-
1
-
-
84872102454
-
-
Capture-hpc. https://projects.honeynet.org/capture-hpc/.
-
Capture-hpc
-
-
-
3
-
-
85180628033
-
-
Gnu wget. http://www.gnu.org/software/wget/.
-
Gnu wget
-
-
-
5
-
-
85180625141
-
-
Netflow. http://www.cisco.com/en/US/products/ps6601/products ios protocol group home.html.
-
Netflow
-
-
-
6
-
-
85072051127
-
Experience with some principles for building an internet-scale reliable system
-
Berkeley, CA, USA, USENIX Association
-
M. Afergan, J. Wein, and A. LaMeyer. Experience with some principles for building an internet-scale reliable system. In WORLDS’05: Proceedings of the 2nd conference on Real, Large Distributed Systems, pages 1–6, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
WORLDS’05: Proceedings of the 2nd conference on Real, Large Distributed Systems
, pp. 1-6
-
-
Afergan, M.1
Wein, J.2
LaMeyer, A.3
-
7
-
-
84949626334
-
Spamscatter: characterizing internet scam hosting infrastructure
-
Berkeley, CA, USA, USENIX Association
-
D. S. Anderson, C. Fleizach, S. Savage, and G. M. Voelker. Spamscatter: characterizing internet scam hosting infrastructure. In SS’07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1–14, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
SS’07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-14
-
-
Anderson, D. S.1
Fleizach, C.2
Savage, S.3
Voelker, G. M.4
-
8
-
-
85081770459
-
The internet motion sensor - a distributed blackhole monitoring system
-
M. Bailey, E. Cooke, F. Jahanian, and J. Nazario. The internet motion sensor - a distributed blackhole monitoring system. In NDSS, 2005.
-
(2005)
NDSS
-
-
Bailey, M.1
Cooke, E.2
Jahanian, F.3
Nazario, J.4
-
9
-
-
85080378133
-
An algorithm for anomaly-based botnet detection
-
Berkeley, CA, USA, USENIX Association
-
J. R. Binkley and S. Singh. An algorithm for anomaly-based botnet detection. In SRUTI’06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet, pages 7–7, Berkeley, CA, USA, 2006. USENIX Association.
-
(2006)
SRUTI’06: Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet
, pp. 7-7
-
-
Binkley, J. R.1
Singh, S.2
-
11
-
-
35548952721
-
A taxonomy of javascript redirection spam
-
New York, NY, USA, ACM
-
K. Chellapilla and A. Maykov. A taxonomy of javascript redirection spam. In AIRWeb’07: Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, pages 81–88, New York, NY, USA, 2007. ACM.
-
(2007)
AIRWeb’07: Proceedings of the 3rd international workshop on Adversarial information retrieval on the web
, pp. 81-88
-
-
Chellapilla, K.1
Maykov, A.2
-
12
-
-
85180628719
-
-
Cisco System Inc
-
Cisco System Inc. Ironport. http://www.ironport.com/ technology/ironport antispam.html, 2007.
-
(2007)
Ironport
-
-
-
14
-
-
84888402098
-
The zombie roundup: understanding, detecting, and disrupting botnets
-
Berkeley, CA, USA, USENIX Association
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: understanding, detecting, and disrupting botnets. In SRUTI’05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop, pages 6–6, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
SRUTI’05: Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
, pp. 6-6
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
16
-
-
33845807390
-
Spam filtering based on the analysis of text information embedded into images
-
G. Fumera, I. Pillai, and F. Roli. Spam filtering based on the analysis of text information embedded into images. J. Mach. Learn. Res., 7:2699–2720, 2006.
-
(2006)
J. Mach. Learn. Res
, vol.7
, pp. 2699-2720
-
-
Fumera, G.1
Pillai, I.2
Roli, F.3
-
17
-
-
85093871360
-
Rishi: identify bot contaminated hosts by irc nickname evaluation
-
Berkeley, CA, USA, USENIX Association
-
J. Goebel and T. Holz. Rishi: identify bot contaminated hosts by irc nickname evaluation. In HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pages 8–8, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 8-8
-
-
Goebel, J.1
Holz, T.2
-
18
-
-
85093847546
-
Peer-to-peer botnets: overview and case study
-
Berkeley, CA, USA, USENIX Association
-
J. B. Grizzard, V. Sharma, C. Nunnery, B. B. Kang, and D. Dagon. Peer-to-peer botnets: overview and case study. In HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pages 1–1, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 1-1
-
-
Grizzard, J. B.1
Sharma, V.2
Nunnery, C.3
Kang, B. B.4
Dagon, D.5
-
19
-
-
85061529860
-
Bothunter: detecting malware infection through ids-driven dialog correlation
-
Berkeley, CA, USA, USENIX Association
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: detecting malware infection through ids-driven dialog correlation. In SS’07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, pages 1–16, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
SS’07: Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
, pp. 1-16
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
25
-
-
3543096392
-
Fast Portscan Detection Using Sequential Hypothesis Testing
-
Oakland, CA, May
-
J. Jung, V. Paxson, A. W. Berger, and H. Balakrishnan. Fast Portscan Detection Using Sequential Hypothesis Testing. In IEEE Symposium on Security and Privacy 2004, Oakland, CA, May 2004.
-
(2004)
IEEE Symposium on Security and Privacy 2004
-
-
Jung, J.1
Paxson, V.2
Berger, A. W.3
Balakrishnan, H.4
-
26
-
-
85093872656
-
Wide-scale botnet detection and characterization
-
Berkeley, CA, USA, USENIX Association
-
A. Karasaridis, B. Rexroad, and D. Hoeflin. Wide-scale botnet detection and characterization. In HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pages 7–7, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 7-7
-
-
Karasaridis, A.1
Rexroad, B.2
Hoeflin, D.3
-
28
-
-
34547399387
-
A multifaceted approach to understanding the botnet phenomenon
-
New York, NY, USA, ACM
-
M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis. A multifaceted approach to understanding the botnet phenomenon. In IMC’06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, pages 41–52, New York, NY, USA, 2006. ACM.
-
(2006)
IMC’06: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
, pp. 41-52
-
-
Rajab, M. A.1
Zarfoss, J.2
Monrose, F.3
Terzis, A.4
-
29
-
-
85180636654
-
-
Norton safe web, report for livefilestore.com
-
Syamentec Corp. Norton safe web, report for livefilestore.com. https://safeweb.norton.com/report/show?name=livefilestore.com.
-
-
-
-
30
-
-
0000090155
-
Sequential tests of statistical hypotheses
-
June
-
A. Wald. Sequential tests of statistical hypotheses. The Annals of Mathematical Statistics, 16(2):117–186, June 1945.
-
(1945)
The Annals of Mathematical Statistics
, vol.16
, Issue.2
, pp. 117-186
-
-
Wald, A.1
-
31
-
-
41949089847
-
An advanced hybrid peer-to-peer botnet
-
Berkeley, CA, USA, USENIX Association
-
P. Wang, S. Sparks, and C. C. Zou. An advanced hybrid peer-to-peer botnet. In HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets, pages 2–2, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
HotBots’07: Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 2-2
-
-
Wang, P.1
Sparks, S.2
Zou, C. C.3
-
32
-
-
84904088330
-
Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities
-
Y.-M. Wang, D. Beck, X. Jiang, R. Roussev, C. Verbowski, S. Chen, and S. King. Automated web patrol with strider honeymonkeys: Finding web sites that exploit browser vulnerabilities. In In Proc. network and Distributed System Security (NDSS) Symposium, 2006.
-
(2006)
Proc. network and Distributed System Security (NDSS) Symposium
-
-
Wang, Y.-M.1
Beck, D.2
Jiang, X.3
Roussev, R.4
Verbowski, C.5
Chen, S.6
King, S.7
-
34
-
-
69849109516
-
Using honeynets for internet situational awareness
-
V. Yegneswaran, P. Barford, and V. Paxon. Using honeynets for internet situational awareness. In HOTNETS, 2005.
-
(2005)
HOTNETS
-
-
Yegneswaran, V.1
Barford, P.2
Paxon, V.3
|