-
1
-
-
84888358953
-
-
Tech. rep., Kaspersky Lab, December
-
D. Maslennikov, Y. amestnikov, Kaspersky Security Bulletin 2012, The overall statistics for 2012, Tech. rep., Kaspersky Lab, December 2012.
-
(2012)
Kaspersky Security Bulletin 2012, the Overall Statistics for 2012
-
-
Maslennikov, D.1
Amestnikov, Y.2
-
6
-
-
77952717608
-
Revealing botnet membership using dnsbl counter-intelligence
-
A. Ramachandran, N. Feamster, D. Dagon, Revealing botnet membership using dnsbl counter-intelligence, in: Proc. of the 2nd Conf. on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), USENIX Association, 2006, pp. 49-54.
-
(2006)
Proc. of the 2nd Conf. on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), USENIX Association
, pp. 49-54
-
-
Ramachandran, A.1
Feamster, N.2
Dagon, D.3
-
9
-
-
84655163180
-
Identifying botnets by capturing group activities in DNS traffic
-
H. Choi, and H. Lee Identifying botnets by capturing group activities in DNS traffic Comput. Netw. 56 1 2012 20 33
-
(2012)
Comput. Netw.
, vol.56
, Issue.1
, pp. 20-33
-
-
Choi, H.1
Lee, H.2
-
10
-
-
84863281382
-
Extending black domain name list by using co-occurrence relation between DNS queries
-
K. Ishibashi, T. Toyono, H. Hasegawa, and H. Yoshino Extending black domain name list by using co-occurrence relation between DNS queries IEICE Trans. Commun. 95 3 2012 794 802
-
(2012)
IEICE Trans. Commun.
, vol.95
, Issue.3
, pp. 794-802
-
-
Ishibashi, K.1
Toyono, T.2
Hasegawa, H.3
Yoshino, H.4
-
11
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of DGA-based malware
-
USENIX Association
-
M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, D. Dagon, From throw-away traffic to bots: detecting the rise of DGA-based malware, in: Proc. of the 21st USENIX Security Symposium, USENIX Association, 2012.
-
(2012)
Proc. of the 21st USENIX Security Symposium
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
12
-
-
84867774439
-
Detecting algorithmically generated domain-flux attacks with DNS traffic analysis
-
S. Yadav, A.K.K. Reddy, A.L.N. Reddy, and S. Ranjan Detecting algorithmically generated domain-flux attacks with DNS traffic analysis IEEE/ACM Trans. Netw. 20 5 2012 1663 1677
-
(2012)
IEEE/ACM Trans. Netw.
, vol.20
, Issue.5
, pp. 1663-1677
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.L.N.3
Ranjan, S.4
-
14
-
-
77956435872
-
Conficker C Analysis
-
P. Porras, H. Saidi, V. Yegneswaran, Conficker C Analysis, Tech. rep., SRI International, 2009.
-
(2009)
Tech. Rep., SRI International
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
15
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
ACM
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna Your botnet is my botnet: analysis of a botnet takeover Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS) 2009 ACM 635 647
-
(2009)
Proc. of the 16th ACM Conf. on Computer and Communications Security (CCS)
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
16
-
-
73649086246
-
Anatomy of the mega-D takedown
-
P. Lin Anatomy of the mega-D takedown Network Secur. 2009 12 2009 4 7
-
(2009)
Network Secur.
, vol.2009
, Issue.12
, pp. 4-7
-
-
Lin, P.1
-
20
-
-
85059753615
-
BotGrep: Finding p2p bots with structured graph analysis
-
USENIX Association
-
N. Shishir, M. Prateek, H. Chi-Yao, C. Matthew, B. Nikita, BotGrep: finding p2p bots with structured graph analysis, in: Proc. of the 19th USENIX Security Symposium, USENIX Association, 2010, pp. 95-110.
-
(2010)
Proc. of the 19th USENIX Security Symposium
, pp. 95-110
-
-
Shishir, N.1
Prateek, M.2
Chi-Yao, H.3
Matthew, C.4
Nikita, B.5
-
22
-
-
79957629730
-
Identifying suspicious activities through DNS failure graph analysis
-
IEEE
-
N. Jiang, J. Cao, Y. Jin, L.E. Li, and Z.-L. Zhang Identifying suspicious activities through DNS failure graph analysis Proc. of the 18th IEEE Intl. Conf. on Network Protocols (ICNP) 2010 IEEE 144 153
-
(2010)
Proc. of the 18th IEEE Intl. Conf. on Network Protocols (ICNP)
, pp. 144-153
-
-
Jiang, N.1
Cao, J.2
Jin, Y.3
Li, L.E.4
Zhang, Z.-L.5
-
23
-
-
85076932663
-
Studying spamming botnets using botlab
-
USENIX Association
-
J.P. John, A. Moshchuk, S.D. Gribble, A. Krishnamurthy, Studying spamming botnets using botlab, in: Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), USENIX Association, 2009, pp. 291-306.
-
(2009)
Proc. of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI)
, pp. 291-306
-
-
John, J.P.1
Moshchuk, A.2
Gribble, S.D.3
Krishnamurthy, A.4
-
24
-
-
85061529860
-
Bothunter: Detecting malware infection through ids-driven dialog correlation
-
USENIX Association
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, W. Lee, Bothunter: detecting malware infection through ids-driven dialog correlation, in: Proc. of 16th USENIX Security Symposium, USENIX Association, 2007, pp. 1-16.
-
(2007)
Proc. of 16th USENIX Security Symposium
, pp. 1-16
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
25
-
-
84874550218
-
-
Alexa Internet Inc
-
Alexa Internet Inc, Alexa top sites. http://www.alexa.com.
-
Alexa Top Sites
-
-
-
26
-
-
85180405008
-
Intention and origination: An inside look at large-scale bot queries
-
ISOC
-
J. Zhang, Y. Xie, F. Yu, D. Soukal, W. Lee, Intention and origination: an inside look at large-scale bot queries, in: Proc. of the 20th Annual Network and Distributed System Security Symposium (NDSS), ISOC, 2013.
-
(2013)
Proc. of the 20th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Zhang, J.1
Xie, Y.2
Yu, F.3
Soukal, D.4
Lee, W.5
-
28
-
-
0024640140
-
An algorithm for drawing general undirected graphs
-
T. Kamada, and S. Kawai An algorithm for drawing general undirected graphs Inf. Process. Lett. 31 1989 7 15
-
(1989)
Inf. Process. Lett.
, vol.31
, pp. 7-15
-
-
Kamada, T.1
Kawai, S.2
-
29
-
-
84903292221
-
-
DNS-BH project team, DNS-BH
-
DNS-BH project team, DNS-BH. http://www.malwaredomains.com.
-
-
-
-
30
-
-
84903292215
-
-
MalwareDomainList, Malwaredomainlist.com
-
MalwareDomainList, Malwaredomainlist.com. http://www.malwaredomainlist. com.
-
-
-
-
31
-
-
84903292212
-
-
Malc0de, malc0de.com
-
Malc0de, malc0de.com. http://malc0de.com/database.
-
-
-
-
32
-
-
84877252057
-
-
Threat Expert Ltd.
-
Threat Expert Ltd., Threat expert. http://www.threatexpert.com.
-
Threat Expert
-
-
-
33
-
-
84903292213
-
-
Microsoft Corporation, Microsoft malware protection center
-
Microsoft Corporation, Microsoft malware protection center. http://www.microsoft.com/security/portal.
-
-
-
-
34
-
-
84903270173
-
-
Symantec Corporation
-
Symantec Corporation, Symantec threat explorer. http://us.norton.com/ securityresponse/threatexplorer/index.jsp.
-
Symantec Threat Explorer
-
-
-
35
-
-
84903292214
-
-
McAfee Inc, Site advisor. http://www.siteadvisor.com.
-
-
-
-
36
-
-
84903292207
-
-
The MalwareURL Team, MalwareURL
-
The MalwareURL Team, MalwareURL. http://www.malwareurl.com.
-
-
-
-
38
-
-
84903292208
-
-
Microsoft Corporation
-
Microsoft Corporation, ATL collection classes. http://msdn.microsoft.com/ en-us/library/vstudio/15e672bd(v=vs.100).aspx.
-
ATL Collection Classes
-
-
-
39
-
-
0001790593
-
Depth-first search and linear graph algorithms
-
R.E. Tarjan Depth-first search and linear graph algorithms SIAM J. Comput. 1 2 1972 146 160
-
(1972)
SIAM J. Comput.
, vol.1
, Issue.2
, pp. 146-160
-
-
Tarjan, R.E.1
|