-
1
-
-
85068725031
-
Building a dynamic reputation system for dns
-
Antonakakis, M., Perdisci, R., Dagon, D., Lee, W., Feamster, N.: Building a dynamic reputation system for dns. In: USENIX Security (2010)
-
(2010)
USENIX Security
-
-
Antonakakis, M.1
Perdisci, R.2
Dagon, D.3
Lee, W.4
Feamster, N.5
-
2
-
-
85068675731
-
Detecting malware domains at the upper DNS hierarchy
-
Antonakakis, M., Perdisci, R., Lee, W., Vasiloglou, N., Dagon, D.: Detecting malware domains at the upper DNS hierarchy. In: USENIX Security, vol. 11 (2011)
-
(2011)
USENIX Security
, vol.11
-
-
Antonakakis, M.1
Perdisci, R.2
Lee, W.3
Vasiloglou, N.4
Dagon, D.5
-
3
-
-
85068676628
-
From throw-away traffic to bots: Detecting the rise of DGA-based malware
-
USENIX Association August
-
Antonakakis, M., Perdisci, R., Nadji, Y., Vasiloglou, N., Abu-Nimeh, S., Lee, W., Dagon, D.: From throw-away traffic to bots: detecting the rise of DGA-based malware. In: USENIX Security, USENIX Association (August 2012)
-
(2012)
USENIX Security
-
-
Antonakakis, M.1
Perdisci, R.2
Nadji, Y.3
Vasiloglou, N.4
Abu-Nimeh, S.5
Lee, W.6
Dagon, D.7
-
4
-
-
0035742507
-
Determinants of wordlikeness: Phonotactics or lexical neighborhoods?
-
Bailey, T.M., Hahn, U.: Determinants of wordlikeness: Phonotactics or lexical neighborhoods? Journal of Memory and Language 44(4), 568-591 (2001)
-
(2001)
Journal of Memory and Language
, vol.44
, Issue.4
, pp. 568-591
-
-
Bailey, T.M.1
Hahn, U.2
-
5
-
-
84872102390
-
Disclosure: Detecting botnet command and control servers through large-scale netflow analysis
-
ACM
-
Bilge, L., Balzarotti, D., Robertson, W., Kirda, E., Kruegel, C.: Disclosure: detecting botnet command and control servers through large-scale netflow analysis. In: ACSAC. ACM (2012)
-
(2012)
ACSAC
-
-
Bilge, L.1
Balzarotti, D.2
Robertson, W.3
Kirda, E.4
Kruegel, C.5
-
6
-
-
84867860830
-
Exposure: Finding malicious domains using passive DNS analysis
-
Bilge, L., Kirda, E., Kruegel, C., Balduzzi, M.: Exposure: Finding malicious domains using passive DNS analysis. In: NDSS (2011)
-
(2011)
NDSS
-
-
Bilge, L.1
Kirda, E.2
Kruegel, C.3
Balduzzi, M.4
-
8
-
-
72849148181
-
Measuring and detecting fast-flux service networks
-
Holz, T., Gorecki, C., Rieck, K., Freiling, F.C.: Measuring and detecting fast-flux service networks. In: NDSS (2008)
-
(2008)
NDSS
-
-
Holz, T.1
Gorecki, C.2
Rieck, K.3
Freiling, F.C.4
-
9
-
-
23744500479
-
-
accessed: January 28, 2013
-
Jones, E., Oliphant, T., Peterson, P.: et al.: SciPy: Open source scientific tools for Python (2001), http://www.scipy.org/ (accessed: January 28, 2013)
-
(2001)
SciPy: Open Source Scientific Tools for Python
-
-
Jones, E.1
Oliphant, T.2
Peterson, P.3
-
10
-
-
71249091081
-
-
The Honeynet Project, University of Bonn, Germany, Tech. Rep.
-
Leder, F., Werner, T.: Know your enemy: Containing conficker. The Honeynet Project, University of Bonn, Germany, Tech. Rep. (2009)
-
(2009)
Know Your Enemy: Containing Conficker
-
-
Leder, F.1
Werner, T.2
-
14
-
-
49949091964
-
fluXOR: Detecting and monitoring fast-flux service networks
-
Zamboni, D. (ed.) DIMVA 2008. Springer, Heidelberg
-
Passerini, E., Paleari, R., Martignoni, L., Bruschi, D.: fluXOR: Detecting and monitoring fast-flux service networks. In: Zamboni, D. (ed.) DIMVA 2008. LNCS, vol. 5137, pp. 186-206. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5137
, pp. 186-206
-
-
Passerini, E.1
Paleari, R.2
Martignoni, L.3
Bruschi, D.4
-
15
-
-
84864753059
-
Early detection of malicious flux networks via large-scale passive DNS analysis
-
Perdisci, R., Corona, I., Giacinto, G.: Early detection of malicious flux networks via large-scale passive DNS analysis. IEEE Transactions on Dependable and Secure Computing 9(5), 714-726 (2012)
-
(2012)
IEEE Transactions on Dependable and Secure Computing
, vol.9
, Issue.5
, pp. 714-726
-
-
Perdisci, R.1
Corona, I.2
Giacinto, G.3
-
16
-
-
84878363750
-
Prudent practices for designing malware experiments: Status quo and outlook
-
IEEE
-
Rossow, C., Dietrich, C.J., Grier, C., Kreibich, C., Paxson, V., Pohlmann, N., Bos, H., van Steen, M.: Prudent practices for designing malware experiments: Status quo and outlook. In: Security and Privacy (SP). IEEE (2012)
-
(2012)
Security and Privacy (SP)
-
-
Rossow, C.1
Dietrich, C.J.2
Grier, C.3
Kreibich, C.4
Paxson, V.5
Pohlmann, N.6
Bos, H.7
Van Steen, M.8
-
17
-
-
84904133252
-
-
Tech. rep.
-
Schiavoni, S., Maggi, F., Cavallaro, L., Zanero, S.: Tracking and Characterizing Botnets Using Automatically Generated Domains. Tech. rep. (2013), http://arxiv.org/abs/1311.5612
-
(2013)
Tracking and Characterizing Botnets Using Automatically Generated Domains
-
-
Schiavoni, S.1
Maggi, F.2
Cavallaro, L.3
Zanero, S.4
-
19
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
ACM
-
Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C., Vigna, G.: Your botnet is my botnet: analysis of a botnet takeover. In: CCS. ACM (2009)
-
(2009)
CCS
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
-
20
-
-
84869596872
-
Winning with DNS failures: Strategies for faster botnet detection
-
Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. Springer, Heidelberg
-
Yadav, S., Reddy, A.L.N.: Winning with DNS failures: Strategies for faster botnet detection. In: Rajarajan, M., Piper, F., Wang, H., Kesidis, G. (eds.) SecureComm 2011. LNICST, vol. 96, pp. 446-459. Springer, Heidelberg (2012)
-
(2012)
LNICST
, vol.96
, pp. 446-459
-
-
Yadav, S.1
Reddy, A.L.N.2
-
21
-
-
84867774439
-
Detecting algorithmically generated domain-flux attacks with dns traffic analysis
-
Yadav, S., Reddy, A.K.K., Reddy, A., Ranjan, S.: Detecting algorithmically generated domain-flux attacks with dns traffic analysis. IEEE/ACM TON 20(5) (2012)
-
(2012)
IEEE/ACM TON
, vol.20
, Issue.5
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.3
Ranjan, S.4
-
22
-
-
78650869579
-
Detecting algorithmically generated malicious domain names
-
ACM
-
Yadav, S., Reddy, A.K.K., Reddy, A.N., Ranjan, S.: Detecting algorithmically generated malicious domain names. In: IMC. ACM (2010)
-
(2010)
IMC
-
-
Yadav, S.1
Reddy, A.K.K.2
Reddy, A.N.3
Ranjan, S.4
|