)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3224
, pp. 258-277
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
94
-
-
33751045160
-
Detection of stepping stone attack under delay and chaff perturbations
-
L. Zhang, A. G. Persaud, A. Johnson, and Y. Guan, "Detection of stepping stone attack under delay and chaff perturbations," in International Performance, Computing, and Communications Conference, 2006.
-
(2006)
International Performance, Computing and Communications Conference
-
-
Zhang, L.1
Persaud, A.G.2
Johnson, A.3
Guan, Y.4
-
95
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003
-
X. Wang and D. S. Reeves, "Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays," in Proc. 10th ACM conference on Computer and communications security, ser. CCS '03. New York, NY, USA: ACM, 2003, pp. 20-29. [Online]. Available: http://doi.acm.org/10.1145/948109.948115 (Pubitemid 40673785)
-
(2003)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
96
-
-
33847129500
-
-
Tech. Rep. BBN REPORT-8384, Dec
-
W. T. Strayer, C. E. Jones, I. Castineyra, J. B. Levin, and R. R. Hain, "An integrated architecture for attack attribution," Tech. Rep. BBN REPORT-8384, Dec 2003.
-
(2003)
An Integrated Architecture for Attack Attribution
-
-
Strayer, W.T.1
Jones, C.E.2
Castineyra, I.3
Levin, J.B.4
Hain, R.R.5
-
98
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
X. Wang, X. Wang, D. S. Reeves, D. S. Reeves, S. F. Wu, S. F. Wu, J. Yuill, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proc. 16th International Information Security Conference, 2001, pp. 369-384.
-
(2001)
Proc. 16th International Information Security Conference
, pp. 369-384
-
-
Wang, X.1
Wang, X.2
Reeves, D.S.3
Reeves, D.S.4
Wu, S.F.5
Wu, S.F.6
Yuill, J.7
Yuill, J.8
-
100
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A multifaceted approach to understanding the botnet phenomenon," in ACM Internet Measurement Conference(IMC), 2006.
-
(2006)
ACM Internet Measurement Conference(IMC)
-
-
Rajab, M.A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
101
-
-
85000701895
-
My botnetis bigger than yours (maybe, better than yours): Why size estimates remain challenging
-
M. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "My botnetis bigger than yours (maybe, better than yours): Why size estimates remain challenging," in USENIX Workshop on Hot Topics in Understanding Botnet, 2007.
-
(2007)
USENIX Workshop on Hot Topics in Understanding Botnet
-
-
Rajab, M.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
102
-
-
79956014847
-
Boosting the scalability of botnet detection using adaptive traffic sampling
-
New York, NY, USA: ACM
-
J. Zhang, X. Luo, R. Perdisci, G. Gu, W. Lee, and N. Feamster, "Boosting the scalability of botnet detection using adaptive traffic sampling," in Proc. 6th ACM Symposium on Information, Computer and Communications Security, ser. ASIACCS '11. New York, NY, USA: ACM, 2011, pp. 124-134. [Online]. Available: http://doi.acm.org/10.1145/1966913.1966930
-
(2011)
Proc. 6th ACM Symposium on Information, Computer and Communications Security, Ser. ASIACCS '11
, pp. 124-134
-
-
Zhang, J.1
Luo, X.2
Perdisci, R.3
Gu, G.4
Lee, W.5
Feamster, N.6
-
104
-
-
84901222207
-
-
Damballa Online; accessed 12-December-2011]
-
Damballa, "Damballa::homepage," http://www.damballa.com/, [Online; accessed 12-December-2011].
-
Damballa::homepage
-
-
-
106
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Alexandria, Virginia, USA, Oct
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage, "Spamalytics: An empirical analysis of spam marketing conversion," in Proc. 15th ACM Conference on Computer and Communications Security, Alexandria, Virginia, USA, Oct 2008, pp. 3-14.
-
(2008)
Proc. 15th ACM Conference on Computer and Communications Security
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
107
-
-
36949007580
-
Cent, five cent, ten cent, dollar: Hitting botnets where it really hurts
-
New York, NY, USA: ACM
-
R. Ford and S. Gordon, "Cent, five cent, ten cent, dollar: hitting botnets where it really hurts," in Proc. 2006 Workshop on New Security Paradigms (NSPW'06). New York, NY, USA: ACM, 2007, p. 310.
-
(2007)
Proc. 2006 Workshop on New Security Paradigms (NSPW'06)
, pp. 310
-
-
Ford, R.1
Gordon, S.2
-
108
-
-
84901222208
-
-
URIBL Online; accessed 12-December-2011]
-
URIBL, "uribl-website," http://www.uribl.com/, [Online; accessed 12-December-2011].
-
Uribl-website
-
-
-
110
-
-
82955238527
-
Botnet Judo: Fighting Spam with Itself
-
San Diego, CA, USA, March
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G. Voelker, V. Paxson, N. Weaver, and S. Savage," Botnet Judo: Fighting Spam with Itself," in Proc. 17th Annual Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, March 2010.
-
(2010)
Proc. 17th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
111
-
-
34147099073
-
Survey of network-based defense mechanisms countering the dos and ddos problems
-
April
-
T. Peng, C. Leckie, and K. Ramamohanarao, "Survey of network-based defense mechanisms countering the dos and ddos problems," ACM Comput. Surv., vol. 39, April 2007.
-
(2007)
ACM Comput. Surv.
, vol.39
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
-
114
-
-
84899293742
-
-
A.-P. E. C. AEC Dec Online; accessed 10-December-2011]
-
A.-P. E. C. AEC, "Guide on Policy and Technical Approaches against Botnet," http://tinyurl.com/9b68qmj, Dec 2008, [Online; accessed 10-December-2011].
-
(2008)
Guide on Policy and Technical Approaches Against Botnet
-
-
-
116
-
-
23944463649
-
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems
-
SIGITE 2004 - IT Education - The State of the Art
-
G. L. Orgill, G. W. Romney, M. G. Bailey, and P. M. Orgill, "The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems," in Proc. 5th conference on Information technology education, ser. CITC5 '04. New York, NY, USA: ACM, 2004, pp. 177-181. (Pubitemid 41190110)
-
(2004)
SIGITE 2004 Conference
, pp. 177-181
-
-
Orgill, G.L.1
Romney, G.W.2
Bailey, M.G.3
Orgill, P.M.4
-
117
-
-
84901222212
-
Common best practices for mitigating large scale bot infections in residential networks
-
july
-
N. Mody, M. O'Reirdan, S. Masiello, and J. Zebek, "Common best practices for mitigating large scale bot infections in residential networks," MAAWG, july 2009.
-
(2009)
MAAWG
-
-
Mody, N.1
O'Reirdan, M.2
Masiello, S.3
Zebek, J.4
-
118
-
-
79952066459
-
Defaming botnet toolkits: A bottom-up approach to mitigating the threat
-
T. Ormerod, L. Wang, M. Debbabi, A. Youssef, H. Binsalleeh, A. Boukhtouta, and P. Sinha, "Defaming botnet toolkits: A bottom-up approach to mitigating the threat," in Proc. 4th International Conference on Emerging Security Information, Systems and Technologies (SECURWARE), 2010.
-
(2010)
Proc. 4th International Conference on Emerging Security Information Systems and Technologies (SECURWARE)
-
-
Ormerod, T.1
Wang, L.2
Debbabi, M.3
Youssef, A.4
Binsalleeh, H.5
Boukhtouta, A.6
Sinha, P.7
-
122
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
A. Singh, T.-W. J. Ngan, P. Druschel, and D. S. Wallach, "Eclipse attacks on overlay networks: Threats and defenses," in IEEE International Conference on Computer Communications (Infocom), 2006.
-
(2006)
IEEE International Conference on Computer Communications (Infocom)
-
-
Singh, A.1
Ngan, T.-W.J.2
Druschel, P.3
Wallach, D.S.4
-
125
-
-
84901222198
-
-
Online; accessed 15-December-2011]
-
K. Bong and J. Brozyck, "Managing large botnets," http://tinyurl.com/blcuxbo, 2007, [Online; accessed 15-December-2011].
-
(2007)
Managing Large Botnets
-
-
Bong, K.1
Brozyck, J.2
-
126
-
-
66249147541
-
A survey of botnet technology and defenses
-
Washington, DC, USA: IEEE Computer Society
-
M. Bailey, E. Cooke, F. Jahanian, Y. Xu, and M. Karir, "A survey of botnet technology and defenses," in Proc. 2009 Cybersecurity Applications & Technology Conference for Homeland Security. Washington, DC, USA: IEEE Computer Society, 2009, pp. 299-304. [Online]. Available: http://dl.acm.org/ citation.cfm?id=1524292. 1524347
-
(2009)
Proc. 2009 Cybersecurity Applications & Technology Conference for Homeland Security
, pp. 299-304
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Xu, Y.4
Karir, M.5
-
127
-
-
70449466618
-
A survey of botnet and botnet detection
-
M. Feily, A. Shahrestani, and S. Ramadass, "A survey of botnet and botnet detection," 2009 Third International Conference on Emerging Security Information Systems and Technologies, pp. 268-273, 2009. [Online]. Available: http://tinyurl.com/9njpehq
-
(2009)
2009 Third International Conference on Emerging Security Information Systems and Technologies
, pp. 268-273
-
-
Feily, M.1
Shahrestani, A.2
Ramadass, S.3
-
128
-
-
77958527473
-
A taxonomy of botnet detection techniques
-
H. R. Zeidanloo, M. J. Z. shooshtari, M. Safari, P. V. Amoli, and M. Zamani, "A taxonomy of botnet detection techniques," 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), pp. 158-162, 2010. [Online]. Available: http://tinyurl.com/9ttpjwm
-
(2010)
3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT)
, pp. 158-162
-
-
Zeidanloo, H.R.1
Shooshtari, M.J.Z.2
Safari, M.3
Amoli, P.V.4
Zamani, M.5
-
130
-
-
85084162557
-
Towards systematic evaluation of the evadability of bot/botnet detection methods
-
Berkeley, CA, USA: USENIX Association
-
E. Stinson and J. C. Mitchell, "Towards systematic evaluation of the evadability of bot/botnet detection methods," in Proc. 2nd conference on USENIX Workshop on offensive technologies. Berkeley, CA, USA: USENIX Association, 2008, pp. 5:1-5:9. [Online]. Available: http://dl.acm.org/citation. cfm?id=1496702.1496707
-
(2008)
Proc. 2nd Conference on USENIX Workshop on Offensive Technologies
, pp. 51-59
-
-
Stinson, E.1
Mitchell, J.C.2
-
131
-
-
84898468370
-
Survey on network-based botnet detection methods
-
Jun.
-
S. García, A. Zunino, and M. Campo, "Survey on network-based botnet detection methods," Security Comm. Networks, p. n/a, Jun. 2013. [Online]. Available: http://dx.doi.org/10.1002/sec.800
-
(2013)
Security Comm. Networks
-
-
García, S.1
Zunino, A.2
Campo, M.3
-
132
-
-
84872110381
-
Proactive botnet countermeasures an offensive approach
-
Tallinn, Estonia, March
-
F. Leder, T. Werner, and P. Martini, "Proactive botnet countermeasures an offensive approach," in Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia, March 2009.
-
(2009)
Cooperative Cyber Defence Centre of Excellence
-
-
Leder, F.1
Werner, T.2
Martini, P.3
-
134
-
-
84881289371
-
Survey on botnet: Its architecture, detection, prevention and mitigation
-
I. Ullah, N. Khan, and H. A. Aboalsamh, "Survey on botnet: Its architecture, detection, prevention and mitigation," in ICNSC, 2013, pp. 660-665.
-
(2013)
ICNSC
, pp. 660-665
-
-
Ullah, I.1
Khan, N.2
Aboalsamh, H.A.3
-
135
-
-
84875973086
-
Bots and botnets: An overview of characteristics, detection and challenges
-
M. Eslahi, R. Salleh, and N. B. Anuar, "Bots and botnets: An overview of characteristics, detection and challenges," in Proc. 2012 IEEE International Conference on Control System, Computing and Engineering (ICCSCE), 2012, pp. 349-354.
-
(2012)
Proc. 2012 IEEE International Conference on Control System, Computing and Engineering (ICCSCE)
, pp. 349-354
-
-
Eslahi, M.1
Salleh, R.2
Anuar, N.B.3
-
136
-
-
51949093835
-
Botnet research survey
-
Washington, DC, USA: IEEE Computer Society
-
Z. Zhu, G. Lu, Y. Chen, Z. J. Fu, P. Roberts, and K. Han, "Botnet research survey," in Proc. 2008 32nd Annual IEEE International Computer Software and Applications Conference, ser. COMPSAC '08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 967-972. [Online]. Available: http://dx.doi.org/10.1109/COMPSAC.2008.205
-
(2008)
Proc. 2008 32nd Annual IEEE International Computer Software and Applications Conference, Ser. COMPSAC '08
, pp. 967-972
-
-
Zhu, Z.1
Lu, G.2
Chen, Y.3
Fu, Z.J.4
Roberts, P.5
Han, K.6
-
137
-
-
84875223281
-
Botnets: A survey
-
Oct.
-
S. S. C. Silva, R. M. P. Silva, R. C. G. Pinto, and R. M. Salles, "Botnets: A survey," Computer Networks, Oct. 2012. [Online]. Available: http://dx.doi.org/10.1016/j.comnet.2012.07.021
-
(2012)
Computer Networks
-
-
Silva, S.S.C.1
Silva, R.M.P.2
Pinto, R.C.G.3
Salles, R.M.4
-
138
-
-
84872102390
-
Disclosure: Detecting botnet command and control servers through large-scale netflow analysis
-
L. Bilge, D. Balzarotti, W. Robertson, E. Kirda, and C. Kruegel, "Disclosure: Detecting botnet command and control servers through large-scale netflow analysis," in ACSAC, 2012. [Online]. Available: http://www.iseclab.org/papers/disclosure.pdf
-
(2012)
ACSAC
-
-
Bilge, L.1
Balzarotti, D.2
Robertson, W.3
Kirda, E.4
Kruegel, C.5
-
139
-
-
85032409436
-
-
SecurityFocus Online; accessed 12-November-2012]
-
SecurityFocus, "Zeus botnet finds hold in amazon cloud," http://www.securityfocus.com/brief/1046, 2009, [Online; accessed 12-November-2012].
-
(2009)
Zeus Botnet Finds Hold in Amazon Cloud
-
-
-
140
-
-
84901222200
-
Who needs botnets if you have google?
-
Johannesburg, South Africa
-
I. Burke, "Who needs botnets if you have google?" Presented at ZaCon2, Johannesburg, South Africa, 2010.
-
(2010)
Presented at ZaCon2
-
-
Burke, I.1
-
141
-
-
80052596005
-
Botclouds-the future of cloud-based botnets
-
F. Leymann, I. Ivanov, M. van Sinderen, and B. Shishkov, Eds. SciTePress
-
K. P. Clark, M. Warnier, and F. M. T. Brazier, "Botclouds-the future of cloud-based botnets," in CLOSER, F. Leymann, I. Ivanov, M. van Sinderen, and B. Shishkov, Eds. SciTePress, 2011, pp. 597-603. [Online]. Available: http://tinyurl.com/c6cqkkd
-
(2011)
CLOSER
, pp. 597-603
-
-
Clark, K.P.1
Warnier, M.2
Brazier, F.M.T.3
-
142
-
-
84904159824
-
-
Stratsec Online; accessed 12-November-2012]
-
Stratsec, "botcloud ? an emerging platform for cyber-attacks," http://tinyurl.com/cubnghx, 2012, [Online; accessed 12-November-2012].
-
(2012)
Botcloud ? An Emerging Platform for Cyber-attacks
-
-
-
143
-
-
85084094893
-
Andbot: Towards advanced mobile botnets
-
Berkeley, CA, USA: USENIX Association
-
C. Xiang, F. Binxing, Y. Lihua, L. Xiaoyi, and Z. Tianning, "Andbot: towards advanced mobile botnets," in Proc. 4th USENIX conference on Large-scale exploits and emergent threats, ser. LEET'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 11-11. [Online]. Available: http://dl.acm.org/ citation.cfm?id=1972441.1972456
-
(2011)
Proc. 4th USENIX Conference on Large-scale Exploits and Emergent Threats, Ser. LEET'11
, pp. 11-11
-
-
Xiang, C.1
Binxing, F.2
Lihua, Y.3
Xiaoyi, L.4
Tianning, Z.5
-
144
-
-
84870927918
-
-
Symantec Online; accessed 12-November-2012]
-
Symantec, "Android.bmaster: A million-dollar mobile botnet," http://tinyurl.com/a4bdljv, 2012, [Online; accessed 12-November-2012].
-
(2012)
Android.bmaster: A Million-dollar Mobile Botnet
-
-
-
145
-
-
84901241011
-
-
Online; accessed 12-November-2012]
-
K. Inc., "Irc bot for android." http://tinyurl.com/7xrmlcb, 2012, [Online; accessed 12-November-2012].
-
(2012)
Irc Bot for Android
-
-
Inc, K.1
-
147
-
-
84901222202
-
-
Micorsoft June [Online; accessed 1-Aug-2012]
-
Micorsoft, "Flame malware collision attack explained," http://tinyurl.com/dxxlb5j, June 2012, [Online; accessed 1-Aug-2012].
-
(2012)
Flame Malware Collision Attack Explained
-
-
-
148
-
-
84889012386
-
-
L. of Cryptography of Systems Security (CrySyS) October [Online; accessed 1-Aug-2012]
-
L. of Cryptography of Systems Security (CrySyS), "Duqu: A stuxnet-like malware found in the wild, technical report," http://tinyurl.com/dxxlb5j, October 2011, [Online; accessed 1-Aug-2012].
-
(2011)
Duqu: A Stuxnet-like Malware Found in the Wild, Technical Report
-
-
-
149
-
-
84892166017
-
-
September [Online; accessed 12-Dec-2012]
-
K. Lab, "Gauss:abnormal distribution," http://tinyurl.com/ 8p34yp7, September 2012, [Online; accessed 12-Dec-2012].
-
(2012)
Gauss:abnormal Distribution
-
-
Lab, K.1
-
150
-
-
84883334973
-
-
August [Online; accessed 12-Dec-2012]
-
"Shamoon the wiper-copycats at work," http://tinyurl.com/ a9axwgx, August 2012, [Online; accessed 12-Dec-2012].
-
(2012)
Shamoon the Wiper-copycats at Work
-
-
Lab, K.1
-
151
-
-
84901222203
-
-
Seculert July [Online; accessed 12-Dec-2012]
-
Seculert, "Mahdi-the cyberwar savior?" http://tinyurl.com/ brp64k4, July 2012, [Online; accessed 12-Dec-2012].
-
(2012)
Mahdi-the Cyberwar Savior?
-
-
-
152
-
-
79959877302
-
-
InternetWorldStats Online; accessed 12-December-2011]
-
InternetWorldStats, "Internet growth statistics," http://www.internetworldstats.com/emarketing.htm, [Online; accessed 12-December-2011].
-
Internet Growth Statistics
-
-
-
153
-
-
17844366573
-
Analysis of end user security behaviors
-
DOI 10.1016/j.cose.2004.07.001, PII S0167404804001841
-
J. Stanton, K. Stam, P. Mastrangelo, and J. Jolton, "Analysis of end user security behaviors," Computers Security, vol. 24, no. 2, pp. 124-133, 2005. [Online]. Available: http://tinyurl.com/b3k6fg6 (Pubitemid 40583824)
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
154
-
-
84901222204
-
-
January [Online; accessed 12-December-2011]
-
J. Fielding, "25% of all computers on botnets," http://tinyurl.com/9e7bdkr, January 2007, [Online; accessed 12-December-2011].
-
(2007)
25% of All Computers on Botnets
-
-
Fielding, J.1
-
155
-
-
84901222195
-
-
CIOinsight February Online; accessed 12-December-2011]
-
CIOinsight, "Botnets still a major threat, researchers say at rsa," http://tinyurl.com/cw5bypo, February 2011, [Online; accessed 12-December-2011].
-
(2011)
Botnets Still A Major Threat, Researchers Say at Rsa
-
-
-
159
-
-
84901242100
-
-
February [Online; accessed 12-December-2011]
-
R. McMillan, "China cleans up spam problem," http://tinyurl.com/clnedlt, February 2011, [Online; accessed 12-December-2011].
-
(2011)
China Cleans Up Spam Problem
-
-
McMillan, R.1
-
161
-
-
84901222190
-
-
TrendMicro Online; accessed 12-December-2011]
-
TrendMicro, "Rubotted," http://tinyurl.com/yd62cb8, [Online; accessed 12-December-2011].
-
Rubotted
-
-
-
162
-
-
84901222191
-
Bottleneck: A generalized, flexible and extensible framework for botnet defense
-
May 2012, poster Paper
-
N. R. Ramay, S. Khattak, A. A. Syed, and S. A. Khayam, "Bottleneck: A generalized, flexible and extensible framework for botnet defense," in IEEE Symposium on Security and Privacy, 2012, May 2012, poster Paper.
-
(2012)
IEEE Symposium on Security and Privacy
-
-
Ramay, N.R.1
Khattak, S.2
Syed, A.A.3
Khayam, S.A.4
|